Professional Windows Server 1002003 Security A Technical Reference [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Professional Windows Server 1002003 Security A Technical Reference [Electronic resources] - نسخه متنی

Roberta Bragg

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید







Tools


Tools available for working with EFS-encrypted files include cipher and esfinfo.

Cipher


The following statement is the syntax of the command. Table 6-2 explains the switches.

cipher [{/e | /d}] [/s:foldername] [/a] [/i] [/f] [/q] [/h] [/k] [/u[/n]] [{pathname[...]]
| /r:pathnamenoextension | /w:pathname | /x[:pathname] pathnamenoextension}]

Table 6-2. EFS Differences

Switch

Description

/e

Encrypts folders. Cipher cannot encrypt files that are marked as read-only, or those that are marked as system files.

/d

Decrypts folders.

/s:foldername

Operates on this folder and all its subfolders. Multiple folders can be specified using wildcard characters.

/a

Operates on files and directories.

/i

Continues even if errors occur; for example, if cipher has a problem decrypting a specific file in the specified folder, it will continue decrypting the rest of the files. By default, an error halts its operation, and this switch overrides that behavior.

/f

Forces encryption or decryption of all objects. By default, cipher would skip those files that have already been encrypted or decrypted.

/q

Provides minimal reporting.

/h

Displays files with hidden or system attributes. (These files are not encrypted or decrypted by default.)

/k

Obtains a new file encryption key for the user running cipher. (All other operations are ignored.)

/u

If the user's file encryption keys or the keys of the recovery agent have been changed, updates all encrypted files (can only be used with the /n switch).

/n

Used with the /u switch, will not update keys. Instead, it will find all of the encrypted files on local drives. (It can only be used with the /n switch.)

/r:pathname noextension

A new recovery agent certificate and private key are generated and then written to the files specified in pathnamenoextension (cipher ignores all other options).

/w:pathname

Removes data remnants on unused portions of a volume. (All other options are ignored.) Use this switch if files have been encrypted after being written to the disk.

/x:pathname pathnameno extension

Will find and identify certificates and private keys used by EFS for the logged on user and back them up to a file. When pathname is given, only the certificate used to encrypt the files at that location is backed up. If pathname is not given, the user's current EFS certificate and keys is backed up. Keys are written to a filename specified by pathnamenoextension and are given the extension .pfx. (All other options are ignored.)

/?

Displays help.

Example uses of the cipher command are as follows:

To back up certificates and keys to a file called efskeys:


cipher/x c:\efskeys

To encrypt the reports folder and all subfolders:


cipher /e /s:reports

To encrypt a single file, in this case the JanuarySales.doc in the Midwest\Sales folder:


cipher/e /a Midwest\Sales\JanuarySales.doc

To determine which files in the JanuarySales folder are encrypted:


cipher monthlyreports\may\*

To remove data remnants in the D volume:


cipher /w


Cipher /w does not lock the drive. Other programs can still operate and thus may prevent cipher from erasing portions of the drive. For this reason, stop these programs and do not use the drive until cipher has completed this task. Cipher /w can take a long time to complete. Do not use cipher /w unless it is necessary.

Esfinfo


Efsinfo.exe is a command-line tool available in the Windows Server 2003 Support Tools and the Windows XP Professional and Windows 2000 Resource Kits. It can be used to display the encrypted files in a folder and list the certificates used to encrypt a file. You can also download esfinfo from http://www.microsoft.com/windows2000/techinfo/reskit/tools/default.asp.


/ 194