ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Solved supporting an office of computers with full drive encryption

    IT Discussion
    17
    166
    16.8k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • BRRABillB
      BRRABill @scottalanmiller
      last edited by

      @scottalanmiller said

      The apps are of little concern, but you can encrypt them too. Some apps, not MS ones, might be vulnerabilities and write to the application space instead of user space. IE should not, not since XP. So it isn't included in any concern that was outlined above.

      You always argue from the world where you have total perfect control over everything.

      Most of us do not work in this same world, and have to support all manner of things.

      Is it right? Should we quit and work for a place that values "pure IT" ... sure, but I bet more companies do weird stuff and use weird apps that might write to the C drive than not.

      scottalanmillerS 2 Replies Last reply Reply Quote 2
      • scottalanmillerS
        scottalanmiller @Dashrender
        last edited by

        @Dashrender said in supporting an office of computers with full drive encryption:

        @scottalanmiller said in supporting an office of computers with full drive encryption:

        the files written to the disk are encrypted (or not written at all.)

        OK I think I see what Scott is writing here. IE has a setting:
        https://i.imgur.com/audFdVc.png

        This will prevent encrypted pages from being saved to disk.

        But my question to @scottalanmiller is - What about confidential information that is viewed over a non encrypted connection?

        Is there a way to make IE, and all other software, not write temp files to the drive at all? And of course, I never saw any discussion at all about the page file, which as far as I know can only be encrypted when using full disk encryption.

        Not that I know of, but you can make sure that it only writes to the encrypted user drive.

        DashrenderD 1 Reply Last reply Reply Quote 0
        • scottalanmillerS
          scottalanmiller @Dashrender
          last edited by

          @Dashrender said in supporting an office of computers with full drive encryption:

          @scottalanmiller said in supporting an office of computers with full drive encryption:

          @Mike-Davis said in supporting an office of computers with full drive encryption:

          The requirement is that temporary files from using the web based software are not left unencrypted. In the suggestion that the 😄 drive is not encrypted so that OS patches can happen I don't think that will work. If the user can launch IE without decrypting the secure drive, it fails the requirement

          Why? Does IE store local files in a shared space? That sounds very unlikely. You've tested that?

          Of course IE stores it's temp files in the user's profile - but why do you think that is not on the 😄 Drive?

          Because that was the fundamental basis for this line of discussion. Put the user's directories on an encrypted D drive, keep C only for the OS. That's the very thing we are discussing.

          1 Reply Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller @Dashrender
            last edited by

            @Dashrender said in supporting an office of computers with full drive encryption:

            If you redirect the profile to the D : drive (good luck actually getting that to fully work) how do you propose unlocking the d : drive? You can't unlock the D : until you get into the OS, but you can't get into the OS until you get access to the profile location, so we have a chicken or the egg problem.

            That's actually part of the benefit. That part isn't the issue. We are only doing this so that C can run updates even when no one is logged in. So that chicken and egg problem alone isn't a problem unless the OS can't run, either.

            DashrenderD 1 Reply Last reply Reply Quote 0
            • DashrenderD
              Dashrender @scottalanmiller
              last edited by

              @scottalanmiller said in supporting an office of computers with full drive encryption:

              @Dashrender said in supporting an office of computers with full drive encryption:

              @scottalanmiller said in supporting an office of computers with full drive encryption:

              the files written to the disk are encrypted (or not written at all.)

              OK I think I see what Scott is writing here. IE has a setting:
              https://i.imgur.com/audFdVc.png

              This will prevent encrypted pages from being saved to disk.

              But my question to @scottalanmiller is - What about confidential information that is viewed over a non encrypted connection?

              Is there a way to make IE, and all other software, not write temp files to the drive at all? And of course, I never saw any discussion at all about the page file, which as far as I know can only be encrypted when using full disk encryption.

              Not that I know of, but you can make sure that it only writes to the encrypted user drive.

              how?

              scottalanmillerS 1 Reply Last reply Reply Quote 0
              • scottalanmillerS
                scottalanmiller @Dashrender
                last edited by

                @Dashrender said in supporting an office of computers with full drive encryption:

                If you redirect the profile to the D : drive (good luck actually getting that to fully work) ....

                Weren't you just arguing that you trust MS more than me 😉

                DashrenderD 2 Replies Last reply Reply Quote 0
                • scottalanmillerS
                  scottalanmiller @NerdyDad
                  last edited by

                  @NerdyDad said in supporting an office of computers with full drive encryption:

                  @Dashrender said in supporting an office of computers with full drive encryption:

                  @NerdyDad said in supporting an office of computers with full drive encryption:

                  @Dashrender said in supporting an office of computers with full drive encryption:

                  @NerdyDad said in supporting an office of computers with full drive encryption:

                  Coming into the conversation late here.

                  I have a full enterprise where most, if not all, of my laptops are bitlockered before they are deployed. Security keys are stored in the TPM for boot decryption. I also hold the kyes to the encryption on an IT controlled drive.

                  There is also a boot up password that must be entered by the user when the boot the computer up from cold. If they are rebooted, the startup password is bypassed automatically by the bios/uefi.

                  I've never played with Bitlocker. I was unaware that if you had a TPM that you could required a boot time password still - is that password used to unlock the TPM? How do you manage that password? What if a user forgets their TPM password?

                  The boot time password has nothing to do with the TPM or bitlocker but is more of a BIOS/UEFI setting to allow access to the hard drive to boot. You could do the same thing to a computer that is totally un-bitlockered.

                  Huh - so you've added yet another level of complexity. How do you manage these? Do all users have a different BIOS/UEFI password? Do the BIOS/UEFI allow for both a user level password (for disk booting) and an admin level one in case the user forgets their BIOS/UEFI password?

                  Also - so Bitlocker/TPM doesn't have an option for a password requirement?

                  You mentioned that the BIOS/UEFI does not require the password if the system is rebooted. Does this mean only when Windows is properly rebooted? or that a password is only not required when the system isn't coming from a powered off state?
                  What about sleep/hibernation? Is a password required then to get past the BIOS/UEFI?

                  Yes, we did add another level of complexity that was not necessary but something the boss wanted. The boot password is a password convention that the user and IT knows, but something that anybody outside of the company would not/should not know. It should be something fairly easy for them to remember because they have to use it everyday for them to use their computers anyways. No, its not their Windows password either.

                  The TPM stores the key for bitlocker to begin decryption in order to boot the system.

                  Lenovo systems detects when Windows is being properly rebooted and does not request the boot up password. We have not yet tested sleep/hibernation as that junk typically has never worked for me in Windows. I've not had a problem with hibernation/sleep in Qubes.

                  What's really funny is that you have the crazy mix of "require encryption" but "trust Lenovo." That makes no sense. Especially as the UEFI being malicious being one of the issues with Lenovo!

                  NerdyDadN 1 Reply Last reply Reply Quote 0
                  • scottalanmillerS
                    scottalanmiller @BRRABill
                    last edited by

                    @BRRABill said in supporting an office of computers with full drive encryption:

                    @scottalanmiller said

                    The apps are of little concern, but you can encrypt them too. Some apps, not MS ones, might be vulnerabilities and write to the application space instead of user space. IE should not, not since XP. So it isn't included in any concern that was outlined above.

                    You always argue from the world where you have total perfect control over everything.

                    Most of us do not work in this same world, and have to support all manner of things.

                    I'm speaking to "whoever is the IT manager." Or to "whoever is going to advise them." In those cases, they always have control.

                    1 Reply Last reply Reply Quote 0
                    • DashrenderD
                      Dashrender @scottalanmiller
                      last edited by

                      @scottalanmiller said in supporting an office of computers with full drive encryption:

                      @Dashrender said in supporting an office of computers with full drive encryption:

                      If you redirect the profile to the D : drive (good luck actually getting that to fully work) how do you propose unlocking the d : drive? You can't unlock the D : until you get into the OS, but you can't get into the OS until you get access to the profile location, so we have a chicken or the egg problem.

                      That's actually part of the benefit. That part isn't the issue. We are only doing this so that C can run updates even when no one is logged in. So that chicken and egg problem alone isn't a problem unless the OS can't run, either.

                      There is still a chicken/egg problem because the user will never be able to log into the computer.

                      Computer boots, user tried to logon, profile is on encrypted drive, which is still encrypted can can't be unencrypted until after the user logs on. So logon fails because the logon service can't reach the user's profile.

                      Unless you're saying you know of some process that will decrypt the encrypted volume on the fly during and based upon the user's logon?

                      1 Reply Last reply Reply Quote 0
                      • DashrenderD
                        Dashrender @scottalanmiller
                        last edited by

                        @scottalanmiller said in supporting an office of computers with full drive encryption:

                        @Dashrender said in supporting an office of computers with full drive encryption:

                        If you redirect the profile to the D : drive (good luck actually getting that to fully work) ....

                        Weren't you just arguing that you trust MS more than me 😉

                        No, if anything, I was arguing that I I trust them the same as you.

                        1 Reply Last reply Reply Quote 0
                        • scottalanmillerS
                          scottalanmiller @BRRABill
                          last edited by

                          @BRRABill said in supporting an office of computers with full drive encryption:

                          Is it right? Should we quit and work for a place that values "pure IT" ... sure, but I bet more companies do weird stuff and use weird apps that might write to the C drive than not.

                          So you are saying that you think that it's acceptable to have known security design problems with apps exposing user data, but then encrypt them to ignore that there are more fundamental security issues?

                          What software do you think people have that is doing this? Any why would a shop that claims to be super concerned about security choose to deploy them?

                          You say that I look at the world from an ideal standpoint, but I'm just looking at it from a logical one. Logically, if you care about security you care, and if you don't, you don't. The encryption is just a farce in your logic and IT isn't there to do a good job, just to cover up stuff.

                          1 Reply Last reply Reply Quote 0
                          • DashrenderD
                            Dashrender @scottalanmiller
                            last edited by

                            @scottalanmiller said in supporting an office of computers with full drive encryption:

                            @Dashrender said in supporting an office of computers with full drive encryption:

                            If you redirect the profile to the D : drive (good luck actually getting that to fully work) ....

                            Weren't you just arguing that you trust MS more than me 😉

                            Now you've lost me though - profile redirection causes all kinds of problems. Can you make it work, yes. Is it easy ? Heck no. My own personal experience also says it's not that stable either, but I'm willing to take the blame on that bit if needed.

                            scottalanmillerS 1 Reply Last reply Reply Quote 0
                            • scottalanmillerS
                              scottalanmiller @Dashrender
                              last edited by

                              @Dashrender said in supporting an office of computers with full drive encryption:

                              @scottalanmiller said in supporting an office of computers with full drive encryption:

                              @Dashrender said in supporting an office of computers with full drive encryption:

                              @scottalanmiller said in supporting an office of computers with full drive encryption:

                              the files written to the disk are encrypted (or not written at all.)

                              OK I think I see what Scott is writing here. IE has a setting:
                              https://i.imgur.com/audFdVc.png

                              This will prevent encrypted pages from being saved to disk.

                              But my question to @scottalanmiller is - What about confidential information that is viewed over a non encrypted connection?

                              Is there a way to make IE, and all other software, not write temp files to the drive at all? And of course, I never saw any discussion at all about the page file, which as far as I know can only be encrypted when using full disk encryption.

                              Not that I know of, but you can make sure that it only writes to the encrypted user drive.

                              how?

                              By putting the user's directories on D... the thing we are discussing.

                              Not trusting Windows is a different matter. If you feel Windows simply can't be trusted, the only answer is really to leave Windows.

                              DashrenderD 1 Reply Last reply Reply Quote 0
                              • scottalanmillerS
                                scottalanmiller @Dashrender
                                last edited by

                                @Dashrender said in supporting an office of computers with full drive encryption:

                                @scottalanmiller said in supporting an office of computers with full drive encryption:

                                @Dashrender said in supporting an office of computers with full drive encryption:

                                If you redirect the profile to the D : drive (good luck actually getting that to fully work) ....

                                Weren't you just arguing that you trust MS more than me 😉

                                Now you've lost me though - profile redirection causes all kinds of problems. Can you make it work, yes. Is it easy ? Heck no. My own personal experience also says it's not that stable either, but I'm willing to take the blame on that bit if needed.

                                https://support.microsoft.com/en-us/help/949977/relocation-of-the-users-directory-and-the-programdata-directory-to-a-drive-other-than-the-drive-that-contains-the-windows-directory

                                It's amazing how much the simplest tasks are major issues on Windows 😞

                                DashrenderD 1 Reply Last reply Reply Quote 0
                                • DashrenderD
                                  Dashrender @scottalanmiller
                                  last edited by

                                  @scottalanmiller said in supporting an office of computers with full drive encryption:

                                  @Dashrender said in supporting an office of computers with full drive encryption:

                                  @scottalanmiller said in supporting an office of computers with full drive encryption:

                                  @Dashrender said in supporting an office of computers with full drive encryption:

                                  @scottalanmiller said in supporting an office of computers with full drive encryption:

                                  the files written to the disk are encrypted (or not written at all.)

                                  OK I think I see what Scott is writing here. IE has a setting:
                                  https://i.imgur.com/audFdVc.png

                                  This will prevent encrypted pages from being saved to disk.

                                  But my question to @scottalanmiller is - What about confidential information that is viewed over a non encrypted connection?

                                  Is there a way to make IE, and all other software, not write temp files to the drive at all? And of course, I never saw any discussion at all about the page file, which as far as I know can only be encrypted when using full disk encryption.

                                  Not that I know of, but you can make sure that it only writes to the encrypted user drive.

                                  how?

                                  By putting the user's directories on D... the thing we are discussing.

                                  Not trusting Windows is a different matter. If you feel Windows simply can't be trusted, the only answer is really to leave Windows.

                                  I do trust Windows, let's just assume that they aren't doing anything wrong. I still don't know how you access an encrypted location during logon so that Windows can load the profile. How are you accomplishing this?

                                  scottalanmillerS 1 Reply Last reply Reply Quote 0
                                  • NerdyDadN
                                    NerdyDad @scottalanmiller
                                    last edited by

                                    @scottalanmiller said in supporting an office of computers with full drive encryption:

                                    @NerdyDad said in supporting an office of computers with full drive encryption:

                                    @Dashrender said in supporting an office of computers with full drive encryption:

                                    @NerdyDad said in supporting an office of computers with full drive encryption:

                                    @Dashrender said in supporting an office of computers with full drive encryption:

                                    @NerdyDad said in supporting an office of computers with full drive encryption:

                                    Coming into the conversation late here.

                                    I have a full enterprise where most, if not all, of my laptops are bitlockered before they are deployed. Security keys are stored in the TPM for boot decryption. I also hold the kyes to the encryption on an IT controlled drive.

                                    There is also a boot up password that must be entered by the user when the boot the computer up from cold. If they are rebooted, the startup password is bypassed automatically by the bios/uefi.

                                    I've never played with Bitlocker. I was unaware that if you had a TPM that you could required a boot time password still - is that password used to unlock the TPM? How do you manage that password? What if a user forgets their TPM password?

                                    The boot time password has nothing to do with the TPM or bitlocker but is more of a BIOS/UEFI setting to allow access to the hard drive to boot. You could do the same thing to a computer that is totally un-bitlockered.

                                    Huh - so you've added yet another level of complexity. How do you manage these? Do all users have a different BIOS/UEFI password? Do the BIOS/UEFI allow for both a user level password (for disk booting) and an admin level one in case the user forgets their BIOS/UEFI password?

                                    Also - so Bitlocker/TPM doesn't have an option for a password requirement?

                                    You mentioned that the BIOS/UEFI does not require the password if the system is rebooted. Does this mean only when Windows is properly rebooted? or that a password is only not required when the system isn't coming from a powered off state?
                                    What about sleep/hibernation? Is a password required then to get past the BIOS/UEFI?

                                    Yes, we did add another level of complexity that was not necessary but something the boss wanted. The boot password is a password convention that the user and IT knows, but something that anybody outside of the company would not/should not know. It should be something fairly easy for them to remember because they have to use it everyday for them to use their computers anyways. No, its not their Windows password either.

                                    The TPM stores the key for bitlocker to begin decryption in order to boot the system.

                                    Lenovo systems detects when Windows is being properly rebooted and does not request the boot up password. We have not yet tested sleep/hibernation as that junk typically has never worked for me in Windows. I've not had a problem with hibernation/sleep in Qubes.

                                    What's really funny is that you have the crazy mix of "require encryption" but "trust Lenovo." That makes no sense. Especially as the UEFI being malicious being one of the issues with Lenovo!

                                    Don't get me wrong. I don't trust Lenovo. In fact, we're doing the slow migration away from Lenovo to Dell. That's just the practice that we have right now.

                                    1 Reply Last reply Reply Quote 0
                                    • DashrenderD
                                      Dashrender @scottalanmiller
                                      last edited by

                                      @scottalanmiller said in supporting an office of computers with full drive encryption:

                                      @Dashrender said in supporting an office of computers with full drive encryption:

                                      @scottalanmiller said in supporting an office of computers with full drive encryption:

                                      @Dashrender said in supporting an office of computers with full drive encryption:

                                      If you redirect the profile to the D : drive (good luck actually getting that to fully work) ....

                                      Weren't you just arguing that you trust MS more than me 😉

                                      Now you've lost me though - profile redirection causes all kinds of problems. Can you make it work, yes. Is it easy ? Heck no. My own personal experience also says it's not that stable either, but I'm willing to take the blame on that bit if needed.

                                      https://support.microsoft.com/en-us/help/949977/relocation-of-the-users-directory-and-the-programdata-directory-to-a-drive-other-than-the-drive-that-contains-the-windows-directory

                                      It's amazing how much the simplest tasks are major issues on Windows 😞

                                      Sadly, this is more based upon the shit software companies write, and less on MS. The crap software makes hard calls to anticipated locations. this is not MS's fault.

                                      scottalanmillerS 1 Reply Last reply Reply Quote 0
                                      • scottalanmillerS
                                        scottalanmiller @Dashrender
                                        last edited by

                                        @Dashrender said in supporting an office of computers with full drive encryption:

                                        @scottalanmiller said in supporting an office of computers with full drive encryption:

                                        @Dashrender said in supporting an office of computers with full drive encryption:

                                        @scottalanmiller said in supporting an office of computers with full drive encryption:

                                        @Dashrender said in supporting an office of computers with full drive encryption:

                                        @scottalanmiller said in supporting an office of computers with full drive encryption:

                                        the files written to the disk are encrypted (or not written at all.)

                                        OK I think I see what Scott is writing here. IE has a setting:
                                        https://i.imgur.com/audFdVc.png

                                        This will prevent encrypted pages from being saved to disk.

                                        But my question to @scottalanmiller is - What about confidential information that is viewed over a non encrypted connection?

                                        Is there a way to make IE, and all other software, not write temp files to the drive at all? And of course, I never saw any discussion at all about the page file, which as far as I know can only be encrypted when using full disk encryption.

                                        Not that I know of, but you can make sure that it only writes to the encrypted user drive.

                                        how?

                                        By putting the user's directories on D... the thing we are discussing.

                                        Not trusting Windows is a different matter. If you feel Windows simply can't be trusted, the only answer is really to leave Windows.

                                        I do trust Windows, let's just assume that they aren't doing anything wrong. I still don't know how you access an encrypted location during logon so that Windows can load the profile. How are you accomplishing this?

                                        You don't, you decrypt it before logging in. No matter what you do, encryption comes out to be a pain.

                                        DashrenderD 1 Reply Last reply Reply Quote 0
                                        • DashrenderD
                                          Dashrender @scottalanmiller
                                          last edited by

                                          @scottalanmiller said in supporting an office of computers with full drive encryption:

                                          @Dashrender said in supporting an office of computers with full drive encryption:

                                          @scottalanmiller said in supporting an office of computers with full drive encryption:

                                          @Dashrender said in supporting an office of computers with full drive encryption:

                                          @scottalanmiller said in supporting an office of computers with full drive encryption:

                                          @Dashrender said in supporting an office of computers with full drive encryption:

                                          @scottalanmiller said in supporting an office of computers with full drive encryption:

                                          the files written to the disk are encrypted (or not written at all.)

                                          OK I think I see what Scott is writing here. IE has a setting:
                                          https://i.imgur.com/audFdVc.png

                                          This will prevent encrypted pages from being saved to disk.

                                          But my question to @scottalanmiller is - What about confidential information that is viewed over a non encrypted connection?

                                          Is there a way to make IE, and all other software, not write temp files to the drive at all? And of course, I never saw any discussion at all about the page file, which as far as I know can only be encrypted when using full disk encryption.

                                          Not that I know of, but you can make sure that it only writes to the encrypted user drive.

                                          how?

                                          By putting the user's directories on D... the thing we are discussing.

                                          Not trusting Windows is a different matter. If you feel Windows simply can't be trusted, the only answer is really to leave Windows.

                                          I do trust Windows, let's just assume that they aren't doing anything wrong. I still don't know how you access an encrypted location during logon so that Windows can load the profile. How are you accomplishing this?

                                          You don't, you decrypt it before logging in. No matter what you do, encryption comes out to be a pain.

                                          HOW? How are you decrypting before logon? This is what Mike wants to know.

                                          NerdyDadN scottalanmillerS 2 Replies Last reply Reply Quote 0
                                          • scottalanmillerS
                                            scottalanmiller @Dashrender
                                            last edited by

                                            @Dashrender said in supporting an office of computers with full drive encryption:

                                            @scottalanmiller said in supporting an office of computers with full drive encryption:

                                            @Dashrender said in supporting an office of computers with full drive encryption:

                                            @scottalanmiller said in supporting an office of computers with full drive encryption:

                                            @Dashrender said in supporting an office of computers with full drive encryption:

                                            If you redirect the profile to the D : drive (good luck actually getting that to fully work) ....

                                            Weren't you just arguing that you trust MS more than me 😉

                                            Now you've lost me though - profile redirection causes all kinds of problems. Can you make it work, yes. Is it easy ? Heck no. My own personal experience also says it's not that stable either, but I'm willing to take the blame on that bit if needed.

                                            https://support.microsoft.com/en-us/help/949977/relocation-of-the-users-directory-and-the-programdata-directory-to-a-drive-other-than-the-drive-that-contains-the-windows-directory

                                            It's amazing how much the simplest tasks are major issues on Windows 😞

                                            Sadly, this is more based upon the shit software companies write, and less on MS. The crap software makes hard calls to anticipated locations. this is not MS's fault.

                                            I agree. Although MS doesn't handle it in a way that fixes that, either. They make it really easy to mess that up and even their own update process breaks - so MS's fault there.

                                            UNIX had this solved in the 1970s, so even bad code doesn't have the issue.

                                            1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 5
                                            • 6
                                            • 7
                                            • 8
                                            • 9
                                            • 6 / 9
                                            • First post
                                              Last post