1 USING "ENCRYPTING FILE SYSTEM" TO PROTECT FILES AND FOLDERS IN "WINDOWS.."

Slides:



Advertisements
Similar presentations
11/2/2013 2:02:38 AM 5864_ER_FED 1 Importing Certificates into Lotus Notes R6.
Advertisements

ISEC: Excellence in Engineering Encrypted File System Key Recovery Philip Noble (520) or DSN , U.S. Army Information.
Microsoft Office 2007 Web Feature Sharing Access Data.
Microsoft Office 2010 Office 2010 and Windows 7: Essential Concepts and Skills Mark Worden Instructor Use your spacebar or down arrow key to advance slides.
OpenCMS and the MSASS Website. A Note on Terminology Locking a file for editing: No lockNOT locked You have write/edit access Someone else has write.
Using Track Changes in Microsoft Word Navigating Directions Click on the arrows or the home button located in the bottom right-hand corner of each.
Microsoft Office 2007 Excel Web Feature Creating Web Pages Using Excel.
Microsoft Office 2007 Excel Web Feature Creating Web Pages Using Excel.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Microsoft Office 2007 PowerPoint Web Feature Creating Web Pages Using PowerPoint.
Lesson 13 PROTECTING AND SHARING DOCUMENTS
Using a Template to Create a Resume and Sharing a Finished Document
Microsoft Windows Vista Chapter 6 Customizing Your Computer Using the Control Panel.
Office 2003 Introductory Concepts and Techniques, 2 nd Edition M i c r o s o f t Windows XP Project Introduction to Microsoft Windows XP and Office 2003.
1 of 6 Parts of Your Notebook Below is a graphic overview of the different parts of a OneNote 2007 notebook. Microsoft ® OneNote ® 2007 notebooks are digital.
WINDOWS XP BACKNEXTEND 1-1 LINKS TO OBJECTIVES Starting Windows Using the Taskbar, opening & switching programs Using the Taskbar, opening & switching.
Office 2003 Post-Advanced Concepts and Techniques M i c r o s o f t Word Project 8 Working with Macros and Visual Basic for Applications (VBA)
Ch 9 Managing Active Directory User Accounts. Objectives Create Organizational Unit Creating User Accounts in Active Directory Disabling, Enabling, and.
Using Microsoft Outlook: Basics. Objectives Guided Tour of Outlook –Identification –Views Basics –Contacts –Folders –Web Access Q&A.
Office XP Introductory Concepts and Techniques Windows XP Edition M i c r o s o f t Windows XP Project An Introduction to Windows XP Professional and Office.
Copyright 2007, EMC Paradigm Publishing Inc. WINDOWS XP BACKNEXTEND 1-1 LINKS TO OBJECTIVES Starting Windows Using the Taskbar, opening & switching programs.
Windows Tutorial 9 Maintaining Hardware and Software
1 MAKING THE LEGACY "DESKTOP" OF "WINDOWS 8" EASIER TO USE.
Microsoft Office 2010 Office 2010 and Windows 7: Essential Concepts and Skills.
Microsoft Office Illustrated Fundamentals Unit B: Understanding File Management.
Tutorial 8 Managing and Securing a Database. Objectives Filter data in a table and a form Save a filter as a query and apply the saved query as a filter.
© 2008 The McGraw-Hill Companies, Inc. All rights reserved. M I C R O S O F T ® Preparing for Electronic Distribution Lesson 14.
Microsoft Office 2007 Access 2007 Chapter 9 Administering a Database System.
®® Microsoft Windows 7 for Power Users Tutorial 5 Comparing Windows 7 File Systems.
Project 3 File, Document, Folder Management, Windows XP Explorer Windows XP Service Pack 2 Edition Comprehensive Concepts and Techniques.
Back to content Final Presentation Mr. Phay Sok Thea, class “2B”, group 3, Networking Topic: Mail Client “Outlook Express” *At the end of the presentation.
Office 2013 and Windows 8: Essential Concepts and Skills
1/28/2010 Network Plus Windows Networking Network Identification Identifies name and type of network. Installed adapters –Performed during Windows installation.
XP New Perspectives on Microsoft Office FrontPage 2003 Tutorial 4 1 Microsoft Office FrontPage 2003 Tutorial 4 – Using Shared Borders and Themes.
1. Chapter 9 Maintaining Documents 3 Managing Files As with physical documents, folders, and filing cabinets, electronic files and folders must be well.
Creating a Web Site to Gather Data and Conduct Research.
Microsoft Windows 7 Essential Introduction to Windows 7.
Once you have contacted me to set up a new account, your computer needs to be configured to dial into.DevlinEx and use our servers for things like .
Information Security 493. Lab 11.3: Encrypt a Windows File Windows operating systems since Windows 2000 have included the ability to encrypt files. Follow.
Microsoft Windows Vista Chapter 1 Fundamentals of Using Microsoft Windows Vista.
Office 2013 and Windows 8: Essential Concepts and Skills Microsoft Access 2013.
Chapter 6 Generating Form Letters, Mailing Labels, and a Directory
MICROSOFT WORD 2007 INTERMEDIATE/ADVANCED. CREATE A NEW STYLE BASED ON A SELECTED TEXT HOME tab > STYLES group dialog launcher > at the bottom of the.
Microsoft Office 2007 Access Chapter 6 Using Macros, Switchboards, PivotTables, and PivotCharts.
Happy Monday!!!  Open the Agenda  Copy it in your Agenda form.  Wait for further instructions.
Windows Internet Explorer 7 Chapter 1 Introduction to Windows Internet Explorer.
Chapter 1 Creating a Dreamweaver Web Page and Local Site
Office 2003 Introductory Concepts and Techniques, 2 nd Edition M i c r o s o f t Windows XP Project Introduction to Microsoft Windows XP and Office 2003.
Microsoft Access 2010 Chapter 10 Administering a Database System.
COMPREHENSIVE Access Tutorial 12 Managing and Securing a Database.
® Microsoft Access 2010 Tutorial 12 Managing and Securing a Database.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Working with Disks Lesson 4. Skills Matrix Technology SkillObjective DomainObjective # Configuring Data Protection Configure data protection6.4 Using.
XP New Perspectives on Microsoft Office FrontPage 2003 Tutorial 7 1 Microsoft Office FrontPage 2003 Tutorial 8 – Integrating a Database with a FrontPage.
Microsoft Office 2010 is the newest version of Microsoft Office, offering features that provide users with better functionality and easier ways to work.
Managing Applications, Services, Folders, and Libraries Lesson 4.
Creating and Editing a Web Page
Office 2013 and Windows 8: Essential Concepts and Skills Microsoft Office 2013.
Creating and Editing a Web Page Using Inline Styles
XP New Perspectives on Creating Web Pages With Word Tutorial 1 1 Creating Web Pages With Word Tutorial 1.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
Chapter 5 Using a Template to Create a Resume and Sharing a Finished Document Microsoft Word 2013.
Copyright 2007, EMC Paradigm Publishing Inc. WINDOWS VISTA BACKNEXTEND 1-1 LINKS TO OBJECTIVES Starting Windows Using the Taskbar, open & switch programs.
Office 2010 and Windows 7: Essential Concepts and Skills
Microsoft PowerPoint 2007 – Unit 2
Fundamentals of Using Microsoft Windows XP
Shelly Cashman: Microsoft Word 2016
Microsoft Office Illustrated Fundamentals
Tutorial 12 Managing and Securing a Database
Presentation transcript:

1 USING "ENCRYPTING FILE SYSTEM" TO PROTECT FILES AND FOLDERS IN "WINDOWS.."

2 Web location for this presentation: Click on “Meeting Notes”

3 SUMMARY Many of the "editions" of "Windows 2000", "Windows XP", "Windows Vista", "Windows 7", and "Windows 8" have the "Encrypting File System" (EFS) for securing files and/or folders inside NTFS hard drive partitions.

4 TOPICS Basics of Encrypting File System "EFS" versus "BitLocker" "Encrypting File System" Service Using the "Certificate Manager" to Check for Existing Personal "Public Key Certificates" Encrypting A File or Folder with EFS Using the "Certificate Manager" to Export a Newly-Created Public Key and Private Key

5 TOPICS (continued).PFX "Personal Information Exchange" files Decrypting an EFS-encrypted file/folder Deleted Certificates Stay in RAM And Are Active Until You Reboot

6 BASICS OF EFS The "Encrypting File System" (EFS) is a feature of "NTFS" hard drives (and partitions) for many editions of "Windows 2000" through "Windows 8".

7 BASICS OF EFS (continued) When view in "Windows Explorer" ("File Explorer"), a folder that contains only "Encrypting File System"- encrypted files will have it's name in green text:

8

9 BASICS OF EFS (continued) When viewed in "Windows Explorer" ("File Explorer"), a file that is encrypted by "Encrypting File System" will have it's name in green text:

10

11 BASICS OF EFS (continued) Another user on the same computer will be unable to open/view the EFS- protected file. If someone takes your hard drive, and puts it into an external hard drive enclosure and attaches the enclosure to their own computer, they will be unable to open/view the EFS-protected file.

12

13

14 BASICS OF EFS (continued) "ESF" is a feature of "NTFS" hard drives (and partitions) for many editions of "Windows 2000" through "Windows 8".

15 BASICS OF EFS (continued) In EFS, "public key certificates", "private keys", and passwords to controll the various keys all work together to give you "two factor authentication".

16 BASICS OF EFS (continued) The advantages of having certificates are detailed in ` chpaper_10_Best_Practices_Securi ng_Your_Enterprise.pdf#page=6 and 980/how-is-using-client-certificates- more-secure-than-tls-plus-basic- authentication chpaper_10_Best_Practices_Securi ng_Your_Enterprise.pdf#page= /how-is-using-client-certificates- more-secure-than-tls-plus-basic- authentication

17 BASICS OF EFS (continued) According to ypting_File_System, Ecrypting File System (EFS) is available for the following editions of "Windows..": ypting_File_System

18 BASICS OF EFS (continued)

19 BASICS OF EFS (continued) "Windows Vista Starter", "..Home Basic", and "..Home Premium" allow only decryption--so you can read encrypted files but you cannot encrypt them according to ption1/The-Simple-Way-to-Keep- Your-Pr.htm ption1/The-Simple-Way-to-Keep- Your-Pr.htm

20 BASICS OF EFS (continued) For "Windows Vista Starter", "..Home Basic", and "..Home Premium" you can decrypt EFS- encrypted files using the cipher command line command. See IS/windows-vista/What-is- Encrypting-File-System-EFS IS/windows-vista/What-is- Encrypting-File-System-EFS

21 BASICS OF EFS (continued) "Windows 7 Starter", "..Home Basic", and "..Home Premium" allow only decryption--so you can read encrypted files but you not encrypt them

22 BASICS OF EFS (continued) For "Windows 7 Starter", "..Home Basic", and "..Home Premium" you can decrypt EFS-encrypted files using the cipher command line command.

23 BASICS OF EFS (continued) See us/windows/forum/windows_7- windows_programs/cipherexe- returns-error-the-request-is- not/9d5cb3fc-d bc9f- f62dbd46f37c?msgId=5ad136ca- dedf f1c-81627b us/windows/forum/windows_7- windows_programs/cipherexe- returns-error-the-request-is- not/9d5cb3fc-d bc9f- f62dbd46f37c?msgId=5ad136ca- dedf f1c-81627b907895

24 BASICS OF EFS (continued)

25 BASICS OF EFS (continued) "Encrypting File System" is also available for NTFS drives/partitions for the "..Pro" and "..Enterprise" editions of "Windows 8". "Encrypting File System" will not be available for the "..RT" or "Windows 8" editions of "Windows 8". Reference: s#Comparison_chartReference: s#Comparison_chart

26 "EFS" VERSUS "BITLOCKER" "Bitlocker" is used to encrypt entire hard drives or hard drive partitions whiile "Encrypting File System" is used to encrypt individual data files and/or folders "EFS" causes less of a performance reduction on your Windows computer

27 "EFS" VERSUS "BITLOCKER" (continued) See ws/2012/04/25/bitlocker-vs-efs/ ws/2012/04/25/bitlocker-vs-efs/

28 "ENCRYPTING FILE SYSTEM" SERVICE MUST BE SET TO "MANUAL" OR "AUTOMATIC" In order to encrypt or decrypt a file or folder, the "Encrypting File System" services has to be set to "Manual" or "Automatic": You can run services.msc from any search box or "Run" box in "Windows.." to turn it on:

29 "ENCRYPTING FILE SYSTEM" SERVICE SET TO "MANUAL" OR "AUTOMATIC" (continued) Step 1: Click on the "Start" button in versions of "Windows" prior to "..8" or, for "Windows 8..", hover over the lower-left "Hot Corner" and use the RIGHT mouse" to click on "Run" in the pop-up "Power User Context Menu":

30 "ENCRYPTING FILE SYSTEM" SERVICE SET TO "MANUAL" OR "AUTOMATIC" (continued) Step 2: Type in services.msc Step 3: Press once on the Enter key.

31

32 "ENCRYPTING FILE SYSTEM" SERVICE SET TO "MANUAL" OR "AUTOMATIC" (continued) Step 4: A "Services" Microsoft Management Console window will be displayed:

33

34 "ENCRYPTING FILE SYSTEM" SERVICE SET TO "MANUAL" OR "AUTOMATIC" (continued) Step 5: Use the vertical scroll bar on the right to scroll downward until you locate the "Encrypting File System" service. Step 6: Use your RIGHT mouse button to click on it. Step 7: A pop-up context menu will be displayed:

35 "ENCRYPTING FILE SYSTEM" SERVICE SET TO "MANUAL" OR "AUTOMATIC" (continued) Step 8: Click on "Properties" in the pop-up context menu:

36

37 "ENCRYPTING FILE SYSTEM" SERVICE SET TO "MANUAL" OR "AUTOMATIC" (continued) Step 9: A "Properties" dialog box will be displayed. Step 10: Make sure that "Startup type" is set to "Manual" or "Automatic". "Manual" is preferable. Step 11: Click on the "Apply" button if it is not grayed out.`

38 "ENCRYPTING FILE SYSTEM" SERVICE SET TO "MANUAL" OR "AUTOMATIC" (continued) Step 12: Close the "Properties" dialog box. Step 13: Close the "Services" Microsoft Management Console window.

39

40 USING THE "CERTIFICATE MANAGER" TO CHECK FOR EXISTING PERSONAL "PUBLIC KEY CERTIFICATES" Step 1: Click on the "Start" button in versions of "Windows" prior to "..8" or, for "Windows 8..", hover over the lower-left "Hot Corner" and use the RIGHT mouse" to click on "Run" in the pop-up "Power User Context Menu":

41

42 USING THE "CERTIFICATE MANAGER" TO CHECK FOR EXISTING PERSONAL "PUBLIC KEY CERTIFICATES" (continued) Step 2: Use the right mouse button to click on "cmd.exe" in versions of "Windows" prior to "..8" or, for "Windows 8..", use the left mouse button to click on "Command Prompt (Admin) in the pop-up Power User Tasks menu:

43

44 USING THE "CERTIFICATE MANAGER" TO CHECK FOR EXISTING PERSONAL "PUBLIC KEY CERTIFICATES" (continued) Step 3: Use the left mouse button to click on "Run as administrator" in versions of "Windows" prior to "..8" or, for "Windows 8..", use the left mouse button to click on the "Yes" button of the "User Account Control" dialog box:

45

46 USING THE "CERTIFICATE MANAGER" TO CHECK FOR EXISTING PERSONAL "PUBLIC KEY CERTIFICATES" (continued) Step 4: A command prompt window, will be displayed:

47

48 USING THE "CERTIFICATE MANAGER" TO CHECK FOR EXISTING PERSONAL "PUBLIC KEY CERTIFICATES" (continued) Step 5: Inside the command prompt window, type in certmgr.msc Step 6: Press once on the Enter key.

49

50 USING THE "CERTIFICATE MANAGER" TO CHECK FOR EXISTING PERSONAL "PUBLIC KEY CERTIFICATES" (continued) Step 7: A "certmgr" Microsoft Management Console window will be displayed:

51

52 USING THE "CERTIFICATE MANAGER" TO CHECK FOR EXISTING PERSONAL "PUBLIC KEY CERTIFICATES" (continued) Step 8: Double-click on the Personal group in the right-most pane:

53

54

55 USING THE "CERTIFICATE MANAGER" TO CHECK FOR EXISTING PERSONAL "PUBLIC KEY CERTIFICATES" (continued) Step 9: Double-click on "Certificates" subgroup in the right- most pane:

56

57 USING THE "CERTIFICATE MANAGER" TO CHECK FOR EXISTING PERSONAL "PUBLIC KEY CERTIFICATES" (continued) Step 10: Note that you presently have no "Public Key Certificates" or subgroups in the "Personal" group:

58

59 ENCRYPTING A FILE OR FOLDER WITH "ENCRYPTING FILE SYSTEM" Step 1: Start "Windows Explorer" ("File Explorer"). Step 2: Locate or create the folder or file that you want to encrypt.

60

61 ENCRYPTING A FILE OR FOLDER WITH "ENCRYPTING FILE SYSTEM" (continued) Step 3: Use the RIGHT mouse to click on it. Step 4: A pop-up context menu will be displayed. Step 5: Click on "Properties".

62

63 ENCRYPTING A FILE OR FOLDER WITH "ENCRYPTING FILE SYSTEM" (continued) Step 6: A "..Properties" dialog box will be displayed. Step 7: Click on the "Advanced" button.

64

65 ENCRYPTING A FILE OR FOLDER WITH "ENCRYPTING FILE SYSTEM" (continued) Step 8: An "Advanced Attributes" box will be displayed:

66

67 ENCRYPTING A FILE OR FOLDER WITH "ENCRYPTING FILE SYSTEM" (continued) Step 9: Put in a checkmark for "Encrypt contents to secure data". Step 10: Click on the "OK" button: Step 11: The "Advanced Attributes" box will disappear.

68

69 ENCRYPTING A FILE OR FOLDER WITH "ENCRYPTING FILE SYSTEM" (continued) Step 12: Click on the "Apply" button of the "..Properties" dialog box, if the "Apply" button is not grayed out. Step 11: The "Advanced Attributes" box will disappear.

70

71 ENCRYPTING A FILE OR FOLDER WITH "ENCRYPTING FILE SYSTEM" (continued) Step 13: Select the desired "option button":

72

73 ENCRYPTING A FILE OR FOLDER WITH "ENCRYPTING FILE SYSTEM" (continued) Step 14: Click on the "Continue" button of the "Access Denied" dialog box:

74

75 ENCRYPTING A FILE OR FOLDER WITH "ENCRYPTING FILE SYSTEM" (continued) Step 15: The "Access Denied" box will disappear. Step 16: The file name(s) of the newly-encrypted file(s) will now be displayed in a green font to indicate that the file(s) is/are encrypted by "Encrypting File System".

76

77 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" Step 1: Click on the "Start" button in versions of "Windows" prior to "..8" or, for "Windows 8..", hover over the lower-left "Hot Corner" and use the RIGHT mouse" to click on "Run" in the pop-up "Power User Context Menu":

78

79 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 2: Use the right mouse button to click on "cmd.exe" in versions of "Windows" prior to "..8" or, for "Windows 8..", use the left mouse button to click on "Command Prompt (Admin) in the pop-up Power User Tasks menu:

80

81 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 3: Use the left mouse button to click on "Run as administrator" in versions of "Windows" prior to "..8" or, for "Windows 8..", use the left mouse button to click on the "Yes" button of the "User Account Control" dialog box:

82

83 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 4: A command prompt window, will be displayed:

84

85 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 5: Inside the command prompt window, type in certmgr.msc Step 6: Press once on the Enter key.

86

87 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 7: A "certmgr" Microsoft Management Console window will be displayed:

88

89 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 8: Double-click on the Personal group in the right-most pane:

90

91 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 9: Double-click on "Certificates" subgroup in the right- most pane:

92

93 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 10: Note that you now have a newly-created "Public Key Certificate" in the "Certificates" subgroup of the "Personal" group:

94

95 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 11: Note that you now have a newly-created "Public Key Certificate" in the "Certificates" subgroup of the "Personal" group:

96

97 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 12: Use the RIGHT mouse button to click on the newly-created "Public Key Certificate":

98

99 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 13: Click on "All Tasks" in the pop-up context menu:

100

101 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 14: Click on "Advanced Operations" in the secondary context menu:

102

103 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 15: A "Certificate Export Wizard" dialog box will be displayed. Step 16: Click on the "Next" button:

104

105 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 17: Select the "Yes, export the private key" option. Step 18: Click on the "Next" button:

106

107 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 19: Click on the "Next" button:

108

109 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 20: Click on the "Next" button:

110

111

112 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 21: Type in a password and record it somewhere in a secure manner (such as with "Roboform" or "LastPass"):

113

114 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY"(continued) Step 22: Type in the same password again. Step 23: Click on the "Next" button:

115

116 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 24: Click on the "Browse" button:

117

118 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 25: Use the "Save As" box to work your way to the hard drive or flash drive location where you wish to place the.PFX file:

119

120

121 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 26: When you arrive at the desired location for the.PFX file, type in a name for the.PFX file. Step 27: Click on the "Save" button:

122

123 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 28: Click on the "Next" button:

124

125 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 29: Click on the "Finish" button:

126

127

128 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 30: Click on "OK" button:

129

130 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 31: Click on "x" button to close the "certmgr" window:

131

132 USING THE "CERTIFICATE MANAGER" TO EXPORT A NEWLY-CREATED "PUBLIC KEY" AND "PRIVATE KEY" (continued) Step 32: Click on "x" button to close the Command Prompt window:

133

134

135.PFX file(s) = "Personal Information Exchange" files.PFX file(s) an be moved, copied, renamed, and ed without restrictions..PFX FILE(S) (continued)

136 Double-click on it to "Import" the certificate and the private key into any computer or Windows user account. Then you can open/view the associated the EFS-encrypted data file.PFX FILE(S) (continued)

137 If your Windows user account or your Windows computer cannot open an EFS-encrypted file, do the following: Step 1: Obtain the.PFX file (from the creator/owner of the EFS- encrypted file) and double-click on the.PFX file: DECRYPTING AN EFS- ENCRYPTED FILE/FOLDER

138

139

140 Step 2: Click on the "Next" button of the "Certificate Import Wizard": DECRYPTING AN EFS-ENCRYPTED FILE/FOLDER (continued)

141

142 Step 3: Click on the "Next" button: DECRYPTING AN EFS-ENCRYPTED FILE/FOLDER (continued)

143

144

145 Step 4: Type in the password for the.PFX file (which you should have obtained from the creator/owner of the EFS-encrypted data file): DECRYPTING AN EFS-ENCRYPTED FILE/FOLDER (continued)

146

147 Step 5: Select the "Mark this key as exportable" option. Step 6: Click on the "Next" button: DECRYPTING AN EFS-ENCRYPTED FILE/FOLDER (continued)

148

149 Step 7: Click on the "Next" button: DECRYPTING AN EFS-ENCRYPTED FILE/FOLDER (continued)

150

151 Step 8: Click on the "Finish" button: DECRYPTING AN EFS-ENCRYPTED FILE/FOLDER (continued)

152

153 Step 9: Click on the "OK" button: DECRYPTING AN EFS-ENCRYPTED FILE/FOLDER (continued)

154

155 Step 10: If you EFS-encrypted files are inside an EFS-encrypted folder, double-click on the folder to open it: DECRYPTING AN EFS-ENCRYPTED FILE/FOLDER (continued)

156

157 Step 11: Double-click on the EFS- encrypted data file to open it: DECRYPTING AN EFS-ENCRYPTED FILE/FOLDER (continued)

158

159 Step 12: The EFS-encrypted data file will open with its default associated software application program ("app"): DECRYPTING AN EFS-ENCRYPTED FILE/FOLDER (continued)

160

161 DELETED CERTIFICATES STAY IN RAM UNTIL YOU RE-BOOT If you run certmgr.msc to delete a certificate from your computer's hard drive, the certificate will stay active in RAM, so you have to re-boot to flush out the active certificate.

162 OPTIONS IN "ACRONIS TRUE IMAGE.." FOR BACKING UP HARD DRIVES THAT CONTAIN EFS-ENCRYPTED FILES According to documentation/ATIH2012/index. html#267.html: documentation/ATIH2012/index. html#267.html

163