EFS Procedures

At this point, you've probably had enough of the principles of operation of EFS and you're eager to put them into action. First, though, you need to buy yourself a little time while you plan your EFS deployment. You do not want to end up with hundreds or thousands of encrypted files scattered around your system without a clear plan for managing them.

The subsequent sections describe how to create additional DRAs and deploy their public keys, how to protect the DRA private keys, how to encrypt files and folders, and how to recover encrypted files if the user should be unavailable. You'll also see how to use the CIPHER command-line utility to perform many of these tasks.

Before deploying EFS, I highly recommend that you install at ...

Get Inside Windows® Server 2003 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.