What Is Encrypting File System (EFS)? (2024)

What Is Encrypting File System (EFS)? (1)

By

  • Rahul Awati

What is Encrypting File System (EFS)?

Encrypting File System provides an added layer of protection by encrypting files or folders on various versions of the Microsoft Windows OS. EFS is a functionality of New Technology File System (NTFS) and is built into a device via the OS. It facilitates file or directory encryption and decryption with the help of complex cryptographic algorithms.

Through encryption, EFS helps keep sensitive files safe from hackers or data thieves who gain unauthorized access to a computing network or devices.

What Is Encrypting File System (EFS)? (2)

EFS and NTFS

On Windows systems, NFTS supports EFS. NTFS itself is a built-in system used to store and retrieve files. The ultimate aim of EFS is to encrypt files on hard drives from unauthorized intruders who get access to authorized users' physical software. EFS also ensures that only authorized users or intended recipients can decrypt the file, which they can with just a click of the button.

Additional users such as administrators can also access these encrypted files, but to do this, they need the right permissions. Unauthorized users cannot open the files. Instead, they see a warning message depending on the application trying to access the file and its data.

EFS explained

EFS is a user-based encryption control technique that enables users to control who can read the files on their system. The typical method of using EFS is to perform encryption at the folder level. This ensures that all files added to the encrypted folder are automatically encrypted. At the same time, users can also select and encrypt individual files. The files are encrypted when they are closed and are automatically ready to use once they are opened.

When a folder is marked encrypted, future files transported to that folder are also encrypted and automatically protected. However, users can opt out of automatic encryption by selecting a custom setting called This file only.

Once a file is marked for encryption, EFS runs in the background without disrupting the user. The file remains encrypted if it is moved to another folder or even a different hard drive.

The system automatically decrypts the file or folder when the authorized user accesses it. When they save the file, encryption is reapplied to the file to maintain its cryptographic protection. Users who are not authorized cannot open, copy, rename or move the encrypted file or folder. Instead, they see a warning message like access denied, depending on the application trying to access the file or its data.

How EFS works

To encrypt and decrypt files (or directories), EFS uses public key encryption technology. When a user requests to encrypt a file or folder, EFS generates an X.509 certificate. This certificate has a private/public key pair that the RSA algorithm generates, with EFS as a key usage. If the user loses the certificate and thus cannot decrypt the file, the recovery agent user or the holder of the associated private key can decrypt the file instead. The RSA algorithm generates both the public and private keys that are stored in the certificate.

EFS stores its private key in the user's individual profile. It also stores the public key with the user-created files. Only that user can decrypt the files. The public key is public, so that other users can encrypt data for a user. However, the private key is private because only the person holding it can decrypt it. Further, even the person encrypting the data with the public key cannot decrypt it once it is encrypted.

Before encryption, EFS generates a cryptographically strong random key based on the default Advanced Encryption Standard (AES) cipher. The RSA algorithm encrypts this key, and not the data. Then, the public RSA key encrypts the AES key, which is then used to encrypt the actual data.

Characteristics of EFS

The key characteristics of EFS are the following:

  • Users can turn encryption on or off by simply selecting or deselecting a checkbox in a file's properties.
  • It contains a data recovery mechanism.
  • EFS supports the encryption of sparse files.
  • Users can share access to encrypted files.

EFS benefits

EFS provides many benefits over several other third-party encrypting applications, including:

  • The entire encryption and decryption process is transparent to the authorized user who encrypts and decrypts the file.
  • The user does not need to remember passwords once the file is encrypted.
  • EFS minimizes the probability of dictionary attacks with its strong key security, making it superior to many other applications where keys are based on user-entered passphrases.
  • The encrypting and decrypting processes are run in kernel mode to eliminate the risk of leaving the key in the paging file from which an intruder could possibly extract it.
  • The EFS data recovery mechanism allows system administrators to restore data from encrypted files if the original authorized user is no longer available (e.g., because they were transferred to another department or left the company entirely).
  • Administrators can use tools to identify EFS-encrypted data and the user account that can decrypt these files or folders.
What Is Encrypting File System (EFS)? (3)

EFS best practices

Newer versions of EFS provide reliable encryption. However, there could be some security issues, especially when system administrators don't enforce strong group encryption policies, or if they don't maintain recovery agents for lost passwords. To avoid these problems, it's important to follow some EFS best practices.

Control access to private keys

Any unauthorized user, such as a cyber attacker or data thief, can decrypt EFS data if they get access to the private key. That's why it's critical to maintain these private keys and control access to them.

Private keys should always be stored in a safe location to prevent unauthorized third parties from decrypting protected data. Private keys should also be complemented with recovery keys. Admins should create multiple recovery accounts and store recovery keys on a redundant device.

Maintain backups

It's important to keep backups of all private keys and recovery certificates if EFS changes recovery agents. This is a good way to maintain redundant older files that were encrypted under an older recovery agent. Users should also check each file individually, and not automatically assume that all EFS files are up to date with a new recovery agent.

Using recovery agent accounts

These accounts should only be used for recovery and for no other purpose. It can be useful to keep at least two recovery agent accounts on separate machines to prevent a single point of failure from causing irrecoverable data loss.

Encrypt full partitions or virtual drives

The best way to maintain system performance on servers is to ensure that EFS is only used on folders that require additional security controls. Full partitions or virtual drives should not be encrypted unless absolutely required to meet specific business needs.

See how to back up encrypted files and how to use the Encrypting File System and look at techniques for performing EFS recovery. Also, see how to protect PowerShell credentials in task automation and review a Windows file systems showdown.

This was last updated in December 2021

Continue Reading About Encrypting File System (EFS)

  • Cryptography quiz questions and answers: Test your smarts
  • What is end-to-end encryption (E2EE)?
  • How to safely stop unnecessary Windows 10 services
  • Microsoft unveils new DLP, 'Double Key Encryption' offerings

Related Terms

What is SSH (Secure Shell) and How Does It Work?
SSH (Secure Shell or Secure Socket Shell) is a network protocol that gives users -- particularly systems administrators -- a ...Seecompletedefinition
What is the Cybersecurity Information Sharing Act (CISA)?
The Cybersecurity Information Sharing Act (CISA) allows United States government agencies and non-government entities to share ...Seecompletedefinition
What is threat detection and response (TDR)? Complete guide
Threat detection and response (TDR) is the process of recognizing potential cyberthreats and reacting to them before harm can be ...Seecompletedefinition

Dig Deeper on Data security and privacy

  • file systemBy: ErinSullivan
  • How to use SDelete to ensure deleted data is gone for goodBy: DamonGarn
  • Types of ransomware and a timeline of attack examplesBy: SharonShea
  • The role of Mac file and folder encryption for businessesBy: RobertSheldon
What Is Encrypting File System (EFS)? (2024)

FAQs

What Is Encrypting File System (EFS)? ›

EFS works by encrypting a file with a bulk symmetric key, also known as the File Encryption Key, or FEK. It uses a symmetric encryption algorithm because it takes less time to encrypt and decrypt large amounts of data than if an asymmetric key cipher is used.

What is Encrypting File System EFS in detail? ›

EFS is a quick way to encrypt files and folders and is especially useful when these files are stored on a Windows 10 system with multiple users. This is because EFS is connected to the user, not machine, so multiple users could have their files encrypted without risking the other users gaining access.

What is EFS? ›

The Encrypted File System, or EFS, provides an additional level of security for files and directories. It provides cryptographic protection of individual files on NTFS file system volumes using a public-key system.

Which statement regarding Microsoft Encrypting File System EFS is correct? ›

Among the given statements regarding the Encrypting File System (EFS), the correct one is: 'The file is encrypted with a symmetric key'. EFS, a feature integrated into the Microsoft Windows operating system, utilizes a symmetric key for file encryption. This symmetric key is also known as the File Encryption Key (FEK).

Is EFS encryption good? ›

Yes, indeed. EFS is like a virtual vault for your files. Even if someone gains physical access to your computer or extracts the hard drive, they won't be able to read the encrypted files without the correct decryption key. It adds an extra layer of security beyond just having a password to log in.

What type of file is EFS? ›

Amazon Elastic File System (Amazon EFS) provides serverless, fully elastic file storage so that you can share file data without provisioning or managing storage capacity and performance.

Why should I use EFS? ›

Amazon EFS provides shared file storage for use with compute instances in the AWS Cloud and on-premises servers. Applications that require shared file access can use Amazon EFS for reliable file storage delivering high aggregate throughput to thousands of clients simultaneously.

What storage is EFS? ›

Amazon EFS Standard storage class is built on high-speed SSD storage to deliver sub-millisecond latency performance for your active application data. EFS Standard is designed for data that is accessed or modified frequently and requires high durability and availability.

What does it mean to encrypt a file? ›

File encryption helps protect your data by encrypting it. Only someone with the right encryption key (such as a password) can decrypt it.

Is EFS a network file system? ›

You have created your first network file system in the cloud. Amazon EFS is a simple, scalable shared file system that grows and shrinks automatically as you add and remove files, and you only pay for the amount of storage you are using.

How do I use EFS file system? ›

To create your EFS file system and launch your EC2 instance using the EC2 launch wizard
  1. Create an EC2 instance running on a Linux operating system using the key pair and network settings you choose.
  2. Create a shared EFS file system that has the recommended settings and is automatically mounted to the EC2 instance.

What protocol does EFS use? ›

The Network File System v4. 1 protocol mounts an EFS system on an EC2 instance or an on-premises server to give the service access to data and to enable it to read and write to the file system. The Secure Copy feature transfers non-AWS hosted data to EFS.

How do I encrypt an EFS folder? ›

If you have used EFS or a third-party software to encrypt a file, you may be able to unlock it using its file properties. Right-click the file in File Explorer, select Advanced and then clear the Encrypt Contents to Secure Data check box. Hope this resolves your Query !!

What is encrypting file system EFS and how it works? ›

EFS is a user-based encryption control technique that enables users to control who can read the files on their system. The typical method of using EFS is to perform encryption at the folder level. This ensures that all files added to the encrypted folder are automatically encrypted.

What does EFS mean? ›

(Encrypting File System) An encryption system in the Windows NTFS file system, starting with Windows XP Pro. EFS enables users to encrypt their data in storage with the use of a password.

Can files in EFS be protected? ›

EFS also offers data protection for your files with EFS Backup and EFS Replication.

What is the main difference between Encrypting File System EFS and BitLocker? ›

BitLocker helps protect the entire operating system drive against offline attacks, whereas EFS can provide additional user-based file level encryption for security separation between multiple users of the same computer. EFS can also be used in Windows to encrypt files on other drives that aren't encrypted by BitLocker.

How does file system encryption work? ›

These encryption systems use both a public key and a private key. Anyone with the public key can use it to encrypt files. However, only users with the private key can decrypt the files, so the files remain safe from unauthorized access. Symmetric encryption uses a single private key for encryption and decryption.

Can I disable Encrypting File System EFS service? ›

Enabling or Disabling the EFS Using Services

msc” in the dialogue box and press Enter; 2) Find Encrypting File System (EFS), right-click it, and select Properties; 3) Select Disabled from the Startup type drop-down list and click Apply; 4) Click OK to apply changes.

Top Articles
What Is Cloud Encryption?
ETF Basics and Structure: FAQs
Safety Jackpot Login
Skylar Vox Bra Size
Promotional Code For Spades Royale
Yogabella Babysitter
Winston Salem Nc Craigslist
Arkansas Gazette Sudoku
Ymca Sammamish Class Schedule
Health Benefits of Guava
Marist Dining Hall Menu
Gw2 Legendary Amulet
Apnetv.con
Whiskeytown Camera
Rls Elizabeth Nj
PGA of America leaving Palm Beach Gardens for Frisco, Texas
Danielle Longet
Daniela Antury Telegram
Slmd Skincare Appointment
Shooting Games Multiplayer Unblocked
ocala cars & trucks - by owner - craigslist
I Wanna Dance with Somebody : séances à Paris et en Île-de-France - L'Officiel des spectacles
سریال رویای شیرین جوانی قسمت 338
Violent Night Showtimes Near Amc Fashion Valley 18
Zack Fairhurst Snapchat
Understanding Genetics
27 Fantastic Things to do in Lynchburg, Virginia - Happy To Be Virginia
Jailfunds Send Message
Guinness World Record For Longest Imessage
How to Use Craigslist (with Pictures) - wikiHow
Mawal Gameroom Download
Moonrise Time Tonight Near Me
Minecraft Jar Google Drive
Daily Journal Obituary Kankakee
2016 Honda Accord Belt Diagram
How to Play the G Chord on Guitar: A Comprehensive Guide - Breakthrough Guitar | Online Guitar Lessons
About Us | SEIL
AsROck Q1900B ITX und Ramverträglichkeit
#1 | Rottweiler Puppies For Sale In New York | Uptown
Why Holly Gibney Is One of TV's Best Protagonists
Convenient Care Palmer Ma
Andrew Lee Torres
Karen Wilson Facebook
Jamesbonchai
Fatal Accident In Nashville Tn Today
Gas Buddy Il
Gli italiani buttano sempre più cibo, quasi 7 etti a settimana (a testa)
Here’s What Goes on at a Gentlemen’s Club – Crafternoon Cabaret Club
786 Area Code -Get a Local Phone Number For Miami, Florida
Where and How to Watch Sound of Freedom | Angel Studios
sin city jili
Peugeot-dealer Hedin Automotive: alles onder één dak | Hedin
Latest Posts
Article information

Author: Reed Wilderman

Last Updated:

Views: 6532

Rating: 4.1 / 5 (52 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Reed Wilderman

Birthday: 1992-06-14

Address: 998 Estell Village, Lake Oscarberg, SD 48713-6877

Phone: +21813267449721

Job: Technology Engineer

Hobby: Swimming, Do it yourself, Beekeeping, Lapidary, Cosplaying, Hiking, Graffiti

Introduction: My name is Reed Wilderman, I am a faithful, bright, lucky, adventurous, lively, rich, vast person who loves writing and wants to share my knowledge and understanding with you.