You are viewing limited content. For full access, please sign in.

Question

Question

Securing Files in Windows

asked on December 10, 2022

Hello All,

There is a wealth of information for Laserfiche but I have been unable to find a good enough search string to answer this questions. I am concerned about the nature of how .tif files are plainly visible in our Laserfiche storage drive. Laserfiche logins protect people from being able to browse to them in the Laserfiche interfaces, but I am able to login to the server that actually houses the files and browse to them. While this requires a server level login as a form of protection, I was wondering if there is a feature or configuration I am missing that could further protect the sensitive documents from exfiltration of we are ever compromised. Can anyone point me towards a suggestion or is this just not possible?

 

Thanks all!

0 0

Replies

replied on December 10, 2022

Trevor, this White Paper has some really good information regarding securing data at rest that should help answer some questions for you.

0 0
replied on December 12, 2022

To follow up on this, here are some additional options:

  1. Implement MFA for RDP sessions to servers. Duo (and I'm sure others) have a good solution for this.
     
  2. Disable file sharing/remote access to your Laserfiche volumes and configure auditing and alerting to trigger if it's re-enabled (assume a theoretical attacker has local admin rights and could re-enable).
    If an attacker gets onto a random server on your network, they shouldn't be able to use File Explorer/robocopy/etc. to access your repo content at UNC path \\RepoServer\D$\Repositories\HumanResources\
     
  3. Apply a Windows audit policy to your repository volumes. If you have a SIEM, configure it to ingest the resulting audit logs and throw alerts whenever any trustee other than the Laserfiche Server service identity attempts to access the repository directory. 
    See also: Audit File Accesses, Read Events on Windows File Servers (note: how-to article from a software vendor with whom we have relationship).
     
  4. If your endpoint protection solution supports indicating specific servers/directories to watch and alert on for file exfiltration, configure it to watch your repository directories and Forms File Storage volumes (if any).
     
  5. Make exfiltration more difficult by blocking general outbound internet access except to approved sites and/or route external bound traffic  through a security proxy that can inspect for and block/alert on exfiltration attempts.
0 0
replied on December 13, 2022

I  must lack the privileges to download the white paper. 

0 0
You are not allowed to follow up in this post.

Sign in to reply to this post.