Lab 8
This lab followed on from Lab 7 with using certificates, though this one was more involved. I had to deploy a certificate, and also make it possible to recover a private key if it is lost.
Exercise 1
In this exercise, I had to set up a key recovery agent. This went smoothly up to the point where I had perform an advanced certificate request using the web interface. After some searching, I discovered that the web site was only compatible with the ancient IE9. To get around any issues, I had to open the site in IE11 add it in the compatibility view settings, then add it to trust sites. Before applying these settings the site would look like this:
After applying the settings, I get the right options:
I was then able to submit the certificate request which can be seen in the snapshot below. I then issued the certificate:
\
As we can see here, the certificate was successfully issued, then I managed to install the certificate:
Lastly for this exercise, I had to archive the key recovery certificate:
Exercise 2
In this exercise I set up the publishing of certificates. This works through group policy and automatically issues certificates to the right users.
Exercise 3
In this exercise, I encrypted some files and secured them with a certificate
Encrypted files. As shown, the certificate has the recovery certificate set up:
Thumbprint of Sam's certificate:
Exporting the certificate:
Sam's certificate is deleted:
Exercise 4
In this exercise I managed to recover Sam's encrypted files using the key recovery agent.
As we can see the files are encrypted and inaccessible:
Thumbprint of Sam's newer certificate:
Recovering the key:
Recovering the key cont:
Accessing the encrypted files with the recovered certificate:
Critical Thinking
This lab went very smoothly without issues.
In terms of business use, certificates are very useful for securing networks so they are used commonly. If a certificate is lost, that can cause damage if important files are unable to be recovered, so it is important for businesses to take the measures and to make sure that the network is secure, but also able to recover from incidents.