Current version of Bitlocker is better but I kind of see your point on remote 
datacenter.

Jon Harris

-----Original Message-----
From: [email protected] [mailto:[email protected]] On 
Behalf Of Eric Wittersheim
Sent: Tuesday, September 6, 2016 4:35 PM
To: [email protected]
Subject: Re: [NTSysADM] EFS and Temporary files

Kurt, 

Yeah, I tested Bitlocker on a laptop with a USB stick years ago.  Encrypting a 
server in a remote datacenter with a USB stick doesn't give me a warm fuzzy 
feeling.  Its an option though.  I have tested a Chrome GPO to force the 
default download directory to the encrypted folder and that seems to fit the 
bill.  

Eric

On Tue, Sep 6, 2016 at 2:51 PM, Kurt Buff <[email protected]> wrote:


        
https://4sysops.com/archives/configure-and-enabling-bitlocker-on-windows-server/
 
<https://4sysops.com/archives/configure-and-enabling-bitlocker-on-windows-server/>
 
        
        Don't necessarily need TPM - a USB stick should do
        
        Kurt
        

        On Tue, Sep 6, 2016 at 11:44 AM, Eric Wittersheim
        <[email protected]> wrote:
        > Kevin,
        >
        > We don't have a TPM on that server to use Bitlocker.
        >
        > Eric
        >
        > On Tue, Sep 6, 2016 at 12:40 PM, Kevin Lundy <[email protected]> wrote:
        >>
        >> Bitlocker and encrypt the entire volume(s)?
        >>
        >> On Tue, Sep 6, 2016 at 12:18 PM, Eric Wittersheim
        >> <[email protected]> wrote:
        >>>
        >>> I have a project that is in a highly secured environment and is 
governed
        >>> by our PCI policies.  The project will allow a user to log into a 
locked
        >>> down Hyper V VM that is running Windows 2012 R2 server and open IE 
11 to
        >>> download WAV files from a second Apache server on the local subnet. 
 The
        >>> download directory has been redirected to a folder that is 
encrypted using
        >>> EFS so all files are encrypted as well.  Once the project time 
frame is
        >>> complete the downloads are deleted with evidence provided that the 
files are
        >>> removed.  We can't securely erase the hard drives because multiple 
projects
        >>> will be running at the same time.  So it has been determined that a 
deleted
        >>> file that was encrypted meets the security team requirements.
        >>>
        >>> What my main concern is the actual download process of the file.  I
        >>> believe the file might be going to a temp folder in the users 
profile folder
        >>> unencrypted before being copied over by the OS to the EFS encrypted 
folder.
        >>> Thus leaving those unencrypted bits on the hard drive.  At this 
point I
        >>> don't know of any way of getting around this problem.
        >>>
        >>> 1. Has anyone successfully used EFS on the users iNetCache (or IE 
temp
        >>> directory)?
        >>> 2. Does anyone have any ideas on how to do this differently?
        >>>
        >>>
        >>> Thank you in advance for any pointers,
        >>>
        >>> Eric
        >>>
        >>>
        >>>
        >>
        >>
        >
        
        
        





Reply via email to