Simple Encryption for a Server 2012 R2 Data Drive

I have a Dell PowerEdge 1900 with a system drive in RAID 1 with 2 500Gb hard drives.  I have added another 4 Tb drive as a single data drive.  Although an older server, it is plenty fast enough for what I am doing and the data I am storing.

The Dell PowerEdge 1900 does NOT have TPM.

I want to encrypt the data drive.  I do not need to encrypt the system drive, necessarily.  

I understand other security concerns and I only need to prevent someone taking the drive out of my server and trying to read it in another computer.  Having the data read from the drive after it is stolen is my main concern.

I have used bitlocker on Windows 8.1 to encrypt external USB drives with a password, but I am struggling with this data drive on a 2012 R2 server.  

It is also important that I be able to turn the server on and have the data drive accessible from the console (and even to someone authenticated on the network) without having to manually enter a password to open the drive.

Is bitlocker even a possible solution for this or should I be looking at a different, third-party product?

-Terry
tspeicherAsked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

bbaoIT ConsultantCommented:
just enable EFS on the data drive.

FYI - EFS Tutorial

http://youtube.com/watch?v=YxgWsa-slOU
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
McKnifeCommented:
Efs? And then use certificates for everyone?
With bitlocker, you could use a startscript that mounts the drive. That script would be accessed via network, server stolen  no script - no mounting. We do this to mimic the modern netunlock feature.
0
bbaoIT ConsultantCommented:
> Efs? And then use certificates for everyone?

i don't think that could be an issue here as other users commonly access the files on EFS over network via shared folders, which makes EFS transparent for the remote users. however, NTFS permissions need to correctly assigned for the remote users.

IMPO, the certificate issue only applies to such a scenario when users need to access the console locally or via RDP.
0
Problems using Powershell and Active Directory?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

McKnifeCommented:
There's no "certificate issue" :) EFS works with certificates - all the time. So depending on who (what users, what services) would need access to the data, we need to setup access using certificates - if you ever granted EFS to multiple users, you will see what I mean. That could get complicated, that's why bitlocker wins here, hands down - in my opinion.
0
tspeicherAuthor Commented:
I think I was thinking too big to go with bitlocker.  EFS should work just fine.  This server is only accessed by me, it has my archives.  But because it has sensitive info, I don't want it to fall into malicious hands by having someone steal the server and pull the hard drive.  

If I use the startscript, then the key would be on the system drive.  (I only have the one server.)  

Thanks for your responses.
0
McKnifeCommented:
"If I use the startscript, then the key would be on the system drive" - no :)! Of course not, I told you how it would work: via network.
Please consider that with EFS, you tie it to a certificate. Not that this is bad - just do export the key and keep it safe.
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Encryption

From novice to tech pro — start learning today.