ISEC: Excellence in Engineering Encrypted File System Key Recovery Philip Noble (520) 538-7608 or DSN 879-7608, U.S. Army Information.

Slides:



Advertisements
Similar presentations
11/2/2013 2:02:38 AM 5864_ER_FED 1 Importing Certificates into Lotus Notes R6.
Advertisements

ISEC: Excellence in Engineering DoD PKI Automatic Key Recovery Philip Noble (520) or DSN , U.S. Army Information.
PERSONALLY IDENTIFIABLE INFORMATION (PII) BRIEFING
Setting up an E-XL A Step by Step Tutorial Engineering Consultants Group, Inc.
1 USING "ENCRYPTING FILE SYSTEM" TO PROTECT FILES AND FOLDERS IN "WINDOWS.."
Steps to Recover Private Encryption Keys
Welcome to Keyboarding Pro DELUXE ® Get Started Get Started Create Your Student Record Create Your Student Record The Main Menu The Main Menu Send Files.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
DoD PKI Automatic Key Recovery
Login to University Web Site Enter in to login in which click Institution login.
Lesson 13 PROTECTING AND SHARING DOCUMENTS
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Module 6 Windows 2000 Professional 6.1 Installation 6.2 Administration/User Interface 6.3 User Accounts 6.4 Managing the File System 6.5 Services.
DoD PKI Automatic Key Recovery
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 7: Advanced File System Management.
1 Chapter Overview Managing Compression Managing Disk Quotas Increasing Security with EFS Using Disk Defragmenter, Check Disk, and Disk Cleanup.
Private Encryption Keys
How to Install Windows 7.
1 Using Compressed Files and Folders Applications and operating systems read and write to compressed files. NTFS uncompresses the file before making it.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
Ch 9 Managing Active Directory User Accounts. Objectives Create Organizational Unit Creating User Accounts in Active Directory Disabling, Enabling, and.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
By: Van Lam Info Tech 2 Period 10/11 Mr. Holmes Quincy High School.
Configuring Task Scheduler Lesson 9. Skills Matrix Technology SkillObjective Domain SkillDomain # Understanding Task Scheduler Configure and manage the.
1 Chapter Overview Managing Data Storage Creating Dynamic Disks Implementing Storage Quotas Managing Compression and Encryption.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Digital Certificate Installation & User Guide For Class - 2 Certificates.
Excel Connector for JIRA Installation and functional presentation.
Troubleshoot Access, Authentication, and User Account Control Issues Lesson 8.
Security Directions - Release 6 and beyond SearchDomino.com Webcast Patricia Booth Security and Directory Product Management 9/25/02.
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
Week #7 Objectives: Secure Windows 7 Desktop
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 7: Advanced File System Management.
(n)Code Solutions Exporting Digital Certificate. Internet Explorer 5.5 & Above Versions (With 128 bit Cipher Strength)
A+ Guide to Software Managing, Maintaining and Troubleshooting THIRD EDITION Chapter 8 Managing and Supporting Windows XP.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
1 Enterprise How to access your from the web.
Excel Connector for JIRA Installation and functional presentation.
Protecting and Sharing Documents Lesson 13. Objectives.
1 Part-1 Chap 5 Configuring Accounts Definitions.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Security Planning and Administrative Delegation Lesson 6.
Generating Data for Assignment 9. Macro security policies Excel contains a programming language called Visual Basic for Applications that can be used.
Microsoft ® Office ® 2010 Office 2010 Security: Protecting your files.
XP New Perspectives on Microsoft Office FrontPage 2003 Tutorial 7 1 Microsoft Office FrontPage 2003 Tutorial 8 – Integrating a Database with a FrontPage.
ISEC: Excellence in Engineering DoD PKI Automatic Key Recovery Adam Simmons (520) , DSN , or ,
Managing Applications, Services, Folders, and Libraries Lesson 4.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
PCI-DSS: Guidelines & Procedures When Working With Sensitive Data.
Module 11: Managing Data Storage. Overview Managing File Compression Configuring File Encryption Configuring EFS Recovery Agents Implementing Disk Quotas.
IOAP Setup and Maintenance of Assessment Laptop. Introduction In order to have smooth functioning of laptops during ion assessments, a few setup activities.
IOAP Setup and Maintenance of Assessment Laptop. Introduction In order to have smooth functioning of laptops during ion assessments, a few setup activities.
IOAP Setup and Maintenance of Assessment Laptop. Introduction In order to have smooth functioning of laptops during ion assessments, a few setup activities.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
ISEC: Excellence in Engineering DoD PKI Automatic Key Recovery (520) or Coml , Fort Huachuca,
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
For more information on Rouge, visit:
Mesa Wi-Fi 802.1x PEAP and EAP-TLS Authentication for Wi-Fi.
Configuring Encryption and Advanced Auditing
DoD PKI Automatic Key Recovery
New Perspectives on Microsoft Windows 10
Information Protection & Cyber Security
Introduction to Computers
How To Fix Outlook Integration Error? This is a message which appears when users are trying to click on the message to display the details. So, it is.
forgot laptop password Windows 10 with no reset disk
DoD PKI Automatic Key Recovery
How To Password Protect A PDF Free With or Without Acrobat.
Presentation transcript:

ISEC: Excellence in Engineering Encrypted File System Key Recovery Philip Noble (520) or DSN , U.S. Army Information Systems Engineering Command Fort Huachuca, AZ Jul 11

ISEC: Excellence in Engineering The introduction of Microsofts Encrypted File System has been a boon to file- level security within the DoD. If a laptop is lost, critical data such as HIPAA or PII is not readily recoverable by the finder provided the sensitive data was previously encrypted with either EFS or Bit Locker. Certain versions of the current Army operating system appear to be configured to require the use of the users Common Access Card (CAC) to encrypt the symmetrical session key that physically encrypts the users files. When the user has to get a new CAC, they discover that the files are no longer accessible. Even after the users old Encryption key is recovered, the user cannot recover the encrypted files because the user cannot use a software private key because of security settings. The Problem:

ISEC: Excellence in Engineering The following slides identify the procedure to enable the use of a software key to recover encrypted files. The Solution: The solution is to either: Install the software private key on a hardware token Request the responsible Key Recovery Agent decrypt the symmetrical key for the user Change the security settings to allow the use of a software private key. The simplest choice is to permit the use of a Software private Key

ISEC: Excellence in Engineering us/library/cc749610(WS.10).aspx Microsoft Technet discusses the Group Policy Object that controls the use of hardware and software keys for EFS. Use the Group Policy Management Console (gpedit.msc) or the Local Group Policy Editor (secpol.msc) to configure the EFS options. To view or change the options, expand the Public Key Policies node, right-click Encrypting File System, and then click Properties. The Policy in question is: Require a smart card for EFS - If enabled, software certificates cannot be used for EFS. Set this policy to disabled for use of a soft certificate to recover an EFS file system. Software EFS Recovery

ISEC: Excellence in Engineering Additional Notes: 1. After the setting is applied, the user may need to run "gpupdate.exe /force" or reboot the platform to inherit the new configuration. 2. The setting should only be temporarily modified for recovery purposes and then reset to require smart cards. 3. There is also a known issue with some versions of the enpasflt.dll and the import of the soft recovery certs. Software EFS Recovery

ISEC: Excellence in Engineering Software EFS Recovery To open encrypted files stored on a system partition after re-installing the operating system, follow the steps below to re-install your original certificate and key. Save the recovered Encryption key from the DISA ARA website Open Certificate Manager by clicking the Start button, typing certmgr.msc into the Search box, and then pressing ENTER. Click the Personal folder. Click the Action menu, point to All Tasks, and then click Import. This opens the Certificate Import wizard. Click Next. Type the location of the file that contains the certificate, or click Browse and navigate to the file's location, and then click Next. If you have navigated to the right location but don't see the certificate you are importing, then, in the list next to the File name box, click Personal Information Exchange. Type the password, select the Mark this key as exportable check box, and then click Next. Note Do not enable strong private key protection. Click Place all certificates in the following store, confirm that the Personal store is indicated, click Next, and then click Finish. After you import the certificate, shut down and restart your computer (not a reboot), you should have access to the encrypted files.

ISEC: Excellence in Engineering POC for Additional Information Philip E. Noble USAISEC Information Assurance and Security Engineering Directorate (IASED) DSN CML FAX DSN CML