| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: EFS Best practices |
From: "Rich"
This is a multi-part message in MIME format.
------=_NextPart_000_018B_01C4B631.674FC3F0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
See =
http://www.microsoft.com/resources/documentation/Windows/XP/all/reskit/en=
-us/Default.asp?url=3D/resources/documentation/windows/xp/all/reskit/en-u=
s/prnb_efs_kcef.asp, =
http://www.microsoft.com/smallbusiness/gtm/securityguidance/articles/prot=
ect_data_efs.mspx, and =
http://www.microsoft.com/technet/prodtechnol/winxppro/deploy/cryptfs.mspx=
.
Rich
"Mike N." wrote in message =
news:4kian0tsqlcisuurtek0invfsetcupneun{at}4ax.com...
Here are some questions I have on using Encrypting File System in an
environment-
Standalone XP SP2 workstation (laptop) with the goal of protecting
confidential data in EFS files from a sophisticated cracker in the =
event
the laptop is stolen.
Set security policies to prevent use of LophCrack 5 on login password =
or
SAM file:
- Do not store LAN manager hash value.
- LANman auth level : NTLMV2 only=20
Prevent single DES attacks on files-
- Use FIPS compliant algorithms for encryption: Enable
- Shutdown: Clear virtual memory pagefile: Enabled
Create a recovery agent so that encrypted files on tapes created by
NTBackup can be unencrypted. Export recovery certificate to external
safekeeping and delete it from the machine. (Are files backed up by
NTBackup encrypted or plain text?)
I'm assuming that the primary EFS certificate residing on the =
machine in
the certificate store is not a security risk. Without the login it =
will
be protected at least as securely as the EFS files themselves.
A cracker could grab all filenames (not important in this case).
Anything else I should look for?
Thanks,
Mike
------=_NextPart_000_018B_01C4B631.674FC3F0
Content-Type: text/html;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
See http://www.microsoft.com/resources/documentation/Windows/XP/all/r=
eskit/en-us/Default.asp?url=3D/resources/documentation/windows/xp/all/res=
kit/en-us/prnb_efs_kcef.asp">http://www.microsoft.com/resources/documenta=
tion/Windows/XP/all/reskit/en-us/Default.asp?url=3D/resources/documentati=
on/windows/xp/all/reskit/en-us/prnb_efs_kcef.asp,=20
http://www.microsoft.com/smallbusiness/gtm/securityguidance/artic=
les/protect_data_efs.mspx">http://www.microsoft.com/smallbusiness/gtm/sec=
urityguidance/articles/protect_data_efs.mspx,=20
and http://www.microsoft.com/technet/prodtechnol/winxppro/deploy/cryp=
tfs.mspx">http://www.microsoft.com/technet/prodtechnol/winxppro/deploy/cr=
yptfs.mspx.
Rich
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)SEEN-BY: 633/267 270 5030/786 @PATH: 379/45 1 396/45 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.