Use Case 2: Device-Level GuardPoints
Protect structured or unstructured data stored in data files. The data files are organized inside one or more directories or folders within a file system namespace, such as NTFS or ReFS, without any protection on the folders or the file system namespace. In this use case, the file system resides in the device guarded as Efficient Storage using a policy with a key rule and no user specified access rule. Access rules are not applicable in this use case and should not be used.
File system resides in device guarded as ES GuardPoint
Example
In the following example, the Windows Administrator has created a new 10 MG VHD in the Windows Disk Management tool. This VHD is called Disk 3, and it has not yet been initialized.
The Windows Administrator then uses voradmin esg list disk
to get the CTE device name for the new disk and initializes it using the voradmin esg config new
command, as shown:
The Administrator guards the new disk through the CipherTrust Manager, and uses the voradmin esg status
command to make sure the new disk has been successfully guarded.
After the device has been guarded, the Administrator returns to the Windows Disk Manager and selects Action > Rescan Disks to make sure the Windows Disk Manager is synchronized with CTE. They then initialize the disk, create a new volume for it, and format it. Notice that the new volume size is slightly smaller than the original 10 GB because CTE has reserved room for the CTE Private Region.