Sie sind auf Seite 1von 22

Microsoft Virtual Academy

Module 10
Configuring Encryption and Advanced Auditing

Module Overview
Encrypting Drives by Using BitLocker
Encrypting Files by Using EFS
Configuring Advanced Auditing

Encrypting Drives by Using BitLocker

Lesson 1: Encrypting Drives by Using BitLocker


What is BitLocker?
How BitLocker Works
BitLocker Requirements
Configuring BitLocker
Using Group Policy to Manage BitLocker
Demonstration: Configuring BitLocker
Recovering Drives Encrypted with BitLocker

What is BitLocker?
BitLocker is full drive encryption that has the following
characteristics
BitLocker can be used to encrypt an entire hard drive or
only the used parts of a hard drive
BitLocker can be combined with EFS
BitLocker protects the integrity of the Windows boot
process
Some features of BitLocker are only usable when a Trusted
Platform Module (TPM) is available on the computer

How BitLocker Works


Advanced Encryption Standard (AES)
128-bit encryption key or 256-bit encryption key
Automated deployment with PowerShell for computers

already in production
New operating system deployments can utilize BitLocker
before the operating system files are written to the volume
Bitlocker encrypts entire hard drive
Only

used space encrypted (fastest)


All of hard drive encrypted (most secure for existing computers)

BitLocker Requirements
BitLocker is supported on
Windows Vista and newer Windows client operating systems
Windows Server 2008 and newer Windows server operating
systems
Windows XP supports the ability to read and copy data from

a portable hard drive encrypted with BitLocker To Go


A TPM offers additional features such as
System

integrity verification
Multifactor authentication

Configuring BitLocker
Enable TPM on the computer (optional)
Add the BitLocker Drive Encryption feature on the server
Configure Group Policy (or local Group Policy) for BitLocker

settings (required if the computer does not have a TPM


chip)
Turn on BitLocker on the desired volume(s)

Using Group Policy to Manage BitLocker


Group Policy offers approximately 40 settings to manage
and configure BitLocker.
Some common settings are:
Choose drive encryption method and cipher strength.
Deny write access to fixed data drives/removable drives
not protected by BitLocker.
Configure use of passwords for fixed data drives/removable
data drives.
Require additional authentication at startup.
Allow network unlock at startup.

Demonstration: Configuring BitLocker


In this demonstration, you will see how to configure

BitLocker Drive Encryption on a computer running Windows


Server 2012 R2.

Recovering Drives Encrypted with BitLocker


The best way to ensure recoverability is to plan properly

before deploying BitLocker


Recovery options include:
Using

the recovery key file to obtain the key.


Obtaining the recovery key from AD DS.
Using a DRA.
Using the original BitLocker password.

Encrypting Files by Using EFS

Lesson 2: Encrypting Files by Using EFS


What Is EFS?
How EFS Works
Recovering EFSEncrypted Files
Demonstration: Encrypting a File by Using EFS

What Is EFS?
EFS can encrypt files that are stored on an

NTFSformatted partition
EFS encryption acts as an additional layer of security
EFS can be used with no pre-configuration

How EFS Works


Symmetric encryption is used to protect the data
Public key encryption is used to protect the symmetric key

Symmetric
key

File Encryption

File Decryption
Private
key

FEK header

File

Encrypted
file
Publi
c
key

Symmetric
key

FEK header

Encrypte
d
file with
FEK
in
header

File
Symmetric key
Encrypted
file

Recovering EFSEncrypted Files


To ensure you can recover EFS encrypted files, you should:
Back up user certificates
Configure a recovery agent
You must back up the recovery key to:
Secure against system failure
Make the recovery key portable

Demonstration: Encrypting a File by Using EFS


In this demonstration, you will see how to:
Verify that a computer account supports EFS on a network share
Use EFS to encrypt a file on a network share
View the certificate used for encryption
Test access to an encrypted file

Configuring Advanced Auditing

Lesson 3: Configuring Advanced Auditing


Advanced Audit Policies
Demonstration: Configuring Advanced Auditing

Advanced Audit Policies


Windows Server 2012 and Windows Server 2008 R2 provide

an additional set of Advanced Audit Policies to configure

Demonstration: Configuring Advanced Auditing


In this demonstration, you will see how to create and edit a

Group Policy Object for Audit Policy configuration

Additional Resources & Next Steps

Instructor-Led
Courses
20411C: Administering

Windows Server 2012

Books

Exam Ref 70-411:


Administering Windows
Server 2012

Exams &
Certifications
Exam 70-411: Administering

Windows Server 2012

Das könnte Ihnen auch gefallen