Example of Creating an IDT-Capable GuardPoint on an Existing Linux Device
The following example shows the process of initializing an existing Linux device using voradmin idt config xform
and guarding it as an IDT-Capable GuardPoint from the viewpoint of the Linux root user. In this example, all files in /bin/*
are copied to a temporary location outside the device, then compared with the corresponding files on the device after the device has been resized and encrypted. The comparison proves that the file system is unchanged after the encryption process has completed.
First, we verify that the device is not protected, then we check the current size of the disk and create the copy of the files in /bin/*
. After that, we run the voradmin idt config xform
command to initialize the device.
At this point, you need to resize the device using your device management tools. You must increase the size by at least 41347072 sectors (40378 MBs). After the device has been resized, you can verify the new size:
After the device has been resized, the Administrator can guard the device with the desired in-Place Data Transformation policy. If the Administrator chooses Auto Guard, data transformation begins as soon as the policy is pushed to the host. If the Administrator chooses Manual Guard, data transformation does not begin until the Linux root user initiates it with the secfsd -guard
command. Once data transformation begins, the Linux root user can check the progress using the voradmin idt status xform
command.
After the status has changed to completed, you can compare the current version of the files in /bin/*
with the ones you copied earlier.