Microsoft Virtual Academy Module 10 Configuring Encryption and

  • Slides: 22
Download presentation
Microsoft Virtual Academy ® Module 10 Configuring Encryption and Advanced Auditing

Microsoft Virtual Academy ® Module 10 Configuring Encryption and Advanced Auditing

Module Overview • Encrypting Drives by Using Bit. Locker • Encrypting Files by Using

Module Overview • Encrypting Drives by Using Bit. Locker • Encrypting Files by Using EFS • Configuring Advanced Auditing

Encrypting Drives by Using Bit. Locker

Encrypting Drives by Using Bit. Locker

Lesson 1: Encrypting Drives by Using Bit. Locker • What is Bit. Locker? •

Lesson 1: Encrypting Drives by Using Bit. Locker • What is Bit. Locker? • How Bit. Locker Works • Bit. Locker Requirements • Configuring Bit. Locker • Using Group Policy to Manage Bit. Locker • Demonstration: Configuring Bit. Locker • Recovering Drives Encrypted with Bit. Locker

What is Bit. Locker? Bit. Locker is full drive encryption that has the following

What is Bit. Locker? Bit. Locker is full drive encryption that has the following characteristics • Bit. Locker can be used to encrypt an entire hard drive or only the used parts of a hard drive • Bit. Locker can be combined with EFS • Bit. Locker protects the integrity of the Windows boot process • Some features of Bit. Locker are only usable when a Trusted Platform Module (TPM) is available on the computer

How Bit. Locker Works • Advanced Encryption Standard (AES) • 128 -bit encryption key

How Bit. Locker Works • Advanced Encryption Standard (AES) • 128 -bit encryption key or 256 -bit encryption key • Automated deployment with Power. Shell for computers already in production • New operating system deployments can utilize Bit. Locker before the operating system files are written to the volume • Bitlocker encrypts entire hard drive • Only used space encrypted (fastest) • All of hard drive encrypted (most secure for existing computers)

Bit. Locker Requirements • Bit. Locker is supported on • Windows Vista and newer

Bit. Locker Requirements • Bit. Locker is supported on • Windows Vista and newer Windows client operating systems • Windows Server 2008 and newer Windows server operating systems • Windows XP supports the ability to read and copy data from a portable hard drive encrypted with Bit. Locker To Go • A TPM offers additional features such as • System integrity verification • Multifactor authentication

Configuring Bit. Locker • Enable TPM on the computer (optional) • Add the Bit.

Configuring Bit. Locker • Enable TPM on the computer (optional) • Add the Bit. Locker Drive Encryption feature on the server • Configure Group Policy (or local Group Policy) for Bit. Locker settings (required if the computer does not have a TPM chip) • Turn on Bit. Locker on the desired volume(s)

Using Group Policy to Manage Bit. Locker Group Policy offers approximately 40 settings to

Using Group Policy to Manage Bit. Locker Group Policy offers approximately 40 settings to manage and configure Bit. Locker. Some common settings are: • Choose drive encryption method and cipher strength. • Deny write access to fixed data drives/removable drives not protected by Bit. Locker. • Configure use of passwords for fixed data drives/removable data drives. • Require additional authentication at startup. • Allow network unlock at startup.

Demonstration: Configuring Bit. Locker • In this demonstration, you will see how to configure

Demonstration: Configuring Bit. Locker • In this demonstration, you will see how to configure Bit. Locker Drive Encryption on a computer running Windows Server 2012 R 2.

Recovering Drives Encrypted with Bit. Locker • The best way to ensure recoverability is

Recovering Drives Encrypted with Bit. Locker • The best way to ensure recoverability is to plan properly before deploying Bit. Locker • Recovery options include: • Using the recovery key file to obtain the key. • Obtaining the recovery key from AD DS. • Using a DRA. • Using the original Bit. Locker password.

Encrypting Files by Using EFS

Encrypting Files by Using EFS

Lesson 2: Encrypting Files by Using EFS • What Is EFS? • How EFS

Lesson 2: Encrypting Files by Using EFS • What Is EFS? • How EFS Works • Recovering EFS–Encrypted Files • Demonstration: Encrypting a File by Using EFS

What Is EFS? • EFS can encrypt files that are stored on an NTFS–formatted

What Is EFS? • EFS can encrypt files that are stored on an NTFS–formatted partition • EFS encryption acts as an additional layer of security • EFS can be used with no pre-configuration

How EFS Works • Symmetric encryption is used to protect the data • Public

How EFS Works • Symmetric encryption is used to protect the data • Public key encryption is used to protect the symmetric key Symmetric key File Encryption File Decryption Private key FEK header File Encrypted file Public key Symmetric key FEK header Encrypted file with FEK in header File Symmetric key Encrypted file

Recovering EFS–Encrypted Files • To ensure you can recover EFS encrypted files, you should:

Recovering EFS–Encrypted Files • To ensure you can recover EFS encrypted files, you should: • Back up user certificates • Configure a recovery agent • You must back up the recovery key to: • Secure against system failure • Make the recovery key portable

Demonstration: Encrypting a File by Using EFS • In this demonstration, you will see

Demonstration: Encrypting a File by Using EFS • In this demonstration, you will see how to: • Verify that a computer account supports EFS on a network share • Use EFS to encrypt a file on a network share • View the certificate used for encryption • Test access to an encrypted file

Configuring Advanced Auditing

Configuring Advanced Auditing

Lesson 3: Configuring Advanced Auditing • Advanced Audit Policies • Demonstration: Configuring Advanced Auditing

Lesson 3: Configuring Advanced Auditing • Advanced Audit Policies • Demonstration: Configuring Advanced Auditing

Advanced Audit Policies • Windows Server 2012 and Windows Server 2008 R 2 provide

Advanced Audit Policies • Windows Server 2012 and Windows Server 2008 R 2 provide an additional set of Advanced Audit Policies to configure

Demonstration: Configuring Advanced Auditing • In this demonstration, you will see how to create

Demonstration: Configuring Advanced Auditing • In this demonstration, you will see how to create and edit a Group Policy Object for Audit Policy configuration

Additional Resources & Next Steps Instructor-Led Courses • 20411 C: Administering Windows Server 2012

Additional Resources & Next Steps Instructor-Led Courses • 20411 C: Administering Windows Server 2012 Books • Exam Ref 70 -411: Administering Windows Server 2012 Exams & Certifications • Exam 70 -411: Administering Windows Server 2012