How do I give my Executives "Full Confidentiality" to their Home Drive Folder?

Hi Experts,

Here's my setup:
1) Windows Server 2003 File Server
2) Users are mapped Home Drives through AD

I would like to achieve the following goal:
1) Allow only Single User to access their specified Home Drive + IT Manager.
2) Neither Domain Admin, nor Local Administrator, should be able to take ownership or browse files.
3) All files should be encrypted and useless to anyone but those specified in (1).

Please give me a solution :)

TQ85
tq85Asked:
Who is Participating?
 
HapexamendiosConnect With a Mentor Commented:
Using Encrypting File System, encrypting to the users' public key, and creating an Additional Decryption Key for the "IT Manager" so he can access, backup and recover files is probably the best way - I'm guessing this is what is outlined in the PDFs above (my viewer is currently stuffed so I can't read either of them!)

In this scenario, it does not matter who adds themselves to the NTFS ACL, as they will still not be able to decrypt file contents, achieving your goal.

However, you then need to put some thought into protecting the Certificate Authority; since this is your control as opposed to the ACL, this is also the place where your security could be circumvented. Ensure, for example, that only the "IT Manager" can manage the issuing of certificates.

Hope this is helpful.
0
 
Krzysztof PytkoConnect With a Mentor Senior Active Directory EngineerCommented:
For me it looks like, leave only Domain Administrators and IT Manager with Full Control to their home drives. IT manager should use EFS certificate to encrypt their data. That's all.

You can check this guide, how t implement EFS certificated for users (if you wish).

Regards,
Krzysztof
My-own-EFS-cert.pdf
0
 
tq85Author Commented:
What if, I do not want Domain Administrators to have access to this folder?
0
Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

 
Krzysztof PytkoSenior Active Directory EngineerCommented:
Import their certificate on Domain Administrator account also :)
0
 
Sikhumbuzo NtsadaConnect With a Mentor Senior IT TechnicianCommented:
I know the file might not be straight forward, I hope you get the idea, if not I will re do it for you.

Document1.pdf
0
 
KendzastCommented:
You can restrict administrators via GPO. Local Policies/User Rights Assignment/Take ownership of files or other objects. Default value is Administrators.
0
 
HapexamendiosCommented:
Using Encrypting File System, encrypting to the users' public key, and creating an Additional Decryption Key for the "IT Manager" so he can access, backup and recover files is probably the best way - I'm guessing this is what is outlined in the PDFs above (my viewer is currently stuffed so I can't read either of them!)

In this scenario, it does not matter who adds themselves to the NTFS ACL, as they will still not be able to decrypt file contents, achieving your goal.

However, you then need to put some thought into protecting the Certificate Authority; since this is your control as opposed to the ACL, this is also the place where your security could be circumvented. Ensure, for example, that only the "IT Manager" can manage the issuing of certificates.

Hope this is helpful.
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.