I currently have a Dell laptop that runs Windows for work. I use an external SSD via the Thunderbolt port to boot Linux allowing me to use the laptop as a personal device on a completely separate drive. All I have to do is F12 at boot, then select boot from USB drive.

However, this laptop is only using 1 of the 2 internal M.2 ports. Can I install Linux on a 2nd M.2 drive? I would want the laptop to normally boot Windows without a trace of the second option unless the drive is specified from the BIOS boot options.

Will this cause any issues with Windows? Will I be messing anything up? For the external drive setup, I installed Linux on a different computer, then transferred the SSD to the external drive. Can I do the same for the M.2 SSD – install Linux on my PC, then transfer that drive to the laptop?

Any thoughts or comments are welcome.

  • Quazatron@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    1 year ago

    I understand the rationale behind you doing this, I’ve done it myself.

    Your company sends you abroad for a week or two. You want to access your Netflix account but don’t want to do it on the company computer. On the other hand you don’t want to carry two laptops with you.

    As others have said, tampering company hardware can get you in trouble with the IT department, and it’s enough to get you fired in some cases.

    If you value your job get permission to do it or get yourself a tablet.

  • LoveSausage@lemmy.ml
    link
    fedilink
    arrow-up
    0
    ·
    1 year ago

    Damn my laptop has secure boot and extra on top , I believe the usb ports are physically disabled.

    I assume everything is watched on what I’m doing. Can’t remember the wording but i can’t do shit without getting in a heap of trouble.

    Browser add-ons are like a 2 week process to get approved

  • thequickben@beehaw.org
    link
    fedilink
    arrow-up
    0
    ·
    1 year ago

    I’ve seen many people fired for doing less on a work laptop. Do not modify the physical machine. I’m surprised they don’t have USB locked off already. I’d get a personal machine.

  • Karna@lemmy.ml
    link
    fedilink
    arrow-up
    0
    ·
    edit-2
    1 year ago

    In most cases, work laptops have software(s) installed to automatically keep track of these activities, and flag it to security team of your organization. At that point, it will either lead to a formal warning to you, or termination/forced resignation.

    From organization point of view, this is to avoid any accidental (or intentional) leak of confidential data, and/or accidentally (or intentionally) infecting your (work) system with malware/ransomware.

    The latter had happened in one of my previous organizations, and the person responsible was terminated from job immediately.

  • friend_of_satan@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 year ago

    If the second internal ssd is there when windows boots, it will leave a trace. IMHO booting off the external drive is the best option if you want it to leave no trace on the windows partitions.

    Also, it’s possible any booted device will leave a trace in the bios or uefi boot logs, which your corporation may have configured to ship to their audit logs or something similar.

    • StorageB@lemmy.oneOP
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 year ago

      Thanks for the information. And good point - I will check to see if there’s any logs in the BIOS. Is there any way to know if boot logs are being sent? Is that a BIOS setting, or something that would be configured in Windows?

      • friend_of_satan@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 year ago

        I’m not familiar with windows so I don’t know exactly how to tell if the logs are being sent to a central log store. My assumption about how it would work is windows would have a capability that reads the UEFI boot logs and sends them with other windows system logs to a central log store. This feature is almost certainly built into windows. You may be able to open up a log inspection tool of some sort and search them. I’m really just guessing about these details from first principles though.

  • hash@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    1 year ago

    Forget the technical details. I work in a corporate security department and if yours finds out what you’re doing there’s high odds they would absolutely hate it. I mean it likely isn’t an issue for org security (assuming they’re using bitlocker appropriately etc.) But not everyone over security is so rational and there are edge case attacks which may even trouble more sensible individuals. Either get permission, expect to do this in secret, or better yet just don’t.

    • andrew@lemmy.stuart.fun
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 year ago

      Not to mention you really can’t hide that other drive from windows, and I’m sure a lot of the security tools would start screaming about new storage added when not expected. Data Loss Prevention is a big deal and random storage showing up doesn’t often mean the user has good things planned.

      • Goku@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        1 year ago

        Yeah… I really don’t see the motives to do this either. Possibly:

        1. I guess if you’re traveling and you have to bring 2 laptops.

        2. Or you can’t afford a PC with the same specs as your work laptop.

        Both of those situations don’t warrant booting work laptop to external personal HD though.

    • 520@kbin.social
      link
      fedilink
      arrow-up
      0
      ·
      1 year ago

      I mean it likely isn’t an issue for org security (assuming they’re using bitlocker appropriately etc.)

      Data loss/leak prevention would vehemently disagree. It’s a potential exfiltration point, especially if the org is blocking USB writes.

      Networking might have a thing or two to say about it as well, as it is essentially an untrusted setup on company networks

    • StorageB@lemmy.oneOP
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 year ago

      From a technical perspective I’m curious - how would they know a drive has been added without physically inspecting the laptop?

      • 520@kbin.social
        link
        fedilink
        arrow-up
        0
        ·
        1 year ago

        Intel IME can snitch on this kind of thing. Completely independent of the OS too.

      • WarmSoda@lemm.ee
        link
        fedilink
        arrow-up
        0
        ·
        edit-2
        1 year ago

        I’m glad you asked, people provided some great answers.

        Good rule of thumb is just don’t mess with company property at all, cuz they’ll know. For example I simply turned a wall TV on one weekend so my skeleton crew had something to do, and I was asked why a few days later. If it’s electronic they can track it.

      • astraeus@programming.dev
        link
        fedilink
        arrow-up
        0
        ·
        1 year ago

        Microsoft system administrators have full access to any physical device information, this includes a report on new internal devices or changes. Your company may not be so serious about security, but why on earth are you willing to risk your livelihood on this?

        • w2tpmf@lemmy.world
          link
          fedilink
          arrow-up
          0
          ·
          1 year ago

          Not just Windows sys admins … I have this access to MacBooks, tablets, and phones in my company.

          Windows, MacOS, Linux, iOS, Android … If it’s in use in an enterprise environment that knows what they’re doing, they have full access to the device.

      • BetaDoggo_@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        1 year ago

        The drive is visible to the OS so if they have any kind of management software in place which looks for hardware changes it will be noticed.

      • survivalmachine@beehaw.org
        link
        fedilink
        arrow-up
        0
        ·
        1 year ago

        CPU/BIOS-level system management engines such as Intel IME/vPro or AMD Secure Technology give device access to IT even if the OS is replaced or the system is powered off.

        If your IT staff isn’t utilizing that technology, then when you boot into a corporate-managed OS, they can see any hardware that is currently connected to the system.

        If they’re not doing any monitoring at all, you’re fine (but the viability of the business is in question). If they’re doing OS-level monitoring, stick with the USB thing and leave it unplugged when booted into the corporate OS. If they’re doing CPU-level monitoring, you’re already likely flagged.

        If you’re unsure how much monitoring they’re doing, attempting to find out may also be a resume-generating event (RGE). Cheers, and good luck!

  • db2@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    1 year ago

    You’re better off doing it the current way. Or better still just get one for yourself if you use it that much.

    • StorageB@lemmy.oneOP
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 year ago

      Sure, people should not use their work computer for personal use.

      However, I would say the majority of people absolutely do use it for occasional personal use. Checking your personal email at work? Googling driving directions to the dentist? Using the pdf editor to fill out a form? Searching for a flight during your lunch break? I would say everyone I see at work does this, and I would bet that when they take their laptop home they would not hesitate to boot it up for personal use. And the people working remotely I would wager use it even more.

      I’m not saying it’s right, but I do think using a completely separate SSD and OS is way more responsible from a security perspective.

      • thejml@lemm.ee
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 year ago

        I feel like 10-15 yrs ago, you’d be absolutely right here, but not now. Everyone I know, even less technical folks, keep it separate simply because they do that stuff on their phone instead.

      • pivot_root@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        1 year ago

        Just because people do it doesn’t mean you should.

        Using a separate SSD and OS might work fine for protecting your data from company monitoring software, but it doesn’t protect company data from your rogue OS. If your company has a dedicated security team, your head will roll when they find out you put the company at risk. And if they don’t, you better hope IT is either apathetic or incompetent.

        It’s not worth the risk of losing your job for being a liability. They might not be able to tell future employers why you are no longer employed with them, but “we would not hire {you} again if given the opportunity” speaks for itself.

        Just buy a shitty laptop and use that.

      • chalupapocalypse@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        1 year ago

        If you have a job that gave you a computer you can probably afford to go buy your own.

        Depending on the org this is a fireable offense, and at the very least highly suspect, so just be aware.

      • 520@kbin.social
        link
        fedilink
        arrow-up
        0
        ·
        1 year ago

        Sure, people should not use their work computer for personal use.

        This isn’t great. But what you’re wanting to do will get you fired.

      • FigMcLargeHuge@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 year ago

        and I would bet that when they take their laptop home they would not hesitate to boot it up for personal use. And the people working remotely I would wager use it even more.

        Are you willing to bet your job or career on this? If so, proceed. Otherwise, I would heed the multiple warnings given in this thread. But then again, you might just be one of those fuck around and find out types. If so, be sure and drop in here and let us know how well it went.

      • Patch@feddit.uk
        link
        fedilink
        arrow-up
        0
        ·
        1 year ago

        Simple question: what would your employer say if you asked them?

        My contract has a standard “no using company computers for personal business” clause. However I feel entirely confident that my employer doesn’t mind me using it to do personal errands using the web browser (on my own time). And I know they have no problem with me using Zoom or Teams to join meetings for non-work things in the evening. How do I know this? Because I asked them…

        I’ve never asked them “can I install a new hard drive in my laptop, install an OS I downloaded off the internet, and boot into that OS to do things which I’d rather you not be able to track like you could on the main OS”. But I’m completely confident I’d know what the answer would be if I did ask.

        If you think installing a new SSD etc. is acceptable, ask them. If you’re not asking them because you’re worried they’d say “no”, then don’t do it.

        Try asking them instead if you can use your laptop to look up directions to the dentist on Google Maps. See if you get the same answer.

      • 𝘋𝘪𝘳𝘬@lemmy.ml
        link
        fedilink
        arrow-up
        0
        ·
        1 year ago

        There is a difference between using software on a work computer for private purposes and installing another OS on a work computer, don’t you think?

      • SavvyWolf@pawb.social
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 year ago

        There’s a difference between using a web browser to access certain websites, which still use the sandboxing and safe environment that the company has set up, and running your own OS which has unrestricted hardware access to everything.

        IT likely knows that people will use their laptops for personal use, but probably trust that browsers are good enough at sandboxing that is not a concern. They can also tweak settings in whatever Windows management thingie they’re using to ensure that everything is up to date and all the programs you are running are safe.

        However, running your own OS is very different. They can’t trust the browser sandbox or OS any more. They can’t trust that you’ll only run safe software. They can’t trust that you’ll not install malware that will infect firmware or your Windows install (which will steal company secrets).

        If I were running an IT department I’d 100% lock down the efi and require a password. I’d try to make it as frictionless as possible if you wanted a certain distro for work reasons, but ultimately I’d like to know what’s going on.

    • phx@lemmy.ca
      link
      fedilink
      arrow-up
      0
      ·
      1 year ago

      Yes, and especially don’t fuck with the hardware or core boot/OS configuration. That’d the kind of stuff that can get you fired in most orgs I’ve been in.

      Is Linux likely to mess up the stuff in Windows: probably not? It does require you to do likely-unauthorized things to the device to install, including potentially circumventing some controls required in the work device.

      Whether it causes issue or not, circumventing those policies or controls is not going to land well if you get caught at it.

  • satanmat@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    1 year ago

    DO NOT install a second M.2

    Use the external drive

    If the internal drive is in there, you could be asked at work to turn it in. It is not a good look to ask to remove an internal drive.

    • StorageB@lemmy.oneOP
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 year ago

      This is a great point. The laptop does have a quick access panel for the M.2 drive, but a screwdriver would still be required to remove the screw holding the drive in place.

  • naonintendois@programming.dev
    link
    fedilink
    arrow-up
    0
    ·
    1 year ago

    I knew someone who did this but swapped out the physical hard drive each time. I wouldn’t dual boot because then it’s much more obvious to IT what you’ve done.

    This is only realistically feasible though if the hard drive is easily accessible. If it’s something like a Mac or soldered in dual booting is your only choice. As others have said, this could get you in a lot of trouble with your company. Check the docs you’ve signed

  • phanto@lemmy.ca
    link
    fedilink
    arrow-up
    0
    ·
    1 year ago

    I had a work laptop and did the “external USB” thing. One day, at work, I’m messing with my Linux on a public wifi, having unplugged from the corporate LAN.

    A co-worker walks by, sees the Network cord unplugged, plugs it in. I am oblivious in the washroom.

    Corporate security got to my laptop before I did.

    I didn’t get fired.

    I don’t work there anymore, though.

  • acockworkorange@mander.xyz
    link
    fedilink
    arrow-up
    0
    ·
    1 year ago

    You can buy a used ThinkPad T480 for like $75 on ebay. A lot cheaper than having to explain your shenanigans to Maude from HR.

    • fpslem@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      1 year ago

      Honestly, this is good advice. It’s much better to keep personal computer activity on a personal device, whether that’s on a ThinkPad or anything else.

  • SavvyWolf@pawb.social
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 year ago

    For anyone wondering about the security issues caused by this, even if the windows partition is encrypted, it’s still possible to get secrets from the Windows install.

    If you have root access to a Linux machine, you can easily replace the Windows kernel loader with one that looks just like Windows, but does nothing other than steal your encryption password on login/boot.

    Secure Boot/TPM would protect against this, but Linux users (especially those that are more lax about security) tend to disable it as part of installing Linux.