I currently have a Dell laptop that runs Windows for work. I use an external SSD via the Thunderbolt port to boot Linux allowing me to use the laptop as a personal device on a completely separate drive. All I have to do is F12 at boot, then select boot from USB drive.

However, this laptop is only using 1 of the 2 internal M.2 ports. Can I install Linux on a 2nd M.2 drive? I would want the laptop to normally boot Windows without a trace of the second option unless the drive is specified from the BIOS boot options.

Will this cause any issues with Windows? Will I be messing anything up? For the external drive setup, I installed Linux on a different computer, then transferred the SSD to the external drive. Can I do the same for the M.2 SSD – install Linux on my PC, then transfer that drive to the laptop?

Any thoughts or comments are welcome.

  • thefactremains@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    8 months ago

    The answer here is very simple. Your employer will find out what you’re doing.

    So obviously you should be asking them, if anyone. Not us Lemmings.

  • Quazatron@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    8 months ago

    I understand the rationale behind you doing this, I’ve done it myself.

    Your company sends you abroad for a week or two. You want to access your Netflix account but don’t want to do it on the company computer. On the other hand you don’t want to carry two laptops with you.

    As others have said, tampering company hardware can get you in trouble with the IT department, and it’s enough to get you fired in some cases.

    If you value your job get permission to do it or get yourself a tablet.

  • BaumGeist@lemmy.ml
    link
    fedilink
    arrow-up
    0
    ·
    8 months ago

    The big takeaway is that you do not own this computer. It is not yours, it is being lent to them for a very specific purpose. And what you want to do, hell what you’re already doing, is way outside of that purpose.

    How would you feel if you lent a friend your conputer to check their email and found out they had bypassed a lot of your security mechanisms (passwords) to set up their own admin account?

    What about when you begrudgingly get a MFA app on your personal phone because your employer’s too cheap to shell out for a yubikey or hardware token? How would you feel if their app also rooted your phone just for shits and giggles?

    What you’re proposing is not only dangerous to your career, it’s also potentially illegal. And also just downright unethical.

  • thequickben@beehaw.org
    link
    fedilink
    arrow-up
    0
    ·
    8 months ago

    I’ve seen many people fired for doing less on a work laptop. Do not modify the physical machine. I’m surprised they don’t have USB locked off already. I’d get a personal machine.

    • L3ft_F13ld!@links.hackliberty.org
      link
      fedilink
      arrow-up
      0
      ·
      edit-2
      8 months ago

      This was my first thought as well.

      Be happy you can boot from a USB. Do NOT fuck with the machine unless you want to look for another job.

  • hash@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    8 months ago

    Forget the technical details. I work in a corporate security department and if yours finds out what you’re doing there’s high odds they would absolutely hate it. I mean it likely isn’t an issue for org security (assuming they’re using bitlocker appropriately etc.) But not everyone over security is so rational and there are edge case attacks which may even trouble more sensible individuals. Either get permission, expect to do this in secret, or better yet just don’t.

    • jecht360@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      8 months ago

      Exactly. This is a terrible idea. I’m fairly certain that anyone caught doing this would be immediately fired at some companies.

      • Goku@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        8 months ago

        Yeah… I really don’t see the motives to do this either. Possibly:

        1. I guess if you’re traveling and you have to bring 2 laptops.

        2. Or you can’t afford a PC with the same specs as your work laptop.

        Both of those situations don’t warrant booting work laptop to external personal HD though.

    • andrew@lemmy.stuart.fun
      link
      fedilink
      English
      arrow-up
      0
      ·
      8 months ago

      Not to mention you really can’t hide that other drive from windows, and I’m sure a lot of the security tools would start screaming about new storage added when not expected. Data Loss Prevention is a big deal and random storage showing up doesn’t often mean the user has good things planned.

    • 520@kbin.social
      link
      fedilink
      arrow-up
      0
      ·
      8 months ago

      I mean it likely isn’t an issue for org security (assuming they’re using bitlocker appropriately etc.)

      Data loss/leak prevention would vehemently disagree. It’s a potential exfiltration point, especially if the org is blocking USB writes.

      Networking might have a thing or two to say about it as well, as it is essentially an untrusted setup on company networks

    • StorageB@lemmy.oneOP
      link
      fedilink
      English
      arrow-up
      0
      ·
      8 months ago

      From a technical perspective I’m curious - how would they know a drive has been added without physically inspecting the laptop?

      • 520@kbin.social
        link
        fedilink
        arrow-up
        0
        ·
        8 months ago

        Intel IME can snitch on this kind of thing. Completely independent of the OS too.

      • astraeus@programming.dev
        link
        fedilink
        arrow-up
        0
        ·
        8 months ago

        Microsoft system administrators have full access to any physical device information, this includes a report on new internal devices or changes. Your company may not be so serious about security, but why on earth are you willing to risk your livelihood on this?

        • w2tpmf@lemmy.world
          link
          fedilink
          arrow-up
          0
          ·
          8 months ago

          Not just Windows sys admins … I have this access to MacBooks, tablets, and phones in my company.

          Windows, MacOS, Linux, iOS, Android … If it’s in use in an enterprise environment that knows what they’re doing, they have full access to the device.

      • survivalmachine@beehaw.org
        link
        fedilink
        arrow-up
        0
        ·
        8 months ago

        CPU/BIOS-level system management engines such as Intel IME/vPro or AMD Secure Technology give device access to IT even if the OS is replaced or the system is powered off.

        If your IT staff isn’t utilizing that technology, then when you boot into a corporate-managed OS, they can see any hardware that is currently connected to the system.

        If they’re not doing any monitoring at all, you’re fine (but the viability of the business is in question). If they’re doing OS-level monitoring, stick with the USB thing and leave it unplugged when booted into the corporate OS. If they’re doing CPU-level monitoring, you’re already likely flagged.

        If you’re unsure how much monitoring they’re doing, attempting to find out may also be a resume-generating event (RGE). Cheers, and good luck!

      • BetaDoggo_@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        8 months ago

        The drive is visible to the OS so if they have any kind of management software in place which looks for hardware changes it will be noticed.

      • WarmSoda@lemm.ee
        link
        fedilink
        arrow-up
        0
        ·
        edit-2
        8 months ago

        I’m glad you asked, people provided some great answers.

        Good rule of thumb is just don’t mess with company property at all, cuz they’ll know. For example I simply turned a wall TV on one weekend so my skeleton crew had something to do, and I was asked why a few days later. If it’s electronic they can track it.

  • db2@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    8 months ago

    You’re better off doing it the current way. Or better still just get one for yourself if you use it that much.

    • phx@lemmy.ca
      link
      fedilink
      arrow-up
      0
      ·
      8 months ago

      Yes, and especially don’t fuck with the hardware or core boot/OS configuration. That’d the kind of stuff that can get you fired in most orgs I’ve been in.

      Is Linux likely to mess up the stuff in Windows: probably not? It does require you to do likely-unauthorized things to the device to install, including potentially circumventing some controls required in the work device.

      Whether it causes issue or not, circumventing those policies or controls is not going to land well if you get caught at it.

    • StorageB@lemmy.oneOP
      link
      fedilink
      English
      arrow-up
      0
      ·
      8 months ago

      Sure, people should not use their work computer for personal use.

      However, I would say the majority of people absolutely do use it for occasional personal use. Checking your personal email at work? Googling driving directions to the dentist? Using the pdf editor to fill out a form? Searching for a flight during your lunch break? I would say everyone I see at work does this, and I would bet that when they take their laptop home they would not hesitate to boot it up for personal use. And the people working remotely I would wager use it even more.

      I’m not saying it’s right, but I do think using a completely separate SSD and OS is way more responsible from a security perspective.

      • Patch@feddit.uk
        link
        fedilink
        arrow-up
        0
        ·
        8 months ago

        Simple question: what would your employer say if you asked them?

        My contract has a standard “no using company computers for personal business” clause. However I feel entirely confident that my employer doesn’t mind me using it to do personal errands using the web browser (on my own time). And I know they have no problem with me using Zoom or Teams to join meetings for non-work things in the evening. How do I know this? Because I asked them…

        I’ve never asked them “can I install a new hard drive in my laptop, install an OS I downloaded off the internet, and boot into that OS to do things which I’d rather you not be able to track like you could on the main OS”. But I’m completely confident I’d know what the answer would be if I did ask.

        If you think installing a new SSD etc. is acceptable, ask them. If you’re not asking them because you’re worried they’d say “no”, then don’t do it.

        Try asking them instead if you can use your laptop to look up directions to the dentist on Google Maps. See if you get the same answer.

      • 𝘋𝘪𝘳𝘬@lemmy.ml
        link
        fedilink
        arrow-up
        0
        ·
        8 months ago

        There is a difference between using software on a work computer for private purposes and installing another OS on a work computer, don’t you think?

      • thejml@lemm.ee
        link
        fedilink
        English
        arrow-up
        0
        ·
        8 months ago

        I feel like 10-15 yrs ago, you’d be absolutely right here, but not now. Everyone I know, even less technical folks, keep it separate simply because they do that stuff on their phone instead.

      • SavvyWolf@pawb.social
        link
        fedilink
        English
        arrow-up
        0
        ·
        8 months ago

        There’s a difference between using a web browser to access certain websites, which still use the sandboxing and safe environment that the company has set up, and running your own OS which has unrestricted hardware access to everything.

        IT likely knows that people will use their laptops for personal use, but probably trust that browsers are good enough at sandboxing that is not a concern. They can also tweak settings in whatever Windows management thingie they’re using to ensure that everything is up to date and all the programs you are running are safe.

        However, running your own OS is very different. They can’t trust the browser sandbox or OS any more. They can’t trust that you’ll only run safe software. They can’t trust that you’ll not install malware that will infect firmware or your Windows install (which will steal company secrets).

        If I were running an IT department I’d 100% lock down the efi and require a password. I’d try to make it as frictionless as possible if you wanted a certain distro for work reasons, but ultimately I’d like to know what’s going on.

      • pivot_root@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        8 months ago

        Just because people do it doesn’t mean you should.

        Using a separate SSD and OS might work fine for protecting your data from company monitoring software, but it doesn’t protect company data from your rogue OS. If your company has a dedicated security team, your head will roll when they find out you put the company at risk. And if they don’t, you better hope IT is either apathetic or incompetent.

        It’s not worth the risk of losing your job for being a liability. They might not be able to tell future employers why you are no longer employed with them, but “we would not hire {you} again if given the opportunity” speaks for itself.

        Just buy a shitty laptop and use that.

      • chalupapocalypse@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        8 months ago

        If you have a job that gave you a computer you can probably afford to go buy your own.

        Depending on the org this is a fireable offense, and at the very least highly suspect, so just be aware.

      • 520@kbin.social
        link
        fedilink
        arrow-up
        0
        ·
        8 months ago

        Sure, people should not use their work computer for personal use.

        This isn’t great. But what you’re wanting to do will get you fired.

      • FigMcLargeHuge@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        0
        ·
        8 months ago

        and I would bet that when they take their laptop home they would not hesitate to boot it up for personal use. And the people working remotely I would wager use it even more.

        Are you willing to bet your job or career on this? If so, proceed. Otherwise, I would heed the multiple warnings given in this thread. But then again, you might just be one of those fuck around and find out types. If so, be sure and drop in here and let us know how well it went.

  • satanmat@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    8 months ago

    DO NOT install a second M.2

    Use the external drive

    If the internal drive is in there, you could be asked at work to turn it in. It is not a good look to ask to remove an internal drive.

    • StorageB@lemmy.oneOP
      link
      fedilink
      English
      arrow-up
      0
      ·
      8 months ago

      This is a great point. The laptop does have a quick access panel for the M.2 drive, but a screwdriver would still be required to remove the screw holding the drive in place.

  • General_Shenanigans@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    8 months ago

    As many companies now use Bitlocker encryption, you’ll probably Bitlock your work partition by trying to install the second drive internally. IF YOU MUST boot to another drive, keep it external. And DO NOT unlock or mount your work partition in your personal OS. Really, though, you shouldn’t do this at all.

  • phanto@lemmy.ca
    link
    fedilink
    arrow-up
    0
    ·
    8 months ago

    I had a work laptop and did the “external USB” thing. One day, at work, I’m messing with my Linux on a public wifi, having unplugged from the corporate LAN.

    A co-worker walks by, sees the Network cord unplugged, plugs it in. I am oblivious in the washroom.

    Corporate security got to my laptop before I did.

    I didn’t get fired.

    I don’t work there anymore, though.

  • Kangie@lemmy.srcfiles.zip
    link
    fedilink
    arrow-up
    0
    ·
    8 months ago

    Any thoughts or comments are welcome

    If this is a corporate decide your cyber security team have really dropped the ball by enabling you to change the boot order.