Listing All Files Included in an Exclusion Key Rule (Windows)
Determining the files that match an exclusion key rule involves two steps. You list all the keys in a GuardPoint, choose the key that you’re interested in, and then run a command to list the files that match that key. This process works for both standard key rules and exclusion key rules.
-
Decide on the GuardPoint that you want to check for excluded files. For example, for the GuardPoint
c:\gp1
, type the following on the command line:C:\> voradmin ldt key report c:\gp1 Keys used for GP, c:\gp1 : clear_key,0 CS1-CTE-LDT-AES256,11
The number after the comma is the key version number. The clear_key key is not versioned, so the version number is 0.
-
From the key report output, choose the key rule for which you want to list matching files. For example, to show the files associated with the clear_key listed above, you would type:
C:\> voradmin ldt key map c:\gp1 clear_key,0 Files rekey with key (clear_key,0)- c:\gp1\file1.txt c:\gp1\file2.txt c:\gp1\file3.txt c:\gp1\file4.txt c:\gp1\file5.txt