How does a user get to be an efs recovery agent

Assignment Help Management Information Sys
Reference no: EM131715451

LAB : CONFIGURING FILE SERVICES AND DISK ENCRYPTION

Exercise 6.1 Encrypting Files with EFS

Overview

For files that are extremely sensitive, you can use EFS to encrypt the files. During this exercise, you encrypt a file using Encrypting File System (EFS), which is a built-in feature of NTFS.

Mindset

Encryption is a way to add an additional layer of security. If the laptop is stolen and the hard drive is put into another system where the thief or hacker is an administrator, the files could not be read without the proper key. If you want to encrypt individual documents, you can use Encrypting File System (EFS).

Exercise 6.2 Configuring the EFS Recovery Agent

Overview

During this exercise, you configure EFS Recovery Agents so that you can recover EFS encrypted files although the agent is not the owner of the file.

Mindset

When an employee leaves the company, that employee's files might be encrypted, which would be unreadable to anyone else. Using an EFS recovery agent, you will be able to recover those files and make them available to the user or users who have replaced the departed user.

Exercise 6.3 Backing Up and Restoring EFS Certificates

Overview

During this exercise, you backup an EFS certificate which you later restoreafter you delete the certificate.

Mindset

You have a standalone computer that failed and had to be rebuilt. On the computer, you had some files that were encrypted with EFS. Fortunately, you backed up the files from time to time to a removable drive. After you rebuilt the computer, you copied the files from the removable drive.

Although you are using the same username and password that you used before, you cannot open the files because they are encrypted. Unfortunately, there is not much you can do unless you have the EFS certificates with the correct keys to decipher the documents. Therefore, it is important that you always have a backup of the EFS certificates in case the system needs to be replaced.

Exercise 6.4 Encrypting a Volume with BitLocker

Overview

In this exercise, you create a new volume and then use BitLocker to encrypt the entire volume.

Mindset

EFS will encrypt only individual files; BitLocker can encrypt an entire volume. Therefore, if you want to encrypt an entire drive on a laptop, you can use BitLocker.

LAB REVIEW QUESTIONS

1. In Exercise 6.1, how do you enable EFS?

2. In Exercise 6.1, how do you allow other users to view an EFS file that you encrypted?

3. In Exercise 6.2, how does a user get to be an EFS Recovery Agent?

4. In Exercise 6.3, what format did you use when backing up the certificates, so that it can also store the private and public keys?

5. In Exercise 6.4, what did you use to encrypt an entire volume?

6. In Exercise 6.4, from where do you control BitLocker?

Lab Challenge Deploying Network Unlock

Overview

To complete this challenge, you will list the software components needed to implement Network Unlock and specify the server to which you would install the software component.

Mindset

You are an administrator for Contoso.com and you need to deploy Network Unlock on the Contoso network.

Reference no: EM131715451

Questions Cloud

What type of system does this company currently utilize : Discuss the accounting issues at hand. What type of system does this company currently utilize to estimate uncontrollable
Discuss the life-giving properties of blood : Discuss the life-giving properties of blood, and the symbolism with respect to atonement for sins-blood is a symbol of life given by God.
Design low fidelity mock-up prototypes for phone and kiosk : Determined technical and human interaction requirements for both kiosk and smart phone. Designed low fidelity mock-up prototypes for both the phone and kiosk.
Calculation of inventory at the lower of cost : Jassal Music Inc. is located in Edmonton, Alberta, and reports its financial information using IFRS. A calculation of inventory at the lower of cost
How does a user get to be an efs recovery agent : Create a new volume and then use BitLocker to encrypt the entire volume. How does a user get to be an EFS Recovery Agent?
Discuss accounting for ordinary or preference shares : Is there any difference between accounting for ordinary or preference shares
Responsible for global warming : Carbon dioxide is a greenhouse gas that is thought to be responsible for global warming. Using this information, explain why destruction of the Earth's rain
Discuss problem-economic report of the president : What kind of information can be found in the "Economic Report of the President?" Find a web site that contains the "Economic Report of the President".
Distinguish a heterozygous ptc genotype : 1. How do you distinguish a heterozygous PTC genotype (Tt) from the homozygous dominant (TT) genotype?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd