Simple Encryption for a Server 2012 R2 Data Drive

I have a Dell PowerEdge 1900 with a system drive in RAID 1 with 2 500Gb hard drives.  I have added another 4 Tb drive as a single data drive.  Although an older server, it is plenty fast enough for what I am doing and the data I am storing.

The Dell PowerEdge 1900 does NOT have TPM.

I want to encrypt the data drive.  I do not need to encrypt the system drive, necessarily.  

I understand other security concerns and I only need to prevent someone taking the drive out of my server and trying to read it in another computer.  Having the data read from the drive after it is stolen is my main concern.

I have used bitlocker on Windows 8.1 to encrypt external USB drives with a password, but I am struggling with this data drive on a 2012 R2 server.  

It is also important that I be able to turn the server on and have the data drive accessible from the console (and even to someone authenticated on the network) without having to manually enter a password to open the drive.

Is bitlocker even a possible solution for this or should I be looking at a different, third-party product?

-Terry
tspeicherAsked:
Who is Participating?
 
bbaoIT ConsultantCommented:
just enable EFS on the data drive.

FYI - EFS Tutorial

http://youtube.com/watch?v=YxgWsa-slOU
0
 
McKnifeCommented:
Efs? And then use certificates for everyone?
With bitlocker, you could use a startscript that mounts the drive. That script would be accessed via network, server stolen  no script - no mounting. We do this to mimic the modern netunlock feature.
0
 
bbaoIT ConsultantCommented:
> Efs? And then use certificates for everyone?

i don't think that could be an issue here as other users commonly access the files on EFS over network via shared folders, which makes EFS transparent for the remote users. however, NTFS permissions need to correctly assigned for the remote users.

IMPO, the certificate issue only applies to such a scenario when users need to access the console locally or via RDP.
0
Making Bulk Changes to Active Directory

Watch this video to see how easy it is to make mass changes to Active Directory from an external text file without using complicated scripts.

 
McKnifeCommented:
There's no "certificate issue" :) EFS works with certificates - all the time. So depending on who (what users, what services) would need access to the data, we need to setup access using certificates - if you ever granted EFS to multiple users, you will see what I mean. That could get complicated, that's why bitlocker wins here, hands down - in my opinion.
0
 
tspeicherAuthor Commented:
I think I was thinking too big to go with bitlocker.  EFS should work just fine.  This server is only accessed by me, it has my archives.  But because it has sensitive info, I don't want it to fall into malicious hands by having someone steal the server and pull the hard drive.  

If I use the startscript, then the key would be on the system drive.  (I only have the one server.)  

Thanks for your responses.
0
 
McKnifeCommented:
"If I use the startscript, then the key would be on the system drive" - no :)! Of course not, I told you how it would work: via network.
Please consider that with EFS, you tie it to a certificate. Not that this is bad - just do export the key and keep it safe.
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.