ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Solved supporting an office of computers with full drive encryption

    IT Discussion
    17
    166
    16.7k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller
      last edited by

      Are you asking if IE just starts putting private data anywhere? That seems very unlikely. What makes you think that?

      Mike DavisM 1 Reply Last reply Reply Quote 0
      • Mike DavisM
        Mike Davis @scottalanmiller
        last edited by

        @scottalanmiller said in supporting an office of computers with full drive encryption:

        Are you asking if IE just starts putting private data anywhere? That seems very unlikely. What makes you think that?

        If you log in to windows and your profile isn't available, Windows creates a temporary profile for you and runs under that. This isn't the exact case since you would have to have to unlock your secure volume after you log in and your profile loads, but I'm thinking the behavior would be the same.

        black3dynamiteB 1 Reply Last reply Reply Quote 0
        • black3dynamiteB
          black3dynamite @Mike Davis
          last edited by

          @Mike-Davis said in supporting an office of computers with full drive encryption:

          @scottalanmiller said in supporting an office of computers with full drive encryption:

          Are you asking if IE just starts putting private data anywhere? That seems very unlikely. What makes you think that?

          If you log in to windows and your profile isn't available, Windows creates a temporary profile for you and runs under that. This isn't the exact case since you would have to have to unlock your secure volume after you log in and your profile loads, but I'm thinking the behavior would be the same.

          That's just user profile data. Are you talking about redirecting the user profile?

          Mike DavisM 1 Reply Last reply Reply Quote 0
          • Mike DavisM
            Mike Davis @black3dynamite
            last edited by

            @black3dynamite said in supporting an office of computers with full drive encryption:

            That's just user profile data. Are you talking about redirecting the user profile?

            No , the question is two fold. First, can you install internet explorer to a secure volume so it can't launch unless they unlock their secured drive? Second If IE can't be installed on an alternate path, if the path to their temporary files is unavailable, will Windows just dump them somewhere else?

            scottalanmillerS black3dynamiteB 2 Replies Last reply Reply Quote 0
            • scottalanmillerS
              scottalanmiller @Mike Davis
              last edited by

              @Mike-Davis said in supporting an office of computers with full drive encryption:

              @black3dynamite said in supporting an office of computers with full drive encryption:

              That's just user profile data. Are you talking about redirecting the user profile?

              No , the question is two fold. First, can you install internet explorer to a secure volume so it can't launch unless they unlock their secured drive?

              Why would you care?

              1 Reply Last reply Reply Quote 0
              • black3dynamiteB
                black3dynamite @Mike Davis
                last edited by

                @Mike-Davis said in supporting an office of computers with full drive encryption:

                @black3dynamite said in supporting an office of computers with full drive encryption:

                That's just user profile data. Are you talking about redirecting the user profile?

                No , the question is two fold. First, can you install internet explorer to a secure volume so it can't launch unless they unlock their secured drive? Second If IE can't be installed on an alternate path, if the path to their temporary files is unavailable, will Windows just dump them somewhere else?

                Internet explorer is not like the other browsers. It's part of the operating system. How about not using Internet explorer and stick with Firefox. I believe Opera and Vivaldi allows USB like installation.

                scottalanmillerS 1 Reply Last reply Reply Quote 0
                • scottalanmillerS
                  scottalanmiller @black3dynamite
                  last edited by

                  @black3dynamite said in supporting an office of computers with full drive encryption:

                  @Mike-Davis said in supporting an office of computers with full drive encryption:

                  @black3dynamite said in supporting an office of computers with full drive encryption:

                  That's just user profile data. Are you talking about redirecting the user profile?

                  No , the question is two fold. First, can you install internet explorer to a secure volume so it can't launch unless they unlock their secured drive? Second If IE can't be installed on an alternate path, if the path to their temporary files is unavailable, will Windows just dump them somewhere else?

                  Internet explorer is not like the other browsers. It's part of the operating system. How about not using Internet explorer and stick with Firefox. I believe Opera and Vivaldi allows USB like installation.

                  I expect that they do. And even IE is effectively phased out. But even assuming that it is absolutely required, I'm unclear why its installation location matters. Maybe I'm missing something obvious, but no matter where it is running from, does that affect anything to do with security?

                  1 Reply Last reply Reply Quote 0
                  • NerdyDadN
                    NerdyDad
                    last edited by

                    Coming into the conversation late here.

                    I have a full enterprise where most, if not all, of my laptops are bitlockered before they are deployed. Security keys are stored in the TPM for boot decryption. I also hold the kyes to the encryption on an IT controlled drive.

                    There is also a boot up password that must be entered by the user when the boot the computer up from cold. If they are rebooted, the startup password is bypassed automatically by the bios/uefi.

                    DashrenderD 1 Reply Last reply Reply Quote 1
                    • Mike DavisM
                      Mike Davis
                      last edited by

                      The requirement is that temporary files from using the web based software are not left unencrypted. In the suggestion that the 😄 drive is not encrypted so that OS patches can happen I don't think that will work. If the user can launch IE without decrypting the secure drive, it fails the requirement.

                      scottalanmillerS 1 Reply Last reply Reply Quote 0
                      • NerdyDadN
                        NerdyDad
                        last edited by

                        You're asking for full drive encryption while the computer is running?

                        1 Reply Last reply Reply Quote 0
                        • scottalanmillerS
                          scottalanmiller @Mike Davis
                          last edited by

                          @Mike-Davis said in supporting an office of computers with full drive encryption:

                          The requirement is that temporary files from using the web based software are not left unencrypted. In the suggestion that the 😄 drive is not encrypted so that OS patches can happen I don't think that will work. If the user can launch IE without decrypting the secure drive, it fails the requirement

                          Why? Does IE store local files in a shared space? That sounds very unlikely. You've tested that?

                          Mike DavisM DashrenderD 2 Replies Last reply Reply Quote 0
                          • Mike DavisM
                            Mike Davis @scottalanmiller
                            last edited by

                            If the computer is stolen, they don't want confidential files left unencrypted on the drive.

                            scottalanmillerS 1 Reply Last reply Reply Quote 0
                            • scottalanmillerS
                              scottalanmiller @Mike Davis
                              last edited by

                              @Mike-Davis said in supporting an office of computers with full drive encryption:

                              If the computer is stolen, they don't want confidential files left unencrypted on the drive.

                              No one has questioned that. We are questioning why you think files would be written to that part of the drive.

                              1 Reply Last reply Reply Quote 0
                              • Mike DavisM
                                Mike Davis @scottalanmiller
                                last edited by

                                @scottalanmiller said in supporting an office of computers with full drive encryption:

                                You can include the program files on the D drive. It's not too hard to look at the apps that you will be using and see where they store data.

                                We're going back to this. My thought is that Internet Explorer is not movable and you can't force it to store temp files on an encrypted drive unless you encrypt the entire drive.

                                scottalanmillerS 1 Reply Last reply Reply Quote 0
                                • scottalanmillerS
                                  scottalanmiller
                                  last edited by

                                  There is an assumption that IE, and ergo Windows, is inherently insecure and cannot be trusted. Yet you will deploy it where you don't trust it, then use encryption running on top of it in the hopes that that fixes the problem you are assigning to the system itself. This seems like a strange set of things based on an assumption that I don't believe has foundation.

                                  1 Reply Last reply Reply Quote 0
                                  • scottalanmillerS
                                    scottalanmiller @Mike Davis
                                    last edited by

                                    @Mike-Davis said in supporting an office of computers with full drive encryption:

                                    @scottalanmiller said in supporting an office of computers with full drive encryption:

                                    You can include the program files on the D drive. It's not too hard to look at the apps that you will be using and see where they store data.

                                    We're going back to this. My thought is that Internet Explorer is not movable and you can't force it to store temp files on an encrypted drive unless you encrypt the entire drive.

                                    We never left this. We KNOW that IE is not moveable. And we know that it stores files on the encrypted drive. The question remains... why do YOU feel that this is incorrect? You have avoided the one question the entire time.

                                    Why do you feel that IE would ever write to the C drive?

                                    DustinB3403D 1 Reply Last reply Reply Quote 0
                                    • scottalanmillerS
                                      scottalanmiller
                                      last edited by

                                      We know that in Windows XP, there was a condition where IE could write to public space instead of private space under specific failure conditions. My understanding is that this was fixed after XP and that Vista and later have no possibility of this. If you have information contrary to this, you should say so because I've asked repeatedly and you've answered other things that aren't really relevant.

                                      1 Reply Last reply Reply Quote 0
                                      • scottalanmillerS
                                        scottalanmiller
                                        last edited by

                                        I'm not saying that IE can't have a security vulnerability here, I'm just asking if you know something that we don't. Because I've researched this and found nothing about it. So I'm wondering where you've come up with this vulnerability that is not supposed to be there.

                                        1 Reply Last reply Reply Quote 0
                                        • DustinB3403D
                                          DustinB3403 @scottalanmiller
                                          last edited by

                                          @scottalanmiller said in supporting an office of computers with full drive encryption:

                                          Why do you feel that IE would ever write to the C drive?

                                          Why wouldn't It? The C drive is the default for everything Windows.

                                          scottalanmillerS 1 Reply Last reply Reply Quote 0
                                          • Mike DavisM
                                            Mike Davis @scottalanmiller
                                            last edited by

                                            @scottalanmiller said in supporting an office of computers with full drive encryption:

                                            Standard method is to have all user accessible space on a different volume. Like a D drive (partition.) That way the system can fire up, get patched and be used like a normal system but the data you need to protect can only be accessed with a password (or something) to allow it to decrypt.

                                            I assumed the entire drive had to be encrypted, but you suggested I didn't have to encrypt the entire drive.

                                            scottalanmillerS 1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 5
                                            • 6
                                            • 7
                                            • 8
                                            • 9
                                            • 4 / 9
                                            • First post
                                              Last post