05.03.2013 Views

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

10-50 Chapter 10 Managing Data Storage<br />

EFS is configured either from Windows Explorer or from the command line. It can be<br />

enabled or disabled for a computer, domain, or organizational unit (OU) by resetting<br />

recovery policy in the Group Policy console in Microsoft Management Console (MMC).<br />

You can use EFS to encrypt and decrypt files on remote file servers but not to encrypt<br />

data that is transferred over the network. Windows XP Professional provides network<br />

protocols, such as Secure Sockets Layer (SSL) authentication, to encrypt data over the<br />

network.<br />

Table 10-4 lists the key features provided by Windows XP Professional EFS.<br />

Table 10-4 EFS Features<br />

Feature Description<br />

Transparent encryption In EFS, file encryption does not require the file owner to decrypt and<br />

re-encrypt the file on each use. Decryption and encryption happen<br />

transparently on file reads and writes to disk.<br />

Strong protection of<br />

encryption keys<br />

Integral data-recovery<br />

system<br />

Secure temporary and<br />

paging files<br />

Public key encryption resists all but the most sophisticated methods of<br />

attack. Therefore, in EFS, the file encryption keys are encrypted by<br />

using a public key from the user’s certificate. (Note that Windows XP<br />

Professional and Windows 2000 use X.509 v3 certificates.) The list of<br />

encrypted file encryption keys is stored with the encrypted file and is<br />

unique to it. To decrypt the file encryption keys, the file owner supplies<br />

a private key, which only he or she has.<br />

If the owner’s private key is unavailable, the recovery agent can open<br />

the file using his or her own private key. There can be more than one<br />

recovery agent, each with a different public key, but at least one public<br />

recovery key must be present on the system to encrypt a file.<br />

Many applications create temporary files while you edit a document,<br />

and these temporary files can be left unencrypted on the disk. On<br />

computers running Windows XP Professional, EFS can be implemented<br />

at the folder level, so any temporary copies of an encrypted<br />

file are also encrypted, provided that all files are on NTFS volumes.<br />

EFS resides in the Windows operating system kernel and uses the<br />

nonpaged pool to store file encryption keys, ensuring that they are<br />

never copied to the paging file.<br />

Security Alert Even when you encrypt files, an intruder who accesses your computer can<br />

access those files if your user account is still logged on to the computer. Be sure to lock your<br />

console when you are not using the computer, or configure a screensaver to require a password<br />

when the computer is activated. If the computer is configured to go to standby mode<br />

when it is idle, you should require a password to bring the computer out of standby. These<br />

precautions are particularly important on portable computers, which people are more likely to<br />

leave unattended while the user is logged on.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!