Solved

How do I give my Executives "Full Confidentiality" to their Home Drive Folder?

Posted on 2011-02-23
7
220 Views
Last Modified: 2012-05-11
Hi Experts,

Here's my setup:
1) Windows Server 2003 File Server
2) Users are mapped Home Drives through AD

I would like to achieve the following goal:
1) Allow only Single User to access their specified Home Drive + IT Manager.
2) Neither Domain Admin, nor Local Administrator, should be able to take ownership or browse files.
3) All files should be encrypted and useless to anyone but those specified in (1).

Please give me a solution :)

TQ85
0
Comment
Question by:tq85
7 Comments
 
LVL 39

Assisted Solution

by:Krzysztof Pytko
Krzysztof Pytko earned 150 total points
Comment Utility
For me it looks like, leave only Domain Administrators and IT Manager with Full Control to their home drives. IT manager should use EFS certificate to encrypt their data. That's all.

You can check this guide, how t implement EFS certificated for users (if you wish).

Regards,
Krzysztof
My-own-EFS-cert.pdf
0
 

Author Comment

by:tq85
Comment Utility
What if, I do not want Domain Administrators to have access to this folder?
0
 
LVL 39

Expert Comment

by:Krzysztof Pytko
Comment Utility
Import their certificate on Domain Administrator account also :)
0
Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

 
LVL 17

Assisted Solution

by:Sikhumbuzo Ntsada
Sikhumbuzo Ntsada earned 150 total points
Comment Utility
I know the file might not be straight forward, I hope you get the idea, if not I will re do it for you.

Document1.pdf
0
 
LVL 4

Expert Comment

by:Kendzast
Comment Utility
You can restrict administrators via GPO. Local Policies/User Rights Assignment/Take ownership of files or other objects. Default value is Administrators.
0
 
LVL 2

Accepted Solution

by:
Hapexamendios earned 200 total points
Comment Utility
Using Encrypting File System, encrypting to the users' public key, and creating an Additional Decryption Key for the "IT Manager" so he can access, backup and recover files is probably the best way - I'm guessing this is what is outlined in the PDFs above (my viewer is currently stuffed so I can't read either of them!)

In this scenario, it does not matter who adds themselves to the NTFS ACL, as they will still not be able to decrypt file contents, achieving your goal.

However, you then need to put some thought into protecting the Certificate Authority; since this is your control as opposed to the ACL, this is also the place where your security could be circumvented. Ensure, for example, that only the "IT Manager" can manage the issuing of certificates.

Hope this is helpful.
0
 
LVL 2

Expert Comment

by:Hapexamendios
Comment Utility
Using Encrypting File System, encrypting to the users' public key, and creating an Additional Decryption Key for the "IT Manager" so he can access, backup and recover files is probably the best way - I'm guessing this is what is outlined in the PDFs above (my viewer is currently stuffed so I can't read either of them!)

In this scenario, it does not matter who adds themselves to the NTFS ACL, as they will still not be able to decrypt file contents, achieving your goal.

However, you then need to put some thought into protecting the Certificate Authority; since this is your control as opposed to the ACL, this is also the place where your security could be circumvented. Ensure, for example, that only the "IT Manager" can manage the issuing of certificates.

Hope this is helpful.
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
When the confidentiality and security of your data is a must, trust the highly encrypted cloud fax portfolio used by 12 million businesses worldwide, including nearly half of the Fortune 500.
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now