Unable to access encrypted files on windows server with admin account
I've been given an admin account in a windows server so I can setup a backup of essential files.
The software I am using failed on some file copies.
On checking the files they were green within explorer on the server and on clients. Therefore encrypted. Nobody needs them encrypted it appears to be an accident.
From the client machines I can access them (slowly) which I understand however how can I access them with the admin account?
As the client accounts can access them will untick encrypt the files on a clientschine work?
Thanks in advance
The permissions of the files are set to 'everyone' its just when locally accessing them with my admin account on the server I cannot which means I cannot decrypt them. Id rather not have to copy them somewhere over the network and copy them back. I'm hoping I can just decrypt from an account that has access.
I can view them from the client computers as mentioned.
McKnife are you thinking that each machine may have a key stored somewhere locally or this key may be on the server? I don't see how this makes it admin account specific, although I guess my admin account was added after this encryption happened.
I think someone was trying to compress a load of files to save space and they have confused encrypt with compress.
n2fc
Navjump: I agree with your hypothesis that someone confused encrypt with compress..
You probably should decrypt...
McKnife: Great article on EFS reference! Navjump can either remove the file from EFS or export /import the key as shown therein to solve the issue... But if recovery is the ultimate goal here and no business needs exist for EFS, best answer is probably to permanently decrypt!
navjump
ASKER
OK if my admin account cannot decrypt, shall I just go ahead and decrypt from a client computer that does have access?
I tested by picking a random client machine and accessing the shared drive and I was able to view the green files/folders. Does this mean I can decrypt from that machine or just view them?
My understanding is the recovery agent only allows to encrypt/decrypt an account added in for any new files, not the old files.
The one that can read them may decrypt them. Open the properties of that file/folder and, behind the advanced button on the general tab, simply uncheck the box "encrypt contents..."
navjump
ASKER
OK great that seems like good news as I was able to view them on a couple of client machines with users logged in. I am guessing these users are within the group that at the time was used to encrypt, but as I am a new admin user I am new to the user group used to encrypt.
Either way I will try this next site visit Friday and let you know how I get on.
Thanks
navjump
ASKER
Hey guys
No success with this today sadly. It seems a lot of the files can't be viewed and therefore not decrypted from the client machines.
I am concerned if I change the main 'administrator' password so I can use that account it will effect the decryption? Will that happen?
I also am concerned if I use the other suggested ideas that I might stop this from ever being able to be decrypted.
I am currently trying to get the original administrator to decrypt.
I would be greatful for a step by step alternstive solution or pointing me to the relevant part of the document.
Changing a password will NOT stop EFS from working, you will be able to decrypt as long as you are able to read the data. As you could read, "by default, the administrator account is the data recovery agent" and will be able to read those files.
n2fc
The encryption/decryption mechanism for EFS is a certificate stored in each user's certificate database...
So long as that database remains accessible, there should be no issues!
navjump
ASKER
OK so when I access on either my admin account or from a client logged in on their machine it just says 'administrator access required' So sound for sure like I need to use the main admin account.
I think I'll try and get it from the old admin who has not been very helpful, but you think ok to use my admin account to change the main administrator password and just do it that way?
I was just trying to be tactful and not change that account password.
A user can change his OWN password with impunity...
BUT force changing of ANOTHER account by an admin can lose access to the certificates...
My earlier recommendation stands...
Logon to any account that can read the file and EXPORT the certificate from THAT account...
You can then IMPORT that certificate to ANY other account to gain the same access!
navjump
ASKER
Yeah, the problem I am having is it's not consistent. The user I tried last week has access to a few of the files (hardly any), but the account I tried today had access to none. So I tried the account for last week to be sure and confirmed very little access.
Are the users manually given the certificate at the time of encryption or is that automatically created?
I have no consistency and nobody remembers doing this so it was an accidental encryption which could have been by any user and not necessarily one still part of the office as from what I can tell this has been neglected a while.
So if I can log on to the proper original administrator account without me having to change the password is that currently my best bet?
I see. This ( http://support.microsoft.com/kb/290260 ) is true for local accounts, not for domain accounts, if I am not mistaken. navjump, is this a domain account or a local one?
n2fc
Yet another article describing recovery issues for encrypted files...
It describes the cipher.exe tool (NTFS EFS tool) as well as the various certificate option & issues as well as setting up the "recovery agent" for EFS...
navjump
ASKER
Sidenote:
This isn't likely to be a crypto locker virus?
I've seen that before but not turning files 'green' so I'm girding unlikely
It's explaining an issue where a zip file created on a Mac and unzipped on windows marks the files as encrypted. About 50% of the users are Mac users. Although the untick ing obviously doesn't work
As I've said I'm not having any luck with users that can open them at all.
I'm going to use the EFS info tool to try and find out which account encrypted them as a first step.
navjump
ASKER
OK EFS info tool provides no info on these files/doesnt work - its as if they don't exist.
Administrator account does not allow access to them either
It's like they have been encrypted elsewhere which leads me back to the mac unzipping issue.
A large chunk of the files have the mac_os prefix in them which is suggestive of this. However, they can't be unticked you get the standard encrypted file message which just asks for admin permission and then fails.
I'm at a point where I should right these files off I think, its about 450 files a very small chunk in the scheme of things and nobody has had access to these for a long time.
navjump
ASKER
OK a little bit more digging.
Tried to use EFSinfo tool sI said and useless, but if I simply go to the advanced tab in the properties and then 'details' next to the file. It says "users who can access this file and a name. The name doesn't seem to be our domain account format its actually first name / last name.
A few random file checks show different users for different files which is concerning. Still not sure why this has happened.
If I try to add a user who can decrypt the file. I get a list of 2 users who are other users on the network. Very odd. I can't add any of them though as I get an error message saying I don't have access to do it. I am guessing because I am using my admin account rather than the account named in the top box saying who has access.
So, is my best bet to go through each file and just identify who has access to each file and then get them to decrypt them?
You mentioned how I can add the certificates for the user to my admin account I am still puzzled by this process.
Do I take the certificate from the users local/client machine running windows 7, then return to my server and add the certificate in there under my login account? This way I can just decrypt them all rather then getting them to identify and decrypt each file?
Thanks again for your patience, I am mildly dyslexic so I hope you can appreciate things take me a little longer than most.
In a previous reply I supplied a link to the export/import process...
All you need do is export the certificate from a user who CAN access the file and then import it to another user who would like to enjoy the same usage.
navjump
ASKER
Thanks again n2fc
just to clarify though I am doing this export from the local users computer which is where the certificate should be held, rather than the server?
I got no further with this and it appears that the encrypted files all have a mac origin so I think this is related to the windows issue that it encrypts files that were zipped on a mac and unzipped on windows.
Thankyou all for your help, the encrypted files number hasnt increased but it is a shame we cant access the old files.
The permissions of the files are set to 'everyone' its just when locally accessing them with my admin account on the server I cannot which means I cannot decrypt them. Id rather not have to copy them somewhere over the network and copy them back. I'm hoping I can just decrypt from an account that has access.
I can view them from the client computers as mentioned.
McKnife are you thinking that each machine may have a key stored somewhere locally or this key may be on the server? I don't see how this makes it admin account specific, although I guess my admin account was added after this encryption happened.
I think someone was trying to compress a load of files to save space and they have confused encrypt with compress.