26.12.2013 Views

McAfee Endpoint Encryption for PC 7.x Windows OS Refresh ...

McAfee Endpoint Encryption for PC 7.x Windows OS Refresh ...

McAfee Endpoint Encryption for PC 7.x Windows OS Refresh ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>McAfee</strong> <strong>Endpoint</strong> <strong>Encryption</strong> <strong>for</strong> <strong>PC</strong> <strong>7.x</strong><br />

<strong>Windows</strong> <strong>OS</strong> <strong>Refresh</strong> Recommended Process Guide <strong>for</strong> Master<br />

Boot Record Systems Only<br />

April 30 th 2013<br />

Version: 1.0<br />

Page | 1


Notices<br />

Copyright<br />

Copyright © 2010 <strong>McAfee</strong> Inc, <strong>McAfee</strong> Data Protection. All rights reserved.<br />

This document contains proprietary in<strong>for</strong>mation of <strong>McAfee</strong> Inc. and is subject to a license agreement or nondisclosure agreement. No part<br />

of this document may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into another language, in any<br />

<strong>for</strong>m or by any means, without the prior written consent of <strong>McAfee</strong>.<br />

Trademarks<br />

This document may make reference to other software and hardware products by name. In most if not all cases, the companies that<br />

manufacture these other products claim these product names as trademarks. It is not the intention of <strong>McAfee</strong> Inc. to claim these names or<br />

trademarks as its own.<br />

Disclaimer<br />

The in<strong>for</strong>mation contained in this document is subject to change without notice.<br />

MCAFEE INC. MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED<br />

WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURP<strong>OS</strong>E.<br />

<strong>McAfee</strong> Inc. shall not be liable <strong>for</strong> errors contained herein or <strong>for</strong> incidental or consequential damages in connection with the furnishing,<br />

per<strong>for</strong>mance, or use of this material.<br />

<strong>McAfee</strong> reserves the right to add, subtract or modify features or functionality, or modify the product, at its sole discretion, without notice.<br />

<strong>McAfee</strong> makes no commitment, implied or otherwise, to support any functionality or technology discussed or referenced in this document.<br />

Page | 2


Contents<br />

Introduction ............................................................................................................................................................................ 4<br />

Purpose and Scope ........................................................................................................................................................... 4<br />

Requirements.................................................................................................................................................................... 4<br />

Planning the <strong>Refresh</strong> Process .................................................................................................................................................. 5<br />

Overview of the <strong>McAfee</strong> <strong>Endpoint</strong> <strong>Encryption</strong> <strong>for</strong> <strong>PC</strong> Boot Process ................................................................................ 5<br />

Preparing the Operating System Images .......................................................................................................................... 6<br />

Preparing the <strong>Windows</strong> PE images (Boot Image) ............................................................................................................. 6<br />

Creating LockedFiles.reg ................................................................................................................................................... 7<br />

Preparing the Target Machine <strong>for</strong> <strong>OS</strong> refresh .................................................................................................................. 7<br />

Operating System <strong>Refresh</strong> Process Overview <strong>for</strong> <strong>PC</strong>s with <strong>Endpoint</strong> <strong>Encryption</strong> Active ................................................. 8<br />

EpeWinUpgradeTool Expanded ........................................................................................................................................ 9<br />

Creating the Task Sequence .................................................................................................................................................. 10<br />

Page | 3


Introduction<br />

The <strong>McAfee</strong> <strong>Endpoint</strong> <strong>Encryption</strong> <strong>for</strong> <strong>PC</strong> product provides full disk encryption <strong>for</strong> enterprises.<br />

Purpose and Scope<br />

The purpose of this document is to provide a recommended process <strong>for</strong> refreshing systems running windows operating systems in Master<br />

Boot Record (MBR) mode only, which are encrypted with <strong>McAfee</strong> <strong>Endpoint</strong> <strong>Encryption</strong> v<strong>7.x</strong>.<br />

The purpose of the process described in this document is to refresh the <strong>Windows</strong> operating system without the need of decrypting the disk<br />

and uninstalling <strong>McAfee</strong> <strong>Endpoint</strong> <strong>Encryption</strong>. <strong>OS</strong> <strong>Refresh</strong> is referred in this guide as the process whereby the disk hosting the operating<br />

system, is cleared and a new operating system installed by laying an image using a tool that works on file level and not on sector level. The<br />

process and utilities provided, address the common problems occurring, whilst maintaining the encrypted drive during <strong>OS</strong> refresh.<br />

Intended Audience<br />

The intended audience <strong>for</strong> this document are; IT administrators with a thorough knowledge and experience in re‐imaging via Microsoft<br />

System Center 2012 Service Pack 1 Configuration Manager (SCCM), Microsoft Deployment Toolkit (MDT) 2012 (Update1) and <strong>Endpoint</strong><br />

<strong>Encryption</strong> <strong>for</strong> <strong>PC</strong> Version <strong>7.x</strong>. Here are the main features and products that you will need to know:<br />

• <strong>McAfee</strong> <strong>Endpoint</strong> <strong>Encryption</strong> administration<br />

• <strong>Windows</strong> command line use<br />

• Microsoft Deployment Toolkit (MDT) 2012 (Update1)<br />

• Microsoft System Center 2012 Service Pack 1 Configuration Manager (SCCM)<br />

• Understanding of MBR and <strong>PC</strong> boot process<br />

• <strong>Windows</strong> Assessment and Deployment Kit (ADK)<br />

• Understanding of <strong>Windows</strong> Registry<br />

• Understanding of the use and purpose of Operating System Drivers<br />

Requirements<br />

The minimum requirements <strong>for</strong> the Server environment which hosts the System Center 2012 Configuration Manager are as follows:<br />

• Microsoft System Center 2012 Service Pack 1 Configuration Manager (SCCM)<br />

• Microsoft Deployment Toolkit 2012 Update 1<br />

• <strong>Windows</strong> Assessment and Deployment Kit (ADK) Version 4.0<br />

• User State Migration Tool<br />

• <strong>McAfee</strong> <strong>Endpoint</strong> <strong>Encryption</strong> <strong>for</strong> <strong>PC</strong> Version <strong>7.x</strong><br />

Any Images captured must be done via SCCM or MDT and by following Microsoft official guidelines.<br />

For more in<strong>for</strong>mation please visit: http://technet.microsoft.com/en-us/library/dd744389(v=ws.10).aspx<br />

Page | 4


Planning the <strong>Refresh</strong> Process<br />

The following section here describes how to plan and prepare a refresh process <strong>for</strong> <strong>Windows</strong> operating systems. This includes describing<br />

the <strong>Endpoint</strong> <strong>Encryption</strong> boot process, preparation of images and requirements <strong>for</strong> the refresh process.<br />

Overview of the <strong>McAfee</strong> <strong>Endpoint</strong> <strong>Encryption</strong> <strong>for</strong> <strong>PC</strong> Boot Process<br />

The following diagram shows how a system with <strong>McAfee</strong> <strong>Endpoint</strong> <strong>Encryption</strong> active, boots via a Master Boot Record (MBR) boot process.<br />

<strong>McAfee</strong> <strong>Endpoint</strong><br />

<strong>Encryption</strong> Master<br />

Boot Record (MBR)<br />

<strong>McAfee</strong> <strong>Endpoint</strong><br />

<strong>Encryption</strong> Bootcode<br />

(Safeboot.rsv)<br />

<strong>McAfee</strong> <strong>Endpoint</strong><br />

<strong>Encryption</strong> Pre-Boot File<br />

System (Safeboot.fs)<br />

The <strong>Endpoint</strong> <strong>Encryption</strong> MBR replaces the standard Master Boot Record (Sector 0 of the boot disk) during activation. The <strong>Endpoint</strong><br />

<strong>Encryption</strong> MBR is referred to as the EPE MBR. The control is passed to the MBR following BI<strong>OS</strong> initialization and the code contained in the<br />

MBR is executed. This MBR contains a pointer to the first sector of a sector chain that hosts the BootCode (safeboot.rsv), which is executed<br />

straight after the MBR. It also contains a pointer to the first sector of a sector chain of the <strong>Endpoint</strong> <strong>Encryption</strong> file system (Safeboot.fs),<br />

which hosts the <strong>Windows</strong> <strong>OS</strong> original MBR that is executed after successful authentication.<br />

It is important that the two files Safeboot.rsv and Safeboot.fs and the EPE MBR are maintained on the disk and are never moved at a sector<br />

level. The files are sector chains and copying the file from one place to another does not work as they are not real files. They appear in this<br />

way inside the operating system to prevent it from being moved or overwritten.<br />

Any <strong>Windows</strong> <strong>OS</strong> refresh process has to make sure that the EPE MBR and the two <strong>Endpoint</strong> <strong>Encryption</strong> files are maintained without being<br />

moved. In the case of the EPE MBR this is easy as it is only contained within one sector so taking a backup and then restoring the file by<br />

writing back to sector 0 is sufficient. However, the two <strong>Endpoint</strong><br />

<strong>Encryption</strong> files span across multiple sectors and the only way to preserve them is by using the Microsoft User<br />

Migration Tool (USMT) Hardlink feature. This new feature is used to preserve user files during upgrades without requiring taking copies to<br />

another media. So the same can be applied to the <strong>Endpoint</strong> <strong>Encryption</strong> files.<br />

When the USMT runs, it creates a second pointer to files inside a protected folder. Then, during refresh process, at the point that the disk is<br />

cleared, all files are deleted apart from the ones that have hard links created.<br />

Page | 5


Preparing the Operating System Images<br />

In order to refresh an operating system, an image has to prepared that will be laid over the encrypted disk. This can be done in a number of<br />

ways via SCCM or MDT. However any image that is captured, which results in a WIM file, must have the <strong>Endpoint</strong> <strong>Encryption</strong> Drivers and<br />

Registry Entries injected prior to the refresh process. This will allow the new system to access the disk when it tries to boot. To do this<br />

<strong>McAfee</strong> has provided the EpeWinUpgradeTool.exe <strong>for</strong> 32bit systems and the EpeWinUpgradeTool64.exe <strong>for</strong> 64bit systems. This tool can be<br />

run from a command line with Administrator rights to inject the EE<strong>PC</strong> drivers and registry amendments.<br />

Prior to running the tool extract the following files from the MfeEE<strong>PC</strong>32.msi (<strong>for</strong> 32bit systems) or the MfeEE<strong>PC</strong>64.msi (<strong>for</strong> 64bit systems);<br />

• MfeEpe<strong>PC</strong>.sys<br />

• MfeEEAlg.sys<br />

• MfeEpeOpal.sys<br />

Place these files within a folder located in a convenient location.<br />

Example – C:\Drivers<br />

From a command line run the following command <strong>for</strong> x64 architecture;<br />

Example – EpeWinUpgradeTool64.exe –inject C:\drivers C:\<strong>OS</strong>WIMFILE.wim<br />

This will inject the EE<strong>PC</strong> drivers and make the necessary registry amendments in the target WIM file. Once complete, the WIM file can<br />

either be imported into the SCCM/MDT environment or have its contents re-distributed to the distribution points within SCCM/MDT.<br />

Preparing the <strong>Windows</strong> PE images (Boot Image)<br />

The <strong>Windows</strong> PE environment is used <strong>for</strong> installing or refreshing operating systems. The <strong>Endpoint</strong> <strong>Encryption</strong> driver has to be included<br />

within the <strong>Windows</strong> PE image so the encrypted drive can be accessed by the installer If you are planning to refresh <strong>for</strong> both 32‐bit and 64‐<br />

bit, then you will require two PE images, one <strong>for</strong> 64‐bit and one <strong>for</strong> 32‐bit. To do this the procedure is the same as injecting the EE<strong>PC</strong> drivers<br />

and registry amendments into an Operating System WIM file.<br />

Prior to running the EpeWinUpgradeTool extract the following files from the MfeEE<strong>PC</strong>32.msi (<strong>for</strong> 32bit systems) or the MfeEE<strong>PC</strong>64.msi (<strong>for</strong><br />

64bit systems) (the drivers are the same <strong>for</strong> both the Operating System injection and the Boot Image injection);<br />

• MfeEpe<strong>PC</strong>.sys<br />

• MfeEEAlg.sys<br />

• MfeEpeOpal.sys<br />

Place these files within a folder located in a convenient location.<br />

Example – C:\Drivers<br />

From a command line run the following command <strong>for</strong> x64 architecture;<br />

Example – EpeWinUpgradeTool64.exe –inject C:\drivers C:\BOOTWIMFILE.wim<br />

This will inject the EE<strong>PC</strong> drivers and make the necessary registry amendments in the target WIM file. Once complete the WIM file can either<br />

be imported into the SCCM/MDT environment or have its contents re-distributed to the distribution points within SCCM/MDT.<br />

It is also required to place a copy of the EpeWinUpgradeTool into the boot image. If the image is 32bit use the EpeWinUpgradeTool.exe if<br />

the image is 64bit use the EpeWinUpgradeTool64.exe.<br />

Page | 6


Creating LockedFiles.reg<br />

To prevent the Epe Files being moved at a sector level once the Task Sequence is complete the following registry entry will need to be<br />

created and called lockedfiles.reg. Make sure the location of the SafeBoot.fs and SafeBoot.rsv in the registry file match that actual locations<br />

on disk.<br />

<strong>Windows</strong> Registry Editor Version 5.00<br />

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\MfeEpePc\LockedFiles]<br />

"0"="C:\\SafeBoot.fs"<br />

"1"="C:\\SafeBoot.rsv"<br />

Preparing the User State Migration Tool (USMT)<br />

The user state migration tool has a number of components but the XML required to be modified is MigUser.xml. The following additions<br />

will need to be made to make sure that all required EpeFiles are not moved at a sector level<br />

<br />

Component to migrate all mcafee <strong>Endpoint</strong> encryption files<br />

<br />

<br />

<br />

<br />

C:\[SafeBoot.fs]<br />

C:\[Safeboot.rsv]<br />

<br />

<br />

<br />

<br />

<br />

<br />

Component to migrate all mcafee <strong>Endpoint</strong> encryption registry files<br />

<br />

<br />

<br />

<br />

C:\[lockedfiles.reg]<br />

<br />

<br />

<br />

<br />

<br />

Preparing the Target Machine <strong>for</strong> <strong>OS</strong> refresh<br />

The target machines will require both the EpeWinUpgradeTool and the lockedfiles.reg to be stored locally on the <strong>PC</strong> in the root of C:\ prior<br />

to the task sequence being initiated.<br />

Page | 7


Operating System <strong>Refresh</strong> Process Overview <strong>for</strong> <strong>PC</strong>s with <strong>Endpoint</strong> <strong>Encryption</strong><br />

Active<br />

The main requirements <strong>for</strong> a refresh process on a system with <strong>Endpoint</strong> <strong>Encryption</strong> <strong>for</strong> <strong>PC</strong> active, is to preserve the boot order of the<br />

system as well as the data files used by <strong>Endpoint</strong> <strong>Encryption</strong>. This can accomplished using the EpeWinUpgradeTool.exe and<br />

EpeWinUpgradeTool64.exe tools that provide several arguments to aid the process. An overview of what is required can be broken up<br />

into the three basic areas.<br />

1st Stage ‐ Booting on current <strong>Windows</strong> <strong>OS</strong><br />

1. Shutdown <strong>McAfee</strong> <strong>Endpoint</strong> <strong>Encryption</strong> Agent service<br />

2. Capture and store the EPE MBR<br />

3. Make sure that the <strong>Endpoint</strong> <strong>Encryption</strong> files are part of the XML USMT definitions and insert a step so USMT hardlinks and<br />

preserves the required <strong>Endpoint</strong> <strong>Encryption</strong> files.<br />

4. Unlock <strong>Endpoint</strong> <strong>Encryption</strong> files<br />

5. Unhide <strong>Endpoint</strong> <strong>Encryption</strong> files<br />

6. Restore EPE MBR just be<strong>for</strong>e the system restarts as final step<br />

2nd Stage ‐ Booting on <strong>Windows</strong> PE<br />

1. Store <strong>Endpoint</strong> <strong>Encryption</strong> MBR as first step in the process<br />

2. Restore <strong>Endpoint</strong> <strong>Encryption</strong> MBR.<br />

3rd Stage ‐ Booting on new <strong>Windows</strong> <strong>OS</strong><br />

1. Make sure that USMT runs the load state tool to restore <strong>Endpoint</strong> <strong>Encryption</strong> files.<br />

2. Amend Registry with LockedFiles.reg<br />

3. Hide <strong>Endpoint</strong> <strong>Encryption</strong> files.<br />

Page | 8


EpeWinUpgradeTool Expanded<br />

A utility was developed to allow administrators to carry out the necessary steps during the <strong>OS</strong> refresh process. As previously mention in this<br />

guide the utility is called EpeWinUpgradeTool.exe (x86) and there is also an x64 version called EpeWinUpgradeTool64.exe. The<br />

utility can be run at the command line with Administrator rights and offers the following options:<br />

NOTE: The refresh tools are attached to: https://kc.mcafee.com/corporate/index?page=content&id=KB78376<br />

-SaveMbr <br />

Stores the EPE MBR to a file specified by filename.<br />

-SetMbr <br />

Restores the EPE MBR from a file specified by filename.<br />

-SetFileLocks <br />

It locks or unlocks the EPE files. Use "Lock" or "Unlock" <strong>for</strong> command<br />

-Inject <br />

Injects EE<strong>PC</strong> drivers into a WIM Image<br />

-MountWim <br />

Mount Image in a specified Directory<br />

-UnmountWim [Save]<br />

Unmount the Image. Update Image if “Save”<br />

-ForceMBR <br />

Restore MBR from file continuously<br />

Page | 9


Creating the Task Sequence<br />

1. Using the Create MDT Task Sequence option from within the SCCM we are now going to create the initial task sequence that will<br />

be used to refresh the Operation System.<br />

2. Using the Task Sequence Wizard select the Task Sequence Template “Client Task Sequence”.<br />

3. Name the Task Sequence and add comments if required.<br />

Page | 10


4. Enter required details <strong>for</strong> joining a network<br />

5. It is required that an image is captured and prepared based on the steps in this document prior to this point so there is no need to<br />

capture an image.<br />

Page | 11


6. Select the correct architecture Boot image, again this should have been prepared as detailed in this document<br />

7. Select the required Microsoft Deployment Toolkit Package.<br />

Page | 12


8. Specify the Operating System that will be used in the refresh process. This will need to have been prepared using the steps<br />

detailed previously in this document.<br />

9. Select the deployment method that is required.<br />

Page | 13


10. Select the required Configuration Manager Client Package<br />

11. Specify the USMT package, making sure the package contains the amendments <strong>for</strong> the MigUser.xml stated previously in this<br />

document.<br />

Page | 14


12. Select the correct settings package required <strong>for</strong> the client machine<br />

13. Select the required Sysprep package settings.<br />

Page | 15


14. Check the overall summary and complete the remaining steps until completion.<br />

15. On completion of the task sequence wizard all mentions to FORMATING and PARTITIONING will need to be removed or disabled,<br />

this does not prevent a refresh of the operating system but instead will only allow the <strong>OS</strong> partition to be wiped and upgraded.<br />

16. The Task Sequence will now need to be edited to include specific EE<strong>PC</strong> tasks. The first steps that will need to be added to the<br />

current task sequence under the branch State Capture. From the diagram below the branch EpeCapture has been added which<br />

includes the following steps<br />

a. Shutdown EE<strong>PC</strong> Service. This step is a command line option and requires the following string to be added to the<br />

“Command Line” field.<br />

SC Stop “<strong>McAfee</strong> <strong>Endpoint</strong> <strong>Encryption</strong> Agent”<br />

b. Save EE<strong>PC</strong> MBR. This step is a command line option and requires the following string to be added to the “Command<br />

Line” field.<br />

EpeWinUpgradeTool.exe –SaveMBR C:\EpeMBR.dat<br />

c. Unlock EPE Files. This step is a command line option and requires the following string to be added to the “Command<br />

Line” field.<br />

EpeWinUpgradeTool.exe –setfilelocks unlock<br />

d. Unhide EPE Files. This step is a command line option and requires the following string to be added to the “Command<br />

Line” field.<br />

Attrib –r –s –h c:\safeboot.*<br />

e. Restore EPE MBR. This step is a command line option and requires the following string to be added to the “Command<br />

Line” field. The <strong>for</strong>ceMBR switch will spawn a new EpeWinUpgradeTool process that will keep replacing the Epe MBR at<br />

select intervals so that is not replaced by the standard <strong>Windows</strong> MBR during the task sequence process.<br />

EpeWinUpgradeTool.exe –<strong>for</strong>ceMBR C:\EpeMBR.dat<br />

Page | 16


17. The next amendment to the Task Sequence is during the WinPE stage with the following changes, as seen in the diagram below<br />

a. Save EE<strong>PC</strong> MBR. This step is a command line option and requires the following string to be added to the “Command<br />

Line” field.<br />

EpeWinUpgradeTool.exe –SaveMBR X:\EpeMBR.dat<br />

b. Restore EPE MBR. This step is a command line option and requires the following string to be added to the “Command<br />

Line” field.<br />

EpeWinUpgradeTool.exe –<strong>for</strong>ceMBR X:\EpeMBR.dat<br />

Page | 17


18. Next is to amend the newly refreshed Operating Systems registry and to hide the Epe Files that were previously unhidden. Add the<br />

following steps to the location shown in the diagram. Until the refreshed machine has been rebooted, do not run any clean up<br />

tasks such as <strong>Windows</strong> Defrag as the Epe Files will still be in an unlocked state.<br />

a. Registry Entry <strong>for</strong> Locked Files. This step is a command line option and requires the following string to be added to the<br />

“Command Line” field.<br />

Regedit /s lockedfiles.reg<br />

b. Hide EPE Files. This step is a command line option and requires the following string to be added to the “Command Line”<br />

field.<br />

Attrib +r +s +h c:\safeboot.*<br />

19. The last edit to be made is the removal of any tasks relating the disabling or enabling of BitLocker.<br />

Page | 18

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!