Configuring CTE for Windows with CipherTrust Manager
This section describes how to install and configure CTE on Windows systems that you plan to register with a CipherTrust Manager.
The installation and configuration process consists of three basic steps:
-
Gather the information needed for the installation and set up your network.
-
Interactive Installation on Windows
Install CTE interactively on a protected host and register the protected host with CipherTrust Manager.
Silent Installation on Windows
Install CTE silently (non-interactive) on a protected host and register the protected host with CipherTrust Manager.
-
Register the protected host with CipherTrust Manager and make sure that CipherTrust Manager and CipherTrust Transparent Encryption can communicate with each other. This can be done as part of the initial installation or at any point after the CTE Agent has been installed.
-
Use for communication between CTE and CM. Install the external certificate before registering CipherTrust Transparent Encryption with CipherTrust Manager.
-
Validating CipherTrust Manager and CipherTrust Transparent Encryption with a Local CA Certificate
Ensure that registration by the CTE agent is serviced only by the expected key manager by providing a copy of the CA certificate that will be used to authenticate the TLS communications with the key manager.
-
Setting the CM log for Ransomware Protection
Configure the logging level for CipherTrust Manager for Ransomware Protection.