Overview of How to Configure Encryption
What Is EFS?
EFS encrypted file may work Stored on NTFS partition format. By default, this option is available to all users. You can also use EFS to encrypt files file Share.
After a file is encrypted using EFS It is accessed only by authorized users. If a the user is authorized, access to the file Transparent and open as possible Unencrypted file. If unauthorized users,
Try to open the file will result in access Denied message.
EFS encryption acts as an additional In addition to the security layer NTFS permissions. If the user is granted permission to read files on NTFS, they It must still be authorized to decrypt the file by EFS.
The default configuration of EFS requires no management. Users can start encryption File immediately, if people do EFS automatically generates a key pair user certificate that it does not yet exist. Use a certificate authority (CA) that issued your user certificate enhances manageability Certificate.
You can disable EFS on client computers by using Group Policy. In the Properties of the policy, navigate to Computer Configuration\Policies\Windows Settings\Security Settings\Public Key Polices\Encrypting Files System and then click Don’t allow.
How EFS Works EFS uses a combination of public key And symmetric key encryption to protect files From attack. EFS uses symmetric key Encrypted file, and a public key to protect Symmetric key.
Symmetric key encryption uses the same Key to encrypt and decrypt files. Birthday Encryption is the ratio of the public faster, stronger Key encryption. Because it is difficult to ensure across a network with a symmetric key
Transmission, it requires extra security. Symmetric key encryption is a typical way of Encrypt the large amounts of data.
EFS uses public key encryption technology to protect the symmetric key needed to decrypt the file Content. Each user certificate contains a private key and a public key encryption Symmetric key. Only with the certificate and private key, the user can decrypt the symmetric key.
Overview of How to Configure Encryption
Reviewed by Unknown
on
7:18 PM
Rating:
No comments: