Encrypting File System - An Overview ScienceDirect Topics
Encrypting File System - An Overview ScienceDirect Topics
Related terms:
Anti-forensics
John Sammons, in The Basics of Digital Forensics (Second Edition), 2015
Introduction
Microsoft's Encrypting File System technology is one of the strongest yet most
underutilized security features that I have seen in my many years of working
with Microsoft infrastructures and enterprise deployments. I have very rarely
seen it used in enterprise or even medium-sized environments, and when I
have, it has been in isolated instances where individuals or teams took it upon
themselves to implement EFS-based security controls. This is not entirely
without justification. EFS is easy for individuals to set up and use autonomously,
but the proper deployment of EFS in large environments requires careful
planning around certificate and recovery agent management, backup and
restoration, and access model implementation. The consequences of improperly
rolling out EFS can be serious: You can lose access to your data. To be more
specific, inadequately designed EFS controls can result in files being encrypted
on the file system that, based on a failure scenario, can prevent the decryption of
files even though you may have physical access to them.
EFS, in its simplest form, is a Windows OS–based feature that allows a user
(administrator or otherwise) to set a folder, or an individual file, to have its
contents encrypted. Encrypting at the folder level is the typical method of using
EFS as it guarantees that any file added to the encrypted folder is automatically
encrypted. While you can certainly select an individual file and encrypt it, the
examples used in this chapter will be based on folders that are created in a
directory structure, and the folder itself marked for encryption. As mentioned,
when a folder is set to be encrypted, all files created within that folder will be
encrypted by their respective owners. Setting a folder to be encrypted is quite
simple; you just pull up the Advanced Attributes of a folder and select Encrypt
contents to secure data, as shown in Figure 2.1.
Read more
Read full chapter
URL: https://www.sciencedirect.com/science/article/pii/B9781597495721000093
Antiforensics
John Sammons, in The Basics of Digital Forensics, 2012
Read less
Read full chapter
URL: https://www.sciencedirect.com/science/article/pii/B9781597496612000061
Tip
BitLocker Drive Encryption and EFS are not mutually exclusive. In fact, they
can be used together in a rather effective combination. When using EFS,
encryption keys are stored with the computer's operating system. Although
the keys used with EFS are encrypted, their security could still be
compromised if a hacker is able to access the operating system drive. Using
BitLocker to encrypt, the operating system drive can help protect these keys
by preventing itself from booting or being accessed if it is installed in
another computer.
Using EFS
EFS encrypts files and folders individually based on the user account associated
with them. If a computer has multiple users or groups, each user or group can
encrypt their own files independently. EFS has been around since Windows
2000 and has been steadily improved with every new version of the Windows
code base, either client or server. Unlike BitLocker, it neither requires nor uses
any special hardware.
Although EFS has been available in all versions of Windows client and server
operating systems since Windows 2000, it is fully implemented only in certain
editions, specifically any of the Windows Server editions, Vista Enterprise and
Ultimate, and Windows 7 Ultimate. It is not fully supported on Windows Vista
Starter, Home Basic and Premium, and Business, or on Windows 7 Home
Premium or Professional. On those versions, you can decrypt and modify
encrypted files, but cannot encrypt them.
Working with encrypted folders and files is much the same as other file
operations. Open Windows Explorer and right-click the folder or file you want
to encrypt, and then click Properties in the context menu. Select the General
tab and then click Advanced. The dialog box shown in Figure 2.9 will appear.
Select the Encrypt contents to secure data (circled in the screenshot in Figure
2.9) check box and click OK. Finally click OK to confirm the operation. The
encrypted folder or file in the file list in Windows Explorer will turn green once
the encryption attribute is set. Decrypting a folder or file is nearly identical
except that you will clear the Encrypt contents to secure data check box in the
Advanced Attributes window and click OK to accept the change.
FIGURE 2.9. Encrypting a File Using EFS
Note
The first time you encrypt a folder or file, an encryption certificate is
automatically created. You should back up your encryption certificate. If your
certificate and key are lost or damaged and you don't have a backup, you
won't be able to use the files that you have encrypted.
Using BitLocker
If your requirements suggest that encrypting the entire hard disk is preferred to
working with individual files, BitLocker Drive Encryption is a better choice than
EFS. Road warrior employees who truck laptops everywhere they go are very
suitable candidates. A laptop left in an airport is an attractive target, especially
because employees on the road tend to be self-contained, carrying all of the files
they need to work on and anything they pick up on the road. An encrypted disk
makes it extremely difficult to extract the data from the purloined computer.
A further benefit of BitLocker is that it can be used to encrypt the contents of
removable media. BitLocker To Go works with many media, notably the
ubiquitous Universal Serial Bus (USB) drives that are the bane of IT security
professionals' existences and seem to proliferate at an alarming rate. Because it
encrypts the entire disk, another unique characteristic of BitLocker and
BitLocker To Go is that they disregard individual user accounts associated with
files; it is either enabled or disabled for all users or groups on the system.
Tip
Like EFS, your options for encrypting the contents of your hard drive depend
on the version of Windows that you are running. BitLocker is available only in
Windows Vista Enterprise and Ultimate, Windows Server 2008 and Windows
7 Ultimate, which means it is not available in Vista Home Basic, Home
Premium or Business, or in Windows 7 Home Premium or Professional.
Unlike EFS, BitLocker requires the use of special hardware before it can be
enabled. A trusted platform module (TPM) is a secure cryptoprocessor that can
store cryptographic keys, which is embedded in the workstations
microprocessor. It must be enabled in the Basic Input/Output System (BIOS),
which may or may not be by default. Once enabled, it will be displayed in Device
Manager under Security Devices, as shown in Figure 2.10. The TPM must be of
version 1.2 or later in order to be used with BitLocker. If a TPM is not installed
or is an earlier version, you can also use a removable USB memory device, such
as a USB flash drive to store its key. For this chapter, we will focus on enabling
BitLocker on systems that have an embedded TPM.
FIGURE 2.10. Verifying that the TPM is Enabled
Once the TPM has been enabled in the BIOS and you have verified in Device
Manager that Windows acknowledges its existence, you can manage it. Unlike
other hardware on your system, there is a specific and rather robust applet for
managing the TPM. The applet, shown in the screenshot in Figure 2.11, allows
you to initialize the TPM, enable or disable it, and change the password, among
other functions. The initial setup of the TPM is performed during the setup
process for BitLocker; after verifying that the TPM has been initialized, you do
not need to change the settings in order for BitLocker to be set up correctly.
Once you have the TPM enabled in the BIOS and have verified that it is
recognized by Windows, you can proceed to configure BitLocker. The applet,
shown in Figure 2.12, can be found through Control Panel | System and
Security | BitLocker Drive Encryption. As shown in the screenshot in Figure
2.12, you use this single applet to configure it on both fixed disks and
removable media. Please bear in mind that you need to be an administrator to
work with BitLocker on fixed disks and once you click on Turn On BitLocker,
you will need to confirm your permission to proceed through UAC. “Normal”
users can enable and disable BitLocker To Go on their removable media.
FIGURE 2.12. Selecting the Drive to Encrypt with BitLocker
The setup process takes care of everything. Once you click on Turn On BitLocker
or BitLocker To Go, it runs a check of your hardware and software to verify that
your system satisfies the requirements to enable BitLocker. If you are enabling
BitLocker in a hard disk drive, you will need to respond to the prompts that pop
up in any UAC windows. The system check is depicted in Figure 2.13.
If your hardware and software satisfies the system requirements for BitLocker,
you will be presented with the screen shown in Figure 2.14. To get to this
screen, the TPM has been discovered; if the TPM is not enabled, you will be
instructed to enable it and start the process again. Since the TPM needs to be
enabled in the BIOS, you will need to reboot before you restart the process.
Read less
Read full chapter
URL: https://www.sciencedirect.com/science/article/pii/B9781597495516000029
EFS
The ability to use EFS to encrypt data has been around since the release of
Windows 2000 (although it is notably absent from distributions such as
Windows XP Home Edition and Windows Vista Home Basic), and allows users
to easily apply encryption to select files and folders in a way that is more or less
transparent. During the encryption process, keys are generated that are tied to a
user's Windows username/password combination. The decryption of protected
data is seamlessly accomplished for the logged on user (because the correct
credentials were supplied when they logged onto Windows); however, anyone
outside of that user's authenticated session will be unable to view the underlying
data of an EFS-encrypted file.
Like with BitLocker, failing to recognize that files or folders are EFS-encrypted
prior to imaging evidence can have significant repercussions. The names of files
and folders encrypted with EFS are most often displayed as green in the
Windows Explorer interface, and seeing such “green names” on a live, running
machine can be the first clue that EFS-encrypted data exists (Figure 5.64).
Examiners can also choose to use tools such as efsinfo.exe (a part of the
Windows XP Service Pack 2 Support Tools) to identify EFS-encrypted data along
with the user account that is able to decrypt them as shown in Figure 5.65.
Figure 5.65. Identification of EFS-encrypted files using efsinfo.exe.
Read less
Read full chapter
URL: https://www.sciencedirect.com/science/article/pii/B9780123742674000057
Secure Client Deployment with Trusted Boot and
BitLocker
Thomas W. Shinder, ... Debra Littlejohn Shinder, in
Windows Server 2012 Security from End to Edge and Beyond, 2013
Troubleshooting
In How to Cheat at Microsoft Vista Administration, 2007
Recommended publications