Installation Workflow
In order to install and configure CTE, you need to perform the following high-level tasks: 1. Select which key manager you want to use. The Vormetric Data Security Manager and the CipherTrust Manager have different requirements and support different features, so you must make this decision first. For details, see CTE Components.
-
If you want to install the CTE Agent without registering with a key manager, see Installing CTE with No Key Manager Registration. However, you cannot protect any data on the host until it has been registered.
Otherwise, set up your systems according to the requirements of the selected key manager. For details, see Configuring CTE for Windows with CipherTrust Manager.
-
Create your policies, encryption keys, and GuardPoints using the selected key manager. For details, see Guarding a Device with CipherTrust Manager.