Solved

EFS/PKI Implementation help

Posted on 2006-06-14
1
722 Views
Last Modified: 2013-12-04
I am in the process of implementing EFS on our domain using PKI for file level encryption.  I am trying to find step-by-step tutorials to help with the process (screenshots would be nice) and any type of bullet point checklist of things I will need to do to complete the project.  I have looked and looked but I just keep finding broad overviews of EFS and PKI.  Any help to get the information and get me started would be appreciated.  This is extremely important so I am awarding 500 points.  

FYI - It will be implemented on a windows 2003 server if that helps any.  Ask me questions if you need more information.
0
Comment
Question by:tw_chase
1 Comment
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 500 total points
ID: 16906155
A few things to keep in mind with EFS...
EFS creates a plain-text copy of encrypted files/folders within the folder that data resides, it's recommended that data to be encrypted be placed in an already encrypted folder to avoid possible plain-text recovery.
You must backup your domain admin recovery agents and administrator keys. These will make it possible for you to recover data if a user's account is deleted or incase of HD failure etc...

http://support.microsoft.com/?kbid=241201
http://support.microsoft.com/kb/223316/en-us
http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologies/directory/activedirectory/stepbystep/efs.mspx  (screen shots and all ;)
http://www.microsoft.com/technet/security/smallbusiness/topics/cryptographyetc/protect_data_efs.mspx
-rich
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Low-cost /freeware IOC tools 4 64
firewall inside of network 9 76
Can we get infected by copying & pasting 6 200
Using icacls to block access to mstsc, cmd & PowerShell 4 144
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
OfficeMate Freezes on login or does not load after login credentials are input.
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question