Kevin,

We don't have a TPM on that server to use Bitlocker.

Eric

On Tue, Sep 6, 2016 at 12:40 PM, Kevin Lundy <[email protected]> wrote:

> Bitlocker and encrypt the entire volume(s)?
>
> On Tue, Sep 6, 2016 at 12:18 PM, Eric Wittersheim <
> [email protected]> wrote:
>
>> I have a project that is in a highly secured environment and is governed
>> by our PCI policies.  The project will allow a user to log into a locked
>> down Hyper V VM that is running Windows 2012 R2 server and open IE 11 to
>> download WAV files from a second Apache server on the local subnet.  The
>> download directory has been redirected to a folder that is encrypted using
>> EFS so all files are encrypted as well.  Once the project time frame is
>> complete the downloads are deleted with evidence provided that the files
>> are removed.  We can't securely erase the hard drives because multiple
>> projects will be running at the same time.  So it has been determined that
>> a deleted file that was encrypted meets the security team requirements.
>>
>> What my main concern is the actual download process of the file.  I
>> believe the file might be going to a temp folder in the users profile
>> folder unencrypted before being copied over by the OS to the EFS encrypted
>> folder.  Thus leaving those unencrypted bits on the hard drive.  At this
>> point I don't know of any way of getting around this problem.
>>
>> 1. Has anyone successfully used EFS on the users iNetCache (or IE temp
>> directory)?
>> 2. Does anyone have any ideas on how to do this differently?
>>
>>
>> Thank you in advance for any pointers,
>>
>> Eric
>>
>>
>>
>>
>
>

Reply via email to