CTE Configuration Workflow
In order to configure CTE with DFS(R), you must complete the following tasks:
- 
Make sure you have a valid backup of the data you intend to encrypt.
 - 
Identify the volumes or folders you intend to encrypt.
 - 
Select an encryption method and make sure you understand how to create and deploy CTE GuardPoints using that encryption method. For details, see one of the following documents:
 - 
Create a DFS(R) Process Set and User Set for the policy. For details, see Creating Required DFS(R) Policy Components.
 - 
Create the policies and GuardPoints you need to protect your data, using the process appropriate to the selected encryption method. For details, see one of the following:
 - 
Consider configuring all nodes within a DFS topology under a single CipherTrust Client Group