O'Reilly logo

Inside Windows® Server 2003 by William Boswell

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

EFS Procedures

At this point, you've probably had enough of the principles of operation of EFS and you're eager to put them into action. First, though, you need to buy yourself a little time while you plan your EFS deployment. You do not want to end up with hundreds or thousands of encrypted files scattered around your system without a clear plan for managing them.

The subsequent sections describe how to create additional DRAs and deploy their public keys, how to protect the DRA private keys, how to encrypt files and folders, and how to recover encrypted files if the user should be unavailable. You'll also see how to use the CIPHER command-line utility to perform many of these tasks.

Before deploying EFS, I highly recommend that you install at ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required