CTE Configuration Workflow
In order to configure CTE with DFS(R), you must complete the following tasks:
-
Make sure you have a valid backup of the data you intend to encrypt.
-
Identify the volumes or folders you intend to encrypt.
-
Select an encryption method and make sure you understand how to create and deploy CTE GuardPoints using that encryption method. For details, see one of the following documents:
-
Create a DFS(R) Process Set and User Set for the policy. For details, see Creating Required DFS(R) Policy Components.
-
Create the policies and GuardPoints you need to protect your data, using the process appropriate to the selected encryption method. For details, see one of the following:
-
Consider configuring all nodes within a DFS topology under a single CipherTrust Client Group