ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Solved supporting an office of computers with full drive encryption

    IT Discussion
    17
    166
    16.9k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • travisdh1T
      travisdh1
      last edited by

      The only downside is someone having to enter a password every time a computer boots up. It's possible they've got hardware keys of some sort, in which case keeping the matching hardware together is the key. Worst case imo, they're using hardware keys built into the motherboard (hope they've got good backups!)

      1 Reply Last reply Reply Quote 0
      • Mike DavisM
        Mike Davis
        last edited by

        so a remote reboot is a no go since you would need to be onsite to put the password in?

        travisdh1T scottalanmillerS DustinB3403D 3 Replies Last reply Reply Quote 0
        • travisdh1T
          travisdh1 @Mike Davis
          last edited by

          @Mike-Davis said in supporting an office of computers with full drive encryption:

          so a remote reboot is a no go since you would need to be onsite to put the password in?

          That's a real possibility, yes.

          My preferred method would be to use something like a Yubikey or some sort of removable hardware key. That way remote reboots aren't an issue.

          scottalanmillerS 1 Reply Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller @Mike Davis
            last edited by

            @Mike-Davis said in supporting an office of computers with full drive encryption:

            Does anyone support an office of computers that are using full drive encryption? I'm considering a client that has this requirement (I don't know if they are currently meeting the requirement.) and was wondering how much extra time might be consumed by supporting that.

            An enormous amount unless you manage to get them to ensure that they will deal with all of that.

            1 Reply Last reply Reply Quote 1
            • scottalanmillerS
              scottalanmiller @Mike Davis
              last edited by

              @Mike-Davis said in supporting an office of computers with full drive encryption:

              so a remote reboot is a no go since you would need to be onsite to put the password in?

              Of course, if you don't need a password, what would encrypted even mean if nothing was encrypted?

              1 Reply Last reply Reply Quote 1
              • scottalanmillerS
                scottalanmiller @travisdh1
                last edited by

                @travisdh1 said in supporting an office of computers with full drive encryption:

                @Mike-Davis said in supporting an office of computers with full drive encryption:

                so a remote reboot is a no go since you would need to be onsite to put the password in?

                That's a real possibility, yes.

                My preferred method would be to use something like a Yubikey or some sort of removable hardware key. That way remote reboots aren't an issue.

                Although that arguably is not encrypted. If you were to test that encryption locally, you'd find it to be.... not encrypted.

                travisdh1T 1 Reply Last reply Reply Quote 1
                • travisdh1T
                  travisdh1 @scottalanmiller
                  last edited by

                  @scottalanmiller said in supporting an office of computers with full drive encryption:

                  @travisdh1 said in supporting an office of computers with full drive encryption:

                  @Mike-Davis said in supporting an office of computers with full drive encryption:

                  so a remote reboot is a no go since you would need to be onsite to put the password in?

                  That's a real possibility, yes.

                  My preferred method would be to use something like a Yubikey or some sort of removable hardware key. That way remote reboots aren't an issue.

                  Although that arguably is not encrypted. If you were to test that encryption locally, you'd find it to be.... not encrypted.

                  You're going to have that problem no matter what tho. Once booted, what does it even matter?

                  scottalanmillerS 1 Reply Last reply Reply Quote 1
                  • DustinB3403D
                    DustinB3403 @Mike Davis
                    last edited by

                    @Mike-Davis said in supporting an office of computers with full drive encryption:

                    so a remote reboot is a no go since you would need to be onsite to put the password in?

                    Or out of band management on the user system . .

                    1 Reply Last reply Reply Quote 1
                    • scottalanmillerS
                      scottalanmiller @travisdh1
                      last edited by

                      @travisdh1 said in supporting an office of computers with full drive encryption:

                      @scottalanmiller said in supporting an office of computers with full drive encryption:

                      @travisdh1 said in supporting an office of computers with full drive encryption:

                      @Mike-Davis said in supporting an office of computers with full drive encryption:

                      so a remote reboot is a no go since you would need to be onsite to put the password in?

                      That's a real possibility, yes.

                      My preferred method would be to use something like a Yubikey or some sort of removable hardware key. That way remote reboots aren't an issue.

                      Although that arguably is not encrypted. If you were to test that encryption locally, you'd find it to be.... not encrypted.

                      You're going to have that problem no matter what tho. Once booted, what does it even matter?

                      We aren't talking about "once booted", we are talking about "if someone steals the device, will they find the data encrypted." Is it even considered encrypted at rest if it decrypts transparently?

                      travisdh1T MattSpellerM 2 Replies Last reply Reply Quote 3
                      • travisdh1T
                        travisdh1 @scottalanmiller
                        last edited by

                        @scottalanmiller said in supporting an office of computers with full drive encryption:

                        @travisdh1 said in supporting an office of computers with full drive encryption:

                        @scottalanmiller said in supporting an office of computers with full drive encryption:

                        @travisdh1 said in supporting an office of computers with full drive encryption:

                        @Mike-Davis said in supporting an office of computers with full drive encryption:

                        so a remote reboot is a no go since you would need to be onsite to put the password in?

                        That's a real possibility, yes.

                        My preferred method would be to use something like a Yubikey or some sort of removable hardware key. That way remote reboots aren't an issue.

                        Although that arguably is not encrypted. If you were to test that encryption locally, you'd find it to be.... not encrypted.

                        You're going to have that problem no matter what tho. Once booted, what does it even matter?

                        We aren't talking about "once booted", we are talking about "if someone steals the device, will they find the data encrypted." Is it even considered encrypted at rest if it decrypts transparently?

                        True. You'd have to remove the hardware key every time you moved away from the computer/device. Uck. Yeah, no good solution.

                        scottalanmillerS 1 Reply Last reply Reply Quote 1
                        • black3dynamiteB
                          black3dynamite
                          last edited by

                          Wouldn't Windows Updates be difficult too? Most of the time you need a restart to finish configuring the updates.

                          scottalanmillerS 1 Reply Last reply Reply Quote 1
                          • stacksofplatesS
                            stacksofplates
                            last edited by

                            We do on one set of our machines. It's a pain to type the LUKS password in every time, esp since there is literally no data on the workstations. Everything is automounted.

                            1 Reply Last reply Reply Quote 0
                            • MattSpellerM
                              MattSpeller @scottalanmiller
                              last edited by MattSpeller

                              @scottalanmiller said in supporting an office of computers with full drive encryption:

                              @travisdh1 said in supporting an office of computers with full drive encryption:

                              @scottalanmiller said in supporting an office of computers with full drive encryption:

                              @travisdh1 said in supporting an office of computers with full drive encryption:

                              @Mike-Davis said in supporting an office of computers with full drive encryption:

                              so a remote reboot is a no go since you would need to be onsite to put the password in?

                              That's a real possibility, yes.

                              My preferred method would be to use something like a Yubikey or some sort of removable hardware key. That way remote reboots aren't an issue.

                              Although that arguably is not encrypted. If you were to test that encryption locally, you'd find it to be.... not encrypted.

                              You're going to have that problem no matter what tho. Once booted, what does it even matter?

                              We aren't talking about "once booted", we are talking about "if someone steals the device, will they find the data encrypted." Is it even considered encrypted at rest if it decrypts transparently?

                              My recent audit agrees with Scott and we are moving to something like bitlocker with Sophos management.

                              Sigh. Watching this thread with great interest

                              scottalanmillerS stacksofplatesS 2 Replies Last reply Reply Quote 2
                              • travisdh1T
                                travisdh1
                                last edited by

                                Turn the workstations into disk-less thin clients maybe?

                                MattSpellerM scottalanmillerS 2 Replies Last reply Reply Quote 0
                                • MattSpellerM
                                  MattSpeller @travisdh1
                                  last edited by

                                  @travisdh1 said in supporting an office of computers with full drive encryption:

                                  Turn the workstations into disk-less thin clients maybe?

                                  Cutting off your nose to spite your face? 😛

                                  1 Reply Last reply Reply Quote 0
                                  • scottalanmillerS
                                    scottalanmiller @travisdh1
                                    last edited by

                                    @travisdh1 said in supporting an office of computers with full drive encryption:

                                    @scottalanmiller said in supporting an office of computers with full drive encryption:

                                    @travisdh1 said in supporting an office of computers with full drive encryption:

                                    @scottalanmiller said in supporting an office of computers with full drive encryption:

                                    @travisdh1 said in supporting an office of computers with full drive encryption:

                                    @Mike-Davis said in supporting an office of computers with full drive encryption:

                                    so a remote reboot is a no go since you would need to be onsite to put the password in?

                                    That's a real possibility, yes.

                                    My preferred method would be to use something like a Yubikey or some sort of removable hardware key. That way remote reboots aren't an issue.

                                    Although that arguably is not encrypted. If you were to test that encryption locally, you'd find it to be.... not encrypted.

                                    You're going to have that problem no matter what tho. Once booted, what does it even matter?

                                    We aren't talking about "once booted", we are talking about "if someone steals the device, will they find the data encrypted." Is it even considered encrypted at rest if it decrypts transparently?

                                    True. You'd have to remove the hardware key every time you moved away from the computer/device. Uck. Yeah, no good solution.

                                    Yeah, if it was on a keychain around your neck and replaced a password in that way, sure that would be fine in many cases.

                                    1 Reply Last reply Reply Quote 0
                                    • scottalanmillerS
                                      scottalanmiller @black3dynamite
                                      last edited by

                                      @black3dynamite said in supporting an office of computers with full drive encryption:

                                      Wouldn't Windows Updates be difficult too? Most of the time you need a restart to finish configuring the updates.

                                      Yes, which is why essentially no one does full disk in the real world. It's a silly thing and absolutely nothing actually requires it. People say that, but no regulation does.

                                      stacksofplatesS 1 Reply Last reply Reply Quote 0
                                      • scottalanmillerS
                                        scottalanmiller @MattSpeller
                                        last edited by

                                        @MattSpeller said in supporting an office of computers with full drive encryption:

                                        @scottalanmiller said in supporting an office of computers with full drive encryption:

                                        @travisdh1 said in supporting an office of computers with full drive encryption:

                                        @scottalanmiller said in supporting an office of computers with full drive encryption:

                                        @travisdh1 said in supporting an office of computers with full drive encryption:

                                        @Mike-Davis said in supporting an office of computers with full drive encryption:

                                        so a remote reboot is a no go since you would need to be onsite to put the password in?

                                        That's a real possibility, yes.

                                        My preferred method would be to use something like a Yubikey or some sort of removable hardware key. That way remote reboots aren't an issue.

                                        Although that arguably is not encrypted. If you were to test that encryption locally, you'd find it to be.... not encrypted.

                                        You're going to have that problem no matter what tho. Once booted, what does it even matter?

                                        We aren't talking about "once booted", we are talking about "if someone steals the device, will they find the data encrypted." Is it even considered encrypted at rest if it decrypts transparently?

                                        My recent audit agrees with Scott and we are moving to something like bitlocker with Sophos management.

                                        Sigh. Watching this thread with great interest

                                        Well I have been a security consultant 🙂

                                        1 Reply Last reply Reply Quote 0
                                        • scottalanmillerS
                                          scottalanmiller @travisdh1
                                          last edited by

                                          @travisdh1 said in supporting an office of computers with full drive encryption:

                                          Turn the workstations into disk-less thin clients maybe?

                                          This is actually more viable than it sounds. Of course there are products like Jentu that sound like they do this but when pushed, appear to not really exist. We tried, a lot, to get this shown to us in person and once it was clear we weren't going to accept a remote video but needed to actually see the product... they ran away and never responded to us again. Even their internal staff admitted they'd only seen prepped demos and had never seen the product.

                                          That being said, if you use a simple tool like Aclouda (they have some hardware on display here at VeeamOn in fact) in your desktop and a SAN, especially one with gobs of cache like Starwind (also here at VeeamOn) you can make a thin client that might actually be faster than normal disk as nearly everything gets served out of a RAM cache.

                                          1 Reply Last reply Reply Quote 2
                                          • stacksofplatesS
                                            stacksofplates @scottalanmiller
                                            last edited by

                                            @scottalanmiller said in supporting an office of computers with full drive encryption:

                                            @black3dynamite said in supporting an office of computers with full drive encryption:

                                            Wouldn't Windows Updates be difficult too? Most of the time you need a restart to finish configuring the updates.

                                            Yes, which is why essentially no one does full disk in the real world. It's a silly thing and absolutely nothing actually requires it. People say that, but no regulation does.

                                            We are. The govt can assert whatever requirements they want depending on "how they read it". It's nuts.

                                            1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 5
                                            • 8
                                            • 9
                                            • 1 / 9
                                            • First post
                                              Last post