Special Operations and IssuesIn addition to the basic EFS operations, there are additional operations that can extend its usefulness, protect the encrypted files, and make the EFS environment easier to work with. These operations are as follows:Changing encryption algorithmPlacing Encrypt and Decrypt on the Windows Explorer menuBacking up encrypted filesWorking with offline filesSharing encrypted filesProtecting password resetColoring encrypted file and folder names in Windows ExplorerUsing third-party EFS certificates Changing Encryption AlgorithmThe default encryption algorithm for EFS is different depending on the OS. If you require them to be the same, or if you must change them for some other reason, you can do so by following these steps: Placing Encrypt/Decrypt on the Windows Explorer MenuIf you want, you can put the ability to select file/folder encryption/decryption on the Windows Explorer menu. You must create the DWORD value EncryptionContextMenu at the following location and set it to 1:
Backing Up Encrypted FilesThe account used to back up or restore the encrypted files does not require special access and should not be given any. If the user has the right to back up a file, then he can back up the file if it is encrypted. Normal backup using NTBACKUP will back up encrypted files. When the files are restored to an NTFS partition, they are still encrypted and can only be decrypted by someone who has the private key associated with one of the public keys used to encrypt the FEK. If you attempt to restore a backed up encrypted file to a FAT volume, you will receive an error. Again, do not provide the user restoring the files any special access. Do not share the encrypted file with him. If you do, he will be able to decrypt the files. Working with Offline FilesOffline files is a Windows 2000 and above IntelliMirror management technology that allows users to store a local copy of files they access on a network share. When the client computer is disconnected from the network, the files are still available for the user to work with. In Windows 2000, these offline files cannot be encrypted. Windows Server 2003 introduces the ability to encrypt the offline files on Windows XP Professional and Windows Server 2003 systems. This feature is only available if the server-side files are accessed through a standard Windows share, the server message block (SMB) share. The Web Distributed and Versioning WebDAV protocol, which presents a different way of storing EFS encrypted files on a server, cannot be used. For more information on server-side storage of EFS-encrypted files, see the section "Remote Storage" later in this chapter.Because all offline files are stored in a common local database on the client machine, when offline files are encrypted, the entire database is encrypted using a local computer EFS certificate. Individual files or folders cannot be selected or deselected for encryption.To encrypt offline files:
Sharing Encrypted FilesWindows XP introduced the ability to share encrypted files. Once a file is encrypted, the encryptor of a file can provide access for other users by adding their EFS certificate to the file properties of the file. This is an interesting feature because it both adds security risk and provides some additional mitigation for file recovery issues. When you provide another user the ability to encrypt and decrypt files, he also has the ability to give other users this right. Thus, a sensitive file can quickly become exposed to many people. Each new encryptor can also add others to the list and can remove them. It is possible that one of these individuals may remove the original owner of the file's certificate and thus his ability to work with the file!For each file that requires sharing, the process must be repeated. Each added user means that another new encryption key (the FEK) is created and encrypted by the new user's public key and stored with the file.The estimated limit to the number of users who can be provided access to the same encrypted file via adding their certificate is 800. This is not due to some hard-coded stop but rather because there is only 256K of room in the file header for EFS metadata.There is currently no way to centrally manage who can encrypt or decrypt a specific encrypted file or to provide a printed list of who has the ability on what files. You can, of course, list the approved users by displaying file properties, and the Resource Kit utility efsinfo can be used to enumerate the certificates that have been used to encrypt a file.Only someone with the ability to encrypt and decrypt a file can share this ability with others. To share the file follow these steps:
If the computer is not joined to a domain, you can still share encrypted files. You simply must be able to provide a copy of the user's certificate when sharing the file. To do so, ask the user to export a copy of their certificate (without the private key) to a file and provide you with the file. During the sharing process, you can browse to the location of the file and import it. Password ResetTo prevent a rogue administrator from logging on to a standalone computer, changing the user password, and then logging on as the user to view his encrypted files, Windows XP and Windows Server 2003 disassociate the user's certificate and keys from the user account if the password is reset by the local administrator. (If the user uses the change password utility, this will not happen.) If the administrator resets the user's password and logs on as the user, she will not be able to decrypt the user's files. However, neither will the user. To return this ability to the legitimate user, the user can use her password reset disk made before the incident to return her password to the original. Then she can decrypt the files.Because users do forget their passwords, and the passwords thus need to be administratively reset, make sure users of standalone systems make themselves password reset disks and store them in a safe place. The password reset function cannot distinguish between a rogue administrator's play for power and a necessary password reset due to the user forgetting his password. It does, however, warn both types of administrators what will occur if the password is reset with the message shown in Figure 6-21. Figure 6-21. An attempt to reset the password results in a warning that the user may not be able to access files.![]() Coloring Encrypted Files and Folder Names in Windows ExplorerEncrypted files and folders are shown in green in Windows Server 2003 automatically. To turn on this feature for Windows XP clients or to turn it off for Windows Server 2003, follow these steps:
Use of Third-Party EFS CertificatesThird-party EFS certificates can be used with EFS. They must, however, meet stringent requirements. This list is an example of the items that must be checked before considering the use of third-party certificates. You should also test certificates and third-party certificate services such as enrollment to ensure compatibility.Two Key Usage extensions are required: Key Encipherment and Data Encipherment.The Enhanced Key Usage extension must contain the EFS identifier number 1.3.6.1.4.1.311.10.3.4.Certificates that do not contain a Certificate Revocation List Distribution Point (CDP) will not be validated (so they cannot be used).File Recovery Certificates must include the File Recovery identifier 1.3.6.1.4.1.311.10.3.4.1. To read more on the use of third-party certificates, see the Knowledge Base Article "Third Party Certification Authority Support for Encrypting File System" at http://support.microsoft.com/default.aspx?scid=kb%3Ben-us%3B273856. EFS and System RestoreOn a Windows XP Professional system, the System Restore function allows the return of system state to some previously recorded status. By default, System Restore monitors all disks but does not monitor redirected folders or data excluded from monitoring. System Restore has little effect on EFS-encrypted files, with two exceptions. First, if a system is restored to a point before a file was encrypted, then the file will not be encrypted after the restore. Also, if multiple users are enabled on the monitored file, after performing System Restore, you may find that only the original encryptor of the file can decrypt it. Discovering and Viewing the CertificateThe certificates used for encrypting the FEK, including the recovery agent certificate, can be viewed from the File Properties, Advanced, Details page. To see them, click the View certificate button. This can be a useful troubleshooting technique. When multiple recovery agents are or have been used, it may be difficult to recover a file until the recovery agent certificate can be viewed to determine which recovery agent's certificate was used. Once this is known, it can be used to decrypt the file. This information is available by viewing the certificate or by using the efsinfo.exe utility. |