Using the LDT Encryption Method
If you want to encrypt your data using LDT, you need to create a Live Data Transformation policy and use that to create your GuardPoints. All encryption occurs in the background while users continue to access the data.
With LDT, the data will be automatically rekeyed periodically, based on the expiration date and the life span of the versioned key used to encrypt the data.
To use the LDT:
-
Make sure you have created the required policy components for DFS(R) as described in Creating Required DFS(R) Policy Components.
-
Make sure that you have a versioned encryption key.
-
Create the LDT policy as described in Creating a LDT Policy for DFS(R).
-
Create the GuardPoints you want to use as described in Creating a LDT GuardPoint for DFS(R).
Note
Make sure that all GuardPoints are at, or above, the level of the DFS(R) replication point. For example:
-
If the replication point is
D:\
, the CTE GuardPoint must also be atD:\
. Adding a GuardPoint on a directory inD:\
, such asD:\data\
, fails. -
If the replication point is
D:\data\
, you can add a GuardPoint atD:\data\
orD:\
, but you cannot add a GuardPoint on a subdirectory ofD:\data\
such asD:\data\HR-files\
.
-
-
Consider using QoS for optimal DFS(R) performance.