Ah - a remote location introduces real complications. Very understandable.

Kurt

On Tue, Sep 6, 2016 at 1:35 PM, Eric Wittersheim
<[email protected]> wrote:
> Kurt,
>
> Yeah, I tested Bitlocker on a laptop with a USB stick years ago.  Encrypting
> a server in a remote datacenter with a USB stick doesn't give me a warm
> fuzzy feeling.  Its an option though.  I have tested a Chrome GPO to force
> the default download directory to the encrypted folder and that seems to fit
> the bill.
>
> Eric
>
> On Tue, Sep 6, 2016 at 2:51 PM, Kurt Buff <[email protected]> wrote:
>>
>>
>> https://4sysops.com/archives/configure-and-enabling-bitlocker-on-windows-server/
>>
>> Don't necessarily need TPM - a USB stick should do
>>
>> Kurt
>>
>> On Tue, Sep 6, 2016 at 11:44 AM, Eric Wittersheim
>> <[email protected]> wrote:
>> > Kevin,
>> >
>> > We don't have a TPM on that server to use Bitlocker.
>> >
>> > Eric
>> >
>> > On Tue, Sep 6, 2016 at 12:40 PM, Kevin Lundy <[email protected]> wrote:
>> >>
>> >> Bitlocker and encrypt the entire volume(s)?
>> >>
>> >> On Tue, Sep 6, 2016 at 12:18 PM, Eric Wittersheim
>> >> <[email protected]> wrote:
>> >>>
>> >>> I have a project that is in a highly secured environment and is
>> >>> governed
>> >>> by our PCI policies.  The project will allow a user to log into a
>> >>> locked
>> >>> down Hyper V VM that is running Windows 2012 R2 server and open IE 11
>> >>> to
>> >>> download WAV files from a second Apache server on the local subnet.
>> >>> The
>> >>> download directory has been redirected to a folder that is encrypted
>> >>> using
>> >>> EFS so all files are encrypted as well.  Once the project time frame
>> >>> is
>> >>> complete the downloads are deleted with evidence provided that the
>> >>> files are
>> >>> removed.  We can't securely erase the hard drives because multiple
>> >>> projects
>> >>> will be running at the same time.  So it has been determined that a
>> >>> deleted
>> >>> file that was encrypted meets the security team requirements.
>> >>>
>> >>> What my main concern is the actual download process of the file.  I
>> >>> believe the file might be going to a temp folder in the users profile
>> >>> folder
>> >>> unencrypted before being copied over by the OS to the EFS encrypted
>> >>> folder.
>> >>> Thus leaving those unencrypted bits on the hard drive.  At this point
>> >>> I
>> >>> don't know of any way of getting around this problem.
>> >>>
>> >>> 1. Has anyone successfully used EFS on the users iNetCache (or IE temp
>> >>> directory)?
>> >>> 2. Does anyone have any ideas on how to do this differently?
>> >>>
>> >>>
>> >>> Thank you in advance for any pointers,
>> >>>
>> >>> Eric
>> >>>
>> >>>
>> >>>
>> >>
>> >>
>> >
>>
>>
>


Reply via email to