Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Why was the contoso\administrator not able to open the file?

10/12/2020 Client: adeel.vbs2 Deadline: 2 Day

70-411 Administering Windows Server 2012


Lab 6


ConfigurIng file services and Disk encryption


This lab contains the following exercises and activities:


Exercise 6.1


Encrypting Files with EFS


Exercise 6.2


Configuring the EFS Recovery Agent


Exercise 6.3


Backing Up and Restoring EFS Certificates


Exercise 6.4


Encrypting a Volume with BitLocker


Lab Challenge


Deploying Network Unlock


BEFORE YOU BEGIN


The lab environment consists of student workstations connected to a local area network, along with a server that functions as the domain controller for a domain called contoso.com. The computers required for this lab are listed in Table 6-1.


Table 6-1


Computers Required for Lab 6


Computer


Operating System


Computer Name


Server (VM 1)


Windows Server 2012 R2


RWDC01


Server (VM 2)


Windows Server 2012 R2


Server01


In addition to the computers, you also require the software listed in Table 6-2 to complete Lab 6.


Table 6-2


Software Required for Lab 6


Software


Location


Lab 6 student worksheet


Lab06_worksheet.docx (provided by instructor)


Working with Lab Worksheets


Each lab in this manual requires that you answer questions, take screen shots, and perform other activities that you will document in a worksheet named for the lab, such as Lab06_worksheet.docx. You will find these worksheets on the book companion site. It is recommended that you use a USB flash drive to store your worksheets, so you can submit them to your instructor for review. As you perform the exercises in each lab, open the appropriate worksheet file using Word, fill in the required information, and save the file to your flash drive.


After completing this lab, you will be able to:


Encrypt files with EFS


Configure EFS Recovery Agent


Back up and restore EFS certificates


Encrypt a volume with BitLocker


Estimated lab time: 70 minutes


Exercise 6.1


Encrypting Files with EFS


Overview


For files that are extremely sensitive, you can use EFS to encrypt the files. During this exercise, you encrypt a file using Encrypting File System (EFS), which is a built-in feature of NTFS.


Mindset


Encryption is a way to add an additional layer of security. If the laptop is stolen and the hard drive is put into another system where the thief or hacker is an administrator, the files could not be read without the proper key. If you want to encrypt individual documents, you can use Encrypting File System (EFS).


Completion time


20 minutes


Encrypting Files with EFS

1. Log in to Server01 as the Contoso\administrator user account with the password Pa$$w0rd. The Server Manager console opens.


2. On Server01, create a C:\Data folder.


3. Create a text file in the C:\Data folder called test.txt file. Open the text file, type your name in the file, close the file, then click Save to save the changes.


4. Right-click the C:\Data folder and choose Properties. The Properties dialog box opens.


5. On the General tab, click Advanced. The Advanced Attributes dialog box appears as shown in Figure 6-1.




Figure 6-1


Configuring advanced attributes


6. Click to select Encrypt contents to secure data. Click OK to close the Advanced Attributes dialog box.


7. Click OK to close the Properties dialog box.


8. When Windows asks you to confirm the changes, click OK.


Question 1


What color is the C:\Data folder?


Question 2


Is the test.txt file in the C:\Data folder also encrypted?


9. Right-click the C:\Data folder and choose Properties. The Properties dialog box opens.


10. Under the General tab, click Advanced. The Advanced Attributes dialog box opens.


11. Clear the Encrypt contents to secure data check box. Click OK to close the Advanced Attributes dialog box.


12. Click OK to close the Properties dialog box.


13. When it asks to confirm attribute changes, click OK.


14. From Server01, log off as administrator.


End of exercise.


Sharing Files Protected with EFS with Other Users

1. Log into RWDC01 as contoso\administrator, Server Manager starts. Open the Tools menu and click Active Directory Users and Computers. The Active Directory Users and Computers console opens.


2. Right-click the Users node, click New, then click User.


3. Create a new user with the following parameters:


First Name: User1


User logon name: User1


Click Next.


4. For the Password and Confirm password text boxes, type Pa$$w0rd. Click to select Password never expires. When an Active Directory Domain Services dialog box appears, click OK. Click Next.


5. When the user is ready to be created, click Finish.


6. Under the Users node, double-click User1. The User1 Properties dialog box opens.


7. Click the Member Of tab.


8. Click the Add button. When the Select Groups dialog box opens, type domain admins and click OK.


9. Click OK to close the User1 Properties dialog box.


10. On Server01, log in as contoso\User1 with the password of Pa$$w0rd.


11. Open the C:\Data folder, right-click the test.txt file and choose Properties.


12. On the General tab, click Advanced. The Advanced Attributes dialog box opens.


13. Click Encrypt contents to secure data. Click OK to close the Advanced Attributes dialog box. Click OK to close the Properties dialog box.


14. When it asks if you want to encrypt the file and its parent folder, click OK.


15. If an Access Denied message appears, click Ignore, click Continue, click OK, and click Ignore. Click OK. If an Access Denied message appears again, click Ignore All. When you are done, the test.txt file should be green.


16. On Server01, log out as User1 and log in as Contoso\Administrator.


17. Open the C:\Data folder.


18. Double-click to open the Test.txt file.


Question 3


What error message did you get?


19. Click OK to close the message, and then close Notepad.


20. Right-click the test.txt file and click Properties.


21. Click the Security tab.


Question 4


What permissions does Administrator have?


Question 5


Why was the contoso\administrator not able to open the file?


22. Go back to the General tab, click the Advanced button, clear the Encrypt check box, and then click OK.


Question 6


Were you able to decrypt the file?


23. Click OK to close the Properties dialog box. After getting the Access Denied box, click Cancel to close it.


24. On Server01, log off as Administrator and log on as User1.


25. Open the C:\Data folder.


26. Right-click the test.txt file and choose Properties. The Properties dialog box opens.


27. Click the Advanced button to open the Advanced Attributes dialog box.


28. Click to deselect the Encrypt contents to secure data check box and then click OK.


29. Click OK to close the Properties dialog box. When it asks you to provide administrator permission to change these attributes, click Continue.


30. Log off as User1 and log on as contoso\administrator.


31. Open the C:\Data folder.


32. Right-click the Test.txt file and choose Properties.


33. Click the Advanced button to open the Advanced Attributes dialog box.


34. Click to select the Encrypt contents to secure data check box. Click OK to close the Advanced Attributes dialog box.


35. Click OK to close the Properties dialog box. When it asks to apply to the folder and its contents, click OK.


36. Right-click the test.txt file and choose Properties. Click the Advanced button to open the Advanced Attributes dialog box.


37. Click the Details button. The User Access to test.txt dialog box opens.


38. Click the Add button. When the Encrypting File System dialog box opens, click User1 and click View Certificate.


39. When the Certificate dialog box opens, click the Details tab.


Question 7


What is the Certificate used for? Hint: Look at the Enhanced Key Usage field.


40. Click OK to close the Certificates dialog box.


41. Click OK to close the Encrypting File System dialog box.


Question 8


Looking at the User Access to test.txt dialog box, who has a Recovery Certificate?


42. Take a screen shot of the User Access to test dialog box by pressing Alt+Prt Scr and then paste it into your Lab06_worksheet file in the page provided by pressing Ctrl+V.


43. Click OK to close the User Access to test.txt dialog box, click OK to close Advanced Attributes dialog box, and then click OK to close test Properties box.


44. On Server01, sign out as Administrator and log in as User1.


45. Open the C:\Data folder and open the test.txt file.


Question 9


Were you able to open the file?


46. Close the test.txt file.


47. On Server01, sign out as User1.


End of exercise.


Exercise 6.2


Configuring the EFS Recovery Agent


Overview


During this exercise, you configure EFS Recovery Agents so that you can recover EFS encrypted files although the agent is not the owner of the file.


Mindset


When an employee leaves the company, that employee's files might be encrypted, which would be unreadable to anyone else. Using an EFS recovery agent, you will be able to recover those files and make them available to the user or users who have replaced the departed user.


Completion time


15 minutes


Installing and Configuring the Certificate Authority

1. On RWDC01, log on as contoso\administrator, if needed.


2. On RWDC01, on the Server Manager, click Manage > Add Roles and Features.


3. When the Add Roles and Features Wizard starts, click Next.


4. On the Select installation type page, click Next.


5. On the Select destination server page, click Next.


6. On the Select server roles page, click Active Directory Certificate Services. When you are prompted to add features, click Add Features. Then when you are back to the Select server roles page, click Next.


7. On the Select features page, click Next.


8. On the Active Directory Certificate Services page, click Next.


9. On the Select role services, Certification Authority is already selected. Click to select the following:


Certificate Enrollment Policy Web Service


Certificate Enrollment Web Service


Certification Authority Web Enrollment


When it asks you to add additional features for any of these features, click Add Features.


10. Back on the Select role services page, click Next.


11. On the Web Server Role (IIS) page, click Next.


12. On the Select role services page, click Next.


13. On the Confirm installation selections page, click Install.


14. When the Certificate Authority is installed, click Close.


15. On Server Manager, click the Exclamation Point in a yellow triangle and then click the Configure Active Directory Certificate Services link.


16. On the Credentials page, click Next.


17. On the Role Services page, click Certification Authority, as shown in Figure 6-2. Click Next.




Figure 6-2


Configuring the Certification Authority


18. When it asks what setup type of CA you should install, click Next.


19. When it asks for the CA type, click Next.


20. On the Specify the type of the private key page, click Next.


21. On the Specify the Cryptography for CA page, click Next.


22. On the Specify the name of the CA page, click Next.


23. Change the Validity Period to 10 years and then click Next.


24. On the CA database page, click Next.


25. On the Confirmation page, click Configure.


26. When the CA is configured, take a screen shot of the CA is configured screen by pressing Alt+Prt Scr and then paste it into your Lab06_worksheet file in the page provided by pressing Ctrl+V.


27. Click Close.


28. If it asks to configure additional role services, click No.


End of exercise.


Configuring the EFS Recovery Agent

1. On RWDC01, log off as Contoso\Administrator and log in as Contoso\User1.


2. On RWDC01, using Server Manager, open the Tools menu and click Group Policy Management. The Group Policy Management console opens.


3. Expand Forest\Domains\contoso.com.


4. Right-click the Default Domain Policy and choose Edit.


5. In the Group Policy Management Editor window, expand Computer Configuration\Policies\Windows Settings\Security Settings\Public Key Policies\ as shown in Figure 6-3.




Figure 6-3


Opening the GPO public key policies


6. Right-click Encrypting File System and choose Create Data Recovery Agent.


7. Click the Encrypting File System node. Take a screen shot of the Group Policy Management Editor by pressing Alt+Prt Scr and then paste it into your Lab06_worksheet file in the page provided by pressing Ctrl+V.


8 On RWDC01, log off as Contoso\User1 and log in as Contoso\Administrator.


Question 10


What is needed for a user to become a data recovery agent?


End of exercise. You can leave the windows open for the next exercise.


Exercise 6.3


Backing Up and Restoring EFS Certificates


Overview


During this exercise, you back up an EFS certificate which you later restore after you delete the certificate.


Mindset


You have a standalone computer that failed and had to be rebuilt. On the computer, you had some files that were encrypted with EFS. Fortunately, you backed up the files from time to time to a removable drive. After you rebuilt the computer, you copied the files from the removable drive. Although you are using the same username and password that you used before, you cannot open the files because they are encrypted. Unfortunately, there is not much you can do unless you have the EFS certificates with the correct keys to decipher the documents. Therefore, it is important that you always have a backup of the EFS certificates in case the system needs to be replaced.


Completion time


10 minutes


Backing Up the EFS Certificates

1. Log on to Server01 as contoso\administrator. The Server Manager console opens.


2. Right-click the Start button and choose Command Prompt (Admin).


3. From the command prompt, execute the certmgr.msc command. The certmgr console opens.


4. In the left pane, double-click Personal, and then click Certificates.


5. In the main pane, right-click the certificate that lists Encrypting File System under Intended Purposes. Select All Tasks, and then click Export.


6. When the Certificate Export Wizard starts, click Next.


7. On the Export Private Key page, click Yes, export the private key and then click Next.


8. On the Export File Format page, click Next.


9. On the Security page, select the Password check box and type the password of Pa$$w0rd in the Password and Confirm password text boxes. Click Next.


Question 11


What is the difference between the cer and the pfx format when backing up digital certificates?


10. On the File to Export page, type C:\Cert.bak in the File name text box, Click Next.


11. Take a screen shot of the Completing the Certificate Export Wizard by pressing Alt+Prt Scr and then paste it into your Lab08_worksheet file in the page provided by pressing Ctrl+V.


12. When the wizard is complete, click Finish.


13. When the export is successful, click OK.


Restoring the EFS Certificate

1. Right-click the Administrator certificate and click Delete. When it asks if you want to delete the certificate, read the warning and click Yes.


2. Right-click Certificates and choose All Tasks > Import.


3. When the Certificate Import Wizard starts, click Next.


4. On the File to Import page, type c:\cert.bak.pfx, and then click Next.


5. If it asks for a password, type Pa$$w0rd in the Password text box and click Next.


6. On the Certificate Store page, click Next.


7. On the Completing the Certificate Import Wizard page, click Finish.


8. When the import is successful, click OK.


9. Take a screen shot of the Certificates console by pressing Alt+Prt Scr and then paste it into your Lab06_worksheet file in the page provided by pressing Ctrl+V.


10. Close Certificate Manager and close the Command Prompt.


End of exercise. You can leave the windows open for the next exercise.


Exercise 6.4


Encrypting a Volume with BitLocker


Overview


In this exercise, you create a new volume and then use BitLocker to encrypt the entire volume.


Mindset


EFS will encrypt only individual files; BitLocker can encrypt an entire volume. Therefore, if you want to encrypt an entire drive on a laptop, you can use BitLocker.


Completion time


10 minutes


1. Log in to Server02 as the Contoso\Administrator user account. The Server Manager console opens.


2. On Server02, on Server Manager, click Manage and click Add Roles and Features. The Add Roles and Feature Wizard opens.


3. On the Before you begin page, click Next.


4. Select Role-based or feature-based installation and then click Next.


5. On the Select destination server page, click Next.


6. On the Select server roles page, click Next.


7. On the Select features page, select BitLocker Drive Encryption.


8. When the Add Roles and Features Wizard dialog box displays, click Add Features.


9. On the Select Features page, click Next.


10. On the Confirm installation selections page, click Install.


11. When BitLocker is installed, click Close.


12. Reboot the Server02.


13. Log in to Server02 as the Contoso\Administrator. The Server Manager console opens.


14. Using Server Manager, click Tools > Computer Management. The Computer Management console opens.


15. Expand the Storage node and click Disk Management.


16. Right-click the C drive and choose Shrink Volume.


17. In the Enter the amount of space to shrink in MB text box, type 3000 and then click Shrink.


18. Under Disk 0, right-click the unused space and click New Simple Volume.


19. When the Welcome to the New Simple Volume Wizard starts, click Next.


20. On the Specify Volume Size page, click Next.


21. On the Assign Drive Letter or Path page, click Next.


22. On the Format Partition page, click Next.


23. When the wizard is complete, click Finish.


24. Close Computer Management. If you’re prompted to Format the disk, click Cancel.


25. Click the Start button and then click the Control Panel tile.


26. Click System and Security > BitLocker Drive Encryption. The BitLocker Drive Encryption window opens as shown in Figure 6-4.




Figure 6-4


Opening the BitLocker settings


27. Click the down arrow next to the E drive. Then click Turn on BitLocker. A BitLocker Drive Encryption (E:) window opens.


28. On the Choose how you want to unlock this drive page, click to select the Use a password to unlock the drive. Type a password of Pa$$w0rd in the Enter your password and Reenter your password text boxes, and then click Next.


Question 11


If you had a laptop, what chip would be used to create cryptographic keys and encrypted so that they can only be decrypted by the chip?


29. On the How do you want to back up your recovery key? page, click Save to a file option.


30. When the Save BitLocker recovery key as dialog box opens, type \\rwdc01\Software\ before BitLocker Recovery Key <GUID>.txt and then click Save. Click Next.


31. On the BitLocker Drive Encryption (E:) page, select Encrypt entire drive radio button, and click Next.


32. On the Are you ready to encrypt this drive? page, click Start encrypting.


33. When the drive is encrypted, take a screen shot of the BitLocker window by pressing Alt+Prt Scr and then paste it into your Lab06_worksheet file in the page provided by pressing Ctrl+V.


34. Close the BitLocker Drive Encryption window. If you’re prompted to format the disk, click Cancel.


End of exercise.


Lab REview Questions


Completion time


10 minutes


1. In Exercise 6.1, how do you enable EFS?


2. In Exercise 6.1, how do you allow other users to view an EFS file that you encrypted?


3. In Exercise 6.2, how does a user get to be an EFS Recovery Agent?


4. In Exercise 6.3, what format did you use when backing up the certificates, so that it can also store the private and public keys?


5. In Exercise 6.4, what did you use to encrypt an entire volume?


6. In Exercise 6.4, from where do you control BitLocker?


Lab Challenge


Deploying Network Unlock


Overview


To complete this challenge, you will list the software components needed to implement Network Unlock and specify the server to which you would install the software component.


Mindset


You are an administrator for Contoso.com and you need to deploy Network Unlock on the Contoso network.


Completion time


10 minutes


The Contoso network included the following servers:


· RWDC01: Domain Controller and DNS Server


· Server01: DHCP Server


· Server02: Certificate Authority – Enterprise


List any other servers that you will need, list all software components that you will need to install or configure, and list where the software component will be created or installed.


End of lab. You can log off or start a different lab. If you want to restart this lab, you’ll need to click the End Lab button in order for the lab to be reset.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Custom Coursework Service
Finance Homework Help
A+GRADE HELPER
Peter O.
Writer Writer Name Offer Chat
Custom Coursework Service

ONLINE

Custom Coursework Service

Hey, Hope you are doing great :) I have read your project description. I am a high qualified writer. I will surely assist you in writing paper in which i will be explaining and analyzing the formulation and implementation of the strategy of Nestle. I will cover all the points which you have mentioned in your project details. I have a clear idea of what you are looking for. The work will be done according to your expectations. I will provide you Turnitin report as well to check the similarity. I am familiar with APA, MLA, Harvard, Chicago and Turabian referencing styles. I have more than 5 years’ experience in technical and academic writing. Please message me to discuss further details. I will be glad to assist you out.

$105 Chat With Writer
Finance Homework Help

ONLINE

Finance Homework Help

I have a Master’s degree and experience of more than 5 years in this industry, I have worked on several similar projects of Research writing, Academic writing & Business writing and can deliver A+ quality writing even to Short Deadlines. I have successfully completed more than 2100+ projects on different websites for respective clients. I can generally write 10-15 pages daily. I am interested to hear more about the project and about the subject matter of the writing. I will deliver Premium quality work without Plagiarism at less price and time. Get quality work by awarding this project to me, I look forward to getting started for you as soon as possible. Thanks!

$105 Chat With Writer
A+GRADE HELPER

ONLINE

A+GRADE HELPER

Greetings! I’m very much interested to work on this project. I have read the details properly. I am a Professional Writer with over 5 years of experience, therefore, I can easily do this job. I will also provide you with TURNITIN PLAGIARISM REPORT. You can message me to discuss the detail. Why me? My goal is to offer services to you that are profitable. I don’t want you to place an order once and that’s it. For me to be successful, I need you to come back and order again. Give me the opportunity to work on your project. I wish to build a long-term relationship with you. We can have further discussion in chat. Thanks!

$105 Chat With Writer
Peter O.

ONLINE

Peter O.

Hello, I can assist you in writing attractive and compelling content on ganja and its movement globally. I will provide with valuable, informative content that you will appreciate. The content will surely hit your target audience. I will provide you with the work that will be according to the needs of the targeted audience and Google’s requirement.

$105 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Wawa velorio - Problematic Accountant - Aston webb student hub - Introduction to logarithms ppt - Epic hero chart for beowulf - Organisational behaviour multiple choice questions and answers - Cloud computing failure case study - Number of food banks in canada - Public, Family and Community Health - Programming with microsoft visual basic solutions - What is cybertechnology - Higher rmps past papers - University of adelaide myuni - Nike product life cycle - Busi 301 quiz 1 - Discussion - 10 fold dilution calculator - Six dimensions of patient centered care - Hcos mark sheet - Siemens brushless dc motor - Www kidsastronomy com solar system htm - A bank is quoting the following exchange rates - Following one's social clock may increase: - How to write a thesis for a visual analysis paper - Lab report photosynthetic pigments paper chromatography - Rs recycling gmbh bad oeynhausen - Mass Communication, Culture, and Media Literacy Part 2 - Mcauley car dismantlers armoy - AMH - Definition of appropriation in art - Cylindrical shells about x axis - Hegemonic masculinity examples in media - Relationship between mc atc and avc - How do i complain to macy's - Business Communication - Plot diagram template doc - Pensacola christian academy homeschool - Information Systems Essays - Forza t5 super strength - Econometrics - Ronan haughey solicitor newry - Coastal protection and management regulation 2003 - Jake Gardner and James Scurlock - Isabella was queen of _______ when she married ferdinand - I'm not scared study guide - Amazon's international strategy - Theoretical Rationale Rough Draft - Cultural Diversity (Case study) - Stem cell webquest answers - Supernatural in the castle of otranto - NEED IN 15 HOURS or LESS - Schedule of expected cash disbursements - Vold's Theoretical Criminology - Human body research project - Silk wellingborough christmas party - Marketing communications discovery creation and conversations ebook - Descartes third meditation summary - Essay - Rv malcherek and steel 1981 - Non elastic impression materials - External conflict in macbeth - Titration of vinegar lab report answers - Australian taxation office moonee ponds vic - The third - Characters in that was then this is now - Essential skills classroom management - What should the president of simplex mills do now - Falling from grace godwin - 978 1 938168 36 9 - Cream of wheat by lucille clifton - Paper on blockchain use - Bruno cataldo dentist south yarra - Fisk alloy wire case study - Bondi to coogee bus - Power factor savings calculator - Act 2 scene 1 much ado about nothing summary - PLEASE FOLLOW DIRECTION, USE EXCEL TEMPLATES AND ALSO FOLLOW RUBRIC DIRECTION - Unisuper temporary incapacity benefit - I have hereunto set my hand meaning - Micro-Econ Essay - Electrical room temperature requirements - The Middleboro Casebook – Case 1 – The Community Final Case Analysis - Norton introduction to literature portable 12th edition table of contents - Principles of guided missile design october sky - Oleg kuzovkov net worth - Pharma peer replies - Ib extended essay rubric - Harold davinier south africa - Case Study 5 The Crash of Asiana Flight 214 - Research Paper - Dr david mccarey rheumatology - Global citizenship and equity assignment - An external website permitting users to browse and purchase widgets - Walden social change mission - Http www hp com go workstationsupport - Managerial Finance - All iqbal open university - Ethical choices in business situations are most often made - Margaret atwood scarlet ibis - Gcu wellness center