In this article, we'll learn how to do the following:
uses TrueCrypt to set the entire disk encryption on both temporary and persistent storage. Use http://www.aliyun.com/zixun/aggregation/11208.html >microsoft®bitlocker to set up simple volume encryption. Set file system-level file and folder encryption using EFS (Encrypting File System, Encrypting file Systems). Back up and restore the EFS data encryption certificate. Use fsutil to enable swap file encryption. Securely remove data and eliminate free disk space using Sysinternals SDelete.
Setting up the environment
First, let's take a look at the tools and techniques that are used to set up the environment, and then learn about representations and conventions.
Tools and Techniques
the basic operating system image required by the name Description TrueCrypt third party full disk encryption. Windows 2003, 2008 R1, 2008 R2, Microsoft BitLocker driver Disk encryption Windows Logical volume encryption Windows Server 2008 R1, 2008 R2, Microsoft Windows Encrypting File System (EFS) NTFS file system level encryption Windows 2003 R2, 2008 R1, 2008 R2, Windows Interchange File encrypted paging file encryption (configured with fsutil) Windows Server 2008 R1, 2008 R2, Sysinternals SDelete Security Removal Tool and free space Cleanup Tool Windows 2003, 2008 R1, 2008 R2, 2012
Representations and formulas
Please follow the following notation and conventions:
Commands are usually prefixed with a prompt. There are two purposes to do this: show you the permissions required to execute the command. If you do not understand what a command is doing, you may be prevented from copying/pasting the command in the console. Commands executed as administrator users on the system are prefixed with C:\Users\Administrator >. Commands executed as normal user on the system are prefixed with C:\Users\user >. Separate the command output with a new row and indent a tab to the right (as shown in the following code): C:\users\administrator> 1st command-to be run as Administratorc:\users\ Administrator> 2nd command-(previous command super-delegates no output) output from 2nd command C:\Users\user > 3rd command-to to be Run as a regular user. Since ^this is a long command we split on listbox lines using ^the caret character (^) output from 3rd command
Setting up disks
When you set up disk or volume encryption, you need to use additional temporary or persistent storage. Before using these disks, you need to put them online.
Select Start > Run > Diskmgmt.msc. For each offline disk, right-click and select Online.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.