IT tutorials
 
Windows
 

Windows Server 2008 : Choosing Data Security Solutions

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
12/1/2012 4:36:46 PM
One of the first steps in designing security for stored data is to choose the security that you will use to protect your data in various locations on your network. A number of data security features are available to protect data, and each available technology is designed to meet specific security needs. For example, BitLocker is designed to protect data on a disk that is stolen or on a computer that has been booted with a stealth operating system. Encrypting File System (EFS) provides a simple method to encrypt chosen files on a disk. Active Directory Rights Management Services (AD RMS) is used to secure files even if they leave your network.

Data protection features vary not only in their application but also in the cost and complexity of their adoption. In general, you need to review the features of each technology and then decide whether your security needs warrant the implementation of the technology in question. In general, the higher your needs to protect specific data, the higher the cost and complexity you should consider to meet your security requirements.


Protecting Volume Data with BitLocker

BitLocker is a data protection feature available in Windows Server 2008 that provides data encryption for full volumes and integrity checking for early boot components. The purpose of BitLocker is to protect data on a drive that has been stolen or that has been accessed offline in a way that bypasses file permissions (for example, by booting the computer from a stealth operating system).

BitLocker is designed primarily for use with a TPM, which is a hardware module included in many new laptops (as well as some desktops) that are available today. TPM modules must be version 1.2 for use with BitLocker. The TPM module is a permanent part of the motherboard.

If a TPM 1.2 module is not available, a computer can still take advantage of BitLocker’s encryption technology as long as the computer’s BIOS supports reading from a USB flash device (UFD) before the operating system is loaded. However, you cannot use BitLocker’s integrity checking capabilities without a TPM 1.2 module.


BitLocker Drive Encryption

In Windows Server 2008, BitLocker encrypts system volumes and data volumes. (In Windows Vista, BitLocker can encrypt only system volumes.) To encrypt the full volume, a cryptographic key known as the Full Volume Encryption Key (FVEK) is used. This key is stored in the volume metadata and is itself encrypted by another key known as the Volume Master Key (VMK). The VMK is then encrypted again by the TPM, if one is available, or by a startup key located on a user-provided UFD accessed during the startup phase.

BitLocker Performance Issues

Windows Server 2008 and Windows Vista encrypt and decrypt disk sectors on the fly as data is read from and written to encrypted volumes. As a result, BitLocker does affect performance because these cryptographic operations consume some processor time. However, the actual impact depends on multiple factors, such as caching, hard disk speed, and processor grade.


Choosing a BitLocker Authentication Mode

BitLocker supports four separate authentication modes. The mode you choose depends on the computer’s hardware capabilities and the level of security you desire for the computer:

  • BitLocker with a TPM only In this authentication mode, BitLocker uses only a TPM to unlock the VMK and enable a volume to be read. Advantages of this mode are that it requires no user intervention, that it protects the data from being read if the drive is stolen, and that it protects the drive against rootkits and other low-level malware. The disadvantage of this authentication mode is that it does not protect data from being read if the entire computer is stolen because the TPM is attached to the internals of the computer.

  • TPM with USB flash device In this mode, both a TPM and a UFD are required. To start the computer, a user must insert a UFD containing an external key. This effectively authenticates both the user and the integrity of the computer. The advantage of this method is that in principle it protects the data even if the entire computer is stolen (because a thief needs access to the UFD to read the data). The disadvantage is that it requires user intervention every time the computer is started.

  • TPM with PIN This authentication mode requires both a TPM and a user to provide a PIN every time the computer is started. The advantage of this method is that it protects the volume data if the entire computer is stolen and that it is often easier to provide a PIN than to provide a UFD during startup. The disadvantage of a PIN is that, although this mode is more secure than BitLocker with a TPM only, it is potentially less secure than providing a UFD on a TPM-supplied computer.

  • USB flash device only This is the only authentication mode that can be used on computers that do not have a TPM. In this mode the user during startup provides a UFD that includes an external key enabling encrypted volumes to be read. The advantage of this method is that it can be used on all computers with a BitLocker-compatible BIOS. The disadvantage of this method is that it does not provide data integrity checking.

BitLocker Security Design Considerations

Use the following list to help you determine whether to use BitLocker, which authentication mode to implement, and which type of operating system to use.

  • Only BitLocker allows you to encrypt all files on a volume, including the page file, hibernation file, registry, and temporary files. If you want to prevent these files from being read if a computer or drive is stolen, use BitLocker and not another encryption technology, such as EFS.

  • If you want to protect data stored on all volumes and not just the data on system volumes, you must use BitLocker on Windows Server 2008 and not on Windows Vista.

  • If you want BitLocker to detect changes to system data, such as those that might occur from malware or rootkit infection, you must use a system supplied with a TPM. You cannot choose the UFD only authentication method.

  • If you want to protect BitLocker with two-factor authentication, you must use a system supplied with a TPM. You can then use a UFD or PIN for authentication in addition to the TPM.


Planning for EFS

EFS is the file encryption technology built into Windows that is used optionally to encrypt files stored on NTFS volumes. When a user or program attempts to access a file that is encrypted with EFS, the operating system automatically attempts to acquire a decryption key for the content and, if successful, silently performs encryption and decryption on behalf of the user. When users do not have access to the encryption key, they are not able to open an encrypted file even if they have been assigned Read permissions to that file.

EFS relies on both symmetric and public key cryptography. To support public key cryptography, EFS uses certificates and key pairs. In a workgroup environment these certificates and keys are stored locally on each computer. However, in a domain environment the certificates can be issued by an enterprise certification authority (CA) and managed by Group Policy. With an enterprise CA, a domain user can read his or her encrypted files while logged on to any computer in the domain. In addition, when EFS is deployed with an enterprise CA, a domain user designated as a data recovery agent (DRA) can recover encrypted files stored in the domain.

In general, the advantage of EFS is that it provides a simple method to protect a file from being read on a disk even if that file is accessed offline. The biggest disadvantage of EFS is that it does not protect data sent over the wire or data copied to an alternate location. EFS can protect data only while it stays on an NTFS volume.

More Info: EFS fundamentals

For a complete introduction to EFS, see Windows Server 2008 Help.


When you are planning EFS policy for an organization, it is useful to determine the threats to your system, how EFS handles these threats, and whether to deploy a CA.

To properly plan for and implement EFS, follow these steps:

1.
Investigate EFS technology and capabilities.

2.
Assess the need for EFS in your environment.

3.
Investigate the configuration of EFS using Group Policy.

4.
Identify the computer systems and users that require EFS.

5.
Identify the level of protection that you require. For example, does your organization require using smart cards with EFS?

6.
Configure EFS as appropriate for your environment using Group Policy.

In addition, be sure to follow these EFS best practices:

  • Use Group Policy to ensure that the Documents or My Documents folder is encrypted for all users. This practice secures by default the data in which most documents are stored.

  • Instruct users to encrypt folders instead of individual files. Encrypting files consistently at the folder level ensures that files are not unexpectedly decrypted.

  • The private keys that are associated with recovery certificates are extremely sensitive. These keys must be generated either on a computer that is physically secured, or their certificates must be exported to a .pfx file, protected with a strong password, and saved on a disk that is stored in a physically secure location.

  • Recovery agent certificates must be assigned to special recovery agent accounts that are not used for any other purpose.

  • Do not destroy recovery certificates or private keys when recovery agents are changed. (Agents are changed periodically.) Keep them all, until all files that might have been encrypted with them are updated.

  • Designate two or more recovery agent accounts per organizational unit (OU), depending on the size of the OU. Designate two or more computers for recovery, one for each designated recovery agent account. Grant permissions to appropriate administrators to use the recovery agent accounts. It is a good idea to have two recovery agent accounts to provide redundancy for file recovery. Having two computers that hold these keys provides more redundancy to allow recovery of lost data.

  • Implement a recovery agent archive program to make sure that encrypted files can be recovered by using obsolete recovery keys. Recovery certificates and private keys must be exported and stored in a controlled and secure manner. Ideally, as with all secure data, archives must be stored in a controlled access vault and you must have two archives: a master and a backup. The master is kept on-site, while the backup is located in a secure off-site location.

  • Avoid using print spool files in your print server architecture, or make sure that print spool files are generated in an encrypted folder.

  • EFS does take some CPU overhead every time a user encrypts and decrypts a file. Plan your server usage wisely. Load balance your servers when there are many clients using EFS.


Using AD RMS

AD RMS is a technology that allows an organization to control access to, and usage of, confidential data. With an AD RMS–enabled application such as Office, you can create a usage policy to protect a file in the application by controlling rights to that file even when it is moved outside of the company network.

Whenever you choose to protect data by using AD RMS, users who later want to read the data must first be authenticated against the AD RMS server. This authentication can occur anywhere in the world as long as the AD RMS server is accessible over the network and as long as the user’s computer is running the AD RMS client, which is built into Windows Vista and Windows Server 2008.



AD RMS is installed as a server role and managed through the Active Directory Rights Management Services console, shown in Figure 1.

Figure 1. The Active Directory Rights Management Services console

AD RMS usage policies define three elements for protected files:

  • Trusted entities Organizations can specify the entities, including individuals, groups of users, computers, and applications, that are trusted participants in an AD RMS system. By establishing trusted entities, AD RMS can help protect information by enabling access only to properly trusted participants.

  • Usage rights and conditions Organizations and individuals can assign usage rights and conditions that define how a specific trusted entity can use rights-protected content. Examples of usage rights are permission to read, copy, print, save, forward, and edit. Usage rights can be accompanied by conditions, such as when those rights expire. Organizations can exclude applications and entities from accessing the rights-protected content.

  • Encryption AD RMS encrypts information, making access conditional on the successful validation of the trusted entities. When information is locked, only trusted entities that were granted usage rights under the specified conditions (if any) can unlock or decrypt the information in an AD RMS–enabled application or browser. The application will then enforce the defined usage rights and conditions.

Creating and Viewing Rights-Protected Information

To protect data with AD RMS, information workers simply follow the same workflow they already use for their information.

Figure 2 illustrates how AD RMS works when users publish and consume rights-protected information.

Figure 2. Workflow of creating and viewing rights-protected information


This process includes the following steps:

1.
When a user chooses the option to protect data in an AD RMS–enabled application for the first time, the author receives a client licensor certificate from the AD RMS server. This is a one-time step that enables offline publishing of rights-protected information in the future.

2.
Using an AD RMS–enabled application, an author creates a file and defines a set of usage rights and conditions for that file. A publishing license is then generated that contains the usage policies.

3.
The application encrypts the file with a symmetric key, which is then encrypted with the public key of the author’s AD RMS server. The key is inserted into the publishing license and the publishing license is bound to the file. Only the author’s AD RMS server can issue use licenses to decrypt this file.

4.
The author distributes the file.

5.
A recipient receives a protected file through a regular distribution channel and opens it using an AD RMS–enabled application or browser.

6.
If the recipient does not have an account certificate on the current computer, this is the point at which one will be issued.

7.
The application sends a request for a use license to the AD RMS server that issued the publishing license for the protected information. The request includes the recipient’s account certificate (which contains the recipient’s public key) and the publishing license (which contains the symmetric key that encrypted the file).

8.
The AD RMS licensing server validates that the recipient is authorized, checks that the recipient is a named user, and creates a use license.

9.
During this process, the server decrypts the symmetric key using the private key of the server, reencrypts the symmetric key using the public key of the recipient, and adds the encrypted session key to the use license. This step ensures that only the intended recipient can decrypt the symmetric key and thus decrypt the protected file. The server also adds any relevant conditions to the use license, such as the expiration or an application or operating system exclusion.

10.
When the validation is complete, the licensing server returns the use license to the recipient’s client computer.

11.
After receiving the use license, the application examines both the license and the recipient’s account certificate to determine whether any certificate in either chain of trust requires a revocation list. If so, the application checks for a local copy of the revocation list that has not expired. If necessary, it retrieves a current copy of the revocation list. The application then applies any revocation conditions that are relevant in the current context. If no revocation condition blocks access to the file, the application renders the data and the user may exercise the rights he or she has been granted.

This 11-step process is essentially the same whether the recipient is within the publishing organization or outside of it. The recipient is not required to be inside the author’s network or domain to request a use license. All that is required is a valid account certificate for the recipient and access to the licensing server that issued the publishing license.

AD RMS Applications

AD RMS–enabled applications are those that are specifically designed to encrypt and control usage of the information through AD RMS. AD RMS–enabled applications include the following:

  • Office System 2003 – Word, Excel, PowerPoint, Outlook

  • Office 2007 – Word, Excel, PowerPoint, Outlook, InfoPath

  • SharePoint Portal Server 2007

  • Exchange Server 2007

  • XPS (XML Paper Specification) v1.0

  • Internet Explorer 6.0 or later (through use of the RM Add-on for IE)

 
Others
 
- Windows Home Server 2011 : Using a Linux Client on Your Windows Home Server Network
- Windows Server 2008 Server Core : Scheduling and Managing Tasks (part 3) - Combining the AT Utility with Batch Files, Creating Script-Based Scheduler Activities
- Windows Server 2008 Server Core : Scheduling and Managing Tasks (part 2) - Working with the AT Utility, Working with the WMIC Job Alias
- Windows Server 2008 Server Core : Scheduling and Managing Tasks (part 1) - Managing Tasks with the SCHTasks Command
- Exploring Windows 8 Apps : Getting New Apps from the Windows Store (part 2) - Searching for an App, Installing an App
- Exploring Windows 8 Apps : Getting New Apps from the Windows Store (part 1) - Introducing the Windows Store
- Exploring Windows 8 Apps : Closing Apps
- Windows 7 Networking : Setting Up Your Connection (part 2) - Setting Up Your Home Network
- Windows 7 Networking : Setting Up Your Connection (part 1)
- Install Windows Vista (part 2) - Upgrade from a Previous Version, Set Up a Dual-Boot System
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us