How to back up the recovery agent Encrypting File System (EFS) private key in Windows Server 2003, in Windows 2000, and in Windows XP (241201)
The information in this article applies to:
- Microsoft Windows Server 2003, Standard Edition
- Microsoft Windows Server 2003, Enterprise Edition
- Microsoft Windows Server 2003, Datacenter Edition
- Microsoft Windows XP Professional
- Microsoft Windows XP Home Edition
- Microsoft Windows 2000 Server
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows 2000 Professional
This article was previously published under Q241201 SUMMARYThis article describes how to back up the recovery agent Encrypting File System (EFS) private key on a computer that is running Microsoft Windows Server 2003, Microsoft Windows 2000, or Microsoft Windows XP. Use the recovery agent's private key to recover data in situations when the copy of the EFS private key that is located on the local computer is lost. This article contains information about how to use the Certificate Export Wizard to export the recover agent's private key from a computer that is a member of a workgroup, and from a Windows Server 2003-based or Windows 2000-based domain controller. INTRODUCTIONThis article describes how to back up the recovery agent
Encrypting File System (EFS) private key in Windows Server 2003, in Windows
2000, and in Windows XP. You can use the recovery agent's private key to
recover data in situations when the copy of the EFS private key that is located
on the local computer is lost. You can use EFS to encrypt data files
to prevent unauthorized access. EFS uses an encryption key that is dynamically
generated to encrypt the file. The File Encryption Key (FEK) is encrypted with
the EFS public key and is added to the file as an EFS attribute that is named
Data Decryption Field (DDF). To decrypt the FEK, you must have the
corresponding EFS private key from the public-private key pair. After you
decrypt the FEK, you can use the FEK to decrypt the file. If your EFS
private key is lost, you can use a recovery agent to recover encrypted files.
Every time that a file is encrypted, the FEK is also encrypted with the
Recovery Agent's public key. The encrypted FEK is attached to the file with the
copy that is encrypted with your EFS public key in the Data Recovery Field
(DRF). If you use the recovery agent's private key, you can decrypt the FEK,
and then decrypt the file. By default, if a computer that is running
Microsoft Windows 2000 Professional is a member of a workgroup or is a member
of a Microsoft Windows NT 4.0 domain, the local administrator who first logs on
to the computer is designated as the default recovery agent. By default, if a
computer that is running Windows XP or Windows 2000 is a member of a Windows
Server 2003 domain or a Windows 2000 domain, the built-in Administrator account
on the first domain controller in the domain is designated as the default
recovery agent. Note that a computer that is running Windows XP and
that is a member of a workgroup does not have a default recovery agent. You
have to manually create a local recovery agent.
For more
information, click the following article number to view the article in the
Microsoft Knowledge Base: 255026
The local administrator is not always the default Encrypting File System recovery agent
Important After you export the private key to a floppy disk or other
removable media , store the floppy disk or media in a secure location. If
someone gains access to your EFS private key, that person can gain access to
your encrypted data. back to the
topExport the recovery agent's private key from a computer that is a member of a workgroupTo export the recovery agent's private key from a computer that is
a member of a workgroup, follow these steps:
- Log on to the computer by using the recovery agent's local
user account.
- Click Start, click Run, type mmc, and then click OK.
- On the File menu, click Add/Remove
Snap-in, and then click Add.
- Under Available Standalone Snap-ins, click
Certificates, and then click Add.
- Click My user account, and then click
Finish.
- Click Close, and then click
OK.
- Double-click Certificates - Current User,
double-click Personal, and then double-click
Certificates.
- Locate the certificate that displays the words "File
Recovery" (without the quotation marks) in the Intended
Purposes column.
- Right-click the certificate that you located in step 8,
point to All Tasks, and then click Export.
The Certificate Export Wizard starts.
- Click Next.
- Click Yes, export the private key, and
then click Next.
- Click Personal Information Exchange - PKCS #12
(.PFX).
Note We strongly recommend that you also click to select the
Enable strong protection (requires IE 5.0, NT 4.0 SP4 or above
check box to protect your private key from unauthorized access.
If
you click to select the Delete the private key if the export is
successful check box, the private key is removed from the computer and
you will not be able to decrypt any encrypted files. - Click Next.
- Specify a password, and then click Next.
- Specify a file name and location where you want to export
the certificate and the private key, and then click
Next.
Note We recommend that you back up the file to a disk or to a
removable media device, and then store the backup in a location where you can
confirm the physical security of the backup. - Verify the settings that are displayed on the Completing
the Certificate Export Wizard page, and then click Finish.
back to the topExport the domain recovery agent's private keyThe first domain controller in a domain contains the built-in
Administrator profile that contains the public certificate and the private key
for the default recovery agent of the domain. The public certificate is
imported to the Default Domain Policy and is applied to domain clients by using
Group Policy. If the Administrator profile or if the first domain controller is
no longer available, the private key that is used to decrypt the encrypted
files is lost, and files cannot be recovered through that recovery agent.
To locate the Encrypted Data Recovery policy, open the Default Domain
Policy in the Group Policy Object Editor snap-in, expand Computer
Configuration, expand Windows Settings, expand
Security Settings, and then expand Public Key
Policies. To export the domain recovery agent's private key,
follow these steps:
- Locate the first domain controler that was promoted in the
domain.
- Log on to the domain controller by using the built-in
Administrator account.
- Click Start, click Run, type mmc, and then click OK.
- On the File menu, click Add/Remove
Snap-in, and then click Add.
- Under Available Standalone Snap-ins, click
Certificates, and then click Add.
- Click My user account, and then click
Finish.
- Click Close, and then click
OK.
- Double-click Certificates - Current User,
double-click Personal, and then double-click
Certificates.
- Locate the certificate that displays the words "File
Recovery" (without the quotation marks) in the Intended
Purposes column.
- Right-click the certificate that you located in step 9,
point to All Tasks, and then click Export.
The Certificate Export Wizard starts.
- Click Next.
- Click Yes, export the private key, and
then click Next.
- Click Personal Information Exchange - PKCS #12
(.PFX).
Note We strongly recommend that you click to select the Enable
strong protection (requires IE 5.0, NT 4.0 SP4 or abovecheck box to
protect your private key from unauthorized access.
If you click to
select the Delete the private key if the export is successful
check box, the private key is removed from the domain controller. As a best
practice, we recommend that you use this option. Install the recovery agent's
private key only in situations when you need it to recover files. At all other
times, export, and then store the recovery agent's private key offline to help
maintain its security. - Click Next.
- Specify a password, and then click Next.
- Specify a file name and location where you want to export
the certificate and the private key, and then click
Next.
Note We recommend that you back up the file to a disk or to a
removable media device, and then store the backup in a location where you can
confirm the physical security of the backup. - Verify the settings that are displayed on the Completing
the Certificate Export Wizard page, and then click Finish.
REFERENCES For more information about how to
determine who the recovery agent is for an encrypted file , click the following
article number to view the article in the Microsoft Knowledge Base: 243026
Using Efsinfo.exe to determine information about encrypted files
For more
information about EFS, click the following article number to view the article
in the Microsoft Knowledge Base: 223316
Best practices for Encrypting File System
For more information about EFS in Windows Server,
visit the following Microsoft Web site: For more information about how to work with EFS in Windows Server
2003, visit the following Microsoft Web site: For more information about related topics, visit the following
Microsoft Web site: back to the
top
Modification Type: | Major | Last Reviewed: | 6/22/2006 |
---|
Keywords: | kbwinservds kbActiveDirectory kbEFS kbenv kbHOWTOmaster w2000efs KB241201 kbAudITPro |
---|
|