Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Creating Recovery agent and recovering EFS files in standalone XP Machine

Posted on 2006-07-08
5
Medium Priority
?
1,290 Views
Last Modified: 2012-08-14
Hi,
  I have a stand alone windows xp professional machine. I'm using EFS and encrypting files in my hard drive. I want to be able to recover those files even if the disk crashes. I created a recovery agent certificate for local admin using command cipher /r:filename

Now i would like to know what the remaining steps are to succesfully exporting the private key and be able to read this encrypted file in another machine using those exported keys.

Thanks for all your help!

Vinod.
0
Comment
Question by:mvvinod
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 
LVL 59

Expert Comment

by:LeeTutor
ID: 17067570
This MSKB article should be of help:

http://support.microsoft.com/default.aspx?scid=kb;en-us;241201
How to back up the recovery agent Encrypting File System (EFS) private key in Windows Server 2003, in Windows 2000, and in Windows XP
0
 
LVL 8

Author Comment

by:mvvinod
ID: 17068748
Once i back this up, how do i restore this to another machine to test and see if i can decrypt those files...???

Vinod
0
 
LVL 59

Accepted Solution

by:
LeeTutor earned 2000 total points
ID: 17069605
This page has everything you would ever want to know about EFS (probably more than you would ever want to know):

http://www.microsoft.com/technet/prodtechnol/winxppro/deploy/cryptfs.mspx

There is a section on importing the EFS recovery agent private key, as well as a lot of other information.
0
 
LVL 8

Author Comment

by:mvvinod
ID: 17086740
Great pointer. Thank you!
0

Featured Post

Cyber Threats to Small Businesses (Part 2)

The evolving cybersecurity landscape presents SMBs with a host of new threats to their clients, their data, and their bottom line. In part 2 of this blog series, learn three quick processes Webroot’s CISO, Gary Hayslip, recommends to help small businesses beat modern threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
This article covers the basics of data encryption, what it is, how it works, and why it's important. If you've ever wondered what goes on when you "encrypt" data, you can look here to build a good foundation for your personal learning.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses

604 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question