Creating Required DFSR Policy Components
DFSR uses two services to for the replication process, dfsrs.exe
and ntoskrnl.exe
that must be associated with the NT AUTHORITY user. In order to do this, you need to create a process set and a user set that must then be combined into a security rule in the policy.
How you do this depends on the key manager that you are using.
Once you create these components, you can use them in any number of policies for both standard and CTE-LDT GuardPoints.
Process Using CipherTrust Manager
-
Log into the CipherTrust Manager Console and switch to the correct domain if required.
-
Launch the Transparent Encryption application.
-
In the left-hand menu bar, expand Policies and select Policy Elements.
-
Create a process set for the required DFSR processes:
-
Click the Process Sets tab.
-
Click Create Process Set.
-
In the Name field, enter a name for this process set. In this example, we will use DFSR-Processes.
-
Click Next.
-
Enter the first DFSR process:
-
In the Directory field, enter
C:\Windows\System32\
. -
In the File field, enter
dfsrs.exe
.
-
-
Click Next.
-
Below the table, click Add Another Process:
-
In the Directory field, enter
\SystemRoot\System32\
. -
In the File field, enter
ntoskrnl.exe
.
-
-
Click Next. The process set should look like this:
-
Click Save to save the process set.
-
-
Create the user set for the required NT AUTHORITY user:
-
Click the User Sets tab.
-
Click Create User Set.
-
In the Name field, enter a name for the user set. In this example we will use
Local_NT_AUTHORITY
. -
Click Next.
-
Click the Manually Add Users tab.
-
In the uname field, enter
SYSTEM
. -
In the OS domain field, enter
NT AUTHORITY
. -
Click Next. The user set should look like this:
-
Click Save to save the user set.
-
Optionally create another user set for other authorized users in the namespace. For example, you may want to add the "Administrator" user in each of the domains that are part of the namespace. You can create as many separate user sets as required.
-
-
When you have finished created the required components, you can use those components to create your policies and GuardPoints. How you do so depends on which encryption method you are using. For details, see one of the following: