Dell Data Protection | Encryption User Manual

Browse online or download User Manual for Servers Dell Data Protection | Encryption. Dell Data Protection | Encryption Configuration manual

  • Download
  • Add to my manuals
  • Print

Summary of Contents

Page 1 - Configuration Guide

Dell Data ProtectionConfiguration Guide

Page 2 - ____________________

10 Configuration Guidevfs.file.handler.event com.credant.guardian.server.vfs.EventFileHandlerEvent file handler.gatekeeper.resource $dell.home$/conf/g

Page 3 - Contents

Configuration Guide 11gkresource.xmlYou may change the parameters in <Compatibility Server install dir>\conf\gkresource.xml.We recommend that yo

Page 4 - 4 Configuration Guide

12 Configuration Guiderun-service.confYo u m a y c h a n g e s o m e o f t h e following parameters in <Compatibility Server install dir>\c

Page 5

Configuration Guide 132Configure the Core ServerThis chapter details the parameters that may be changed to tune the Core Server to your environment.On

Page 6 - 6 Configuration Guide

14 Configuration GuideCredant.Server2.WindowsService.exe.ConfigRemove the following section:<!-- Web Services Configuration --><system.servic

Page 7

Configuration Guide 15Add Compatibility Server’s Folder Location to Core Server Config FileThe Core Server, being a .Net application, can sometimes be

Page 8 - 8 Configuration Guide

16 Configuration Guide

Page 9

Configuration Guide 173Configure the Device ServerThis chapter details the parameters that may be changed to tune the Device Server to your environmen

Page 10 - 10 Configuration Guide

18 Configuration Guiderun-service.confYou may change some of the following parameters in <Device Server install dir>\conf\run-service.conf. Thes

Page 11 - Enable Domain\Username Format

Configuration Guide 194Configure the Security ServerThis chapter details the parameters that may be changed to tune the Security Server to your enviro

Page 12

____________________© 2014 Dell Inc. Registered trademarks and trademarks used in the DDP|E, DDP|ST, and DDP|CE suite of documents: Dell™ and the Dell

Page 14 - Notification.config

Configuration Guide 215Configure Encryption FeaturesThis section explains how to independently control encryption features.Prevent Temporary File Dele

Page 15 - Configuration Guide 15

22 Configuration GuideSlotted Activation is enabled and configured through the Shield installer or through the Shield workstation.For users requiring

Page 16 - 16 Configuration Guide

Configuration Guide 23Depending on Shield version, the registry setting will automatically disappear or change from 1 to 0 after the poll is complete.

Page 18

Configuration Guide 256Configure Components for Kerberos Authentication/AuthorizationThis section explains how to configure components for use with Ke

Page 19 - Configure the Security Server

26 Configuration Guide4Go to <add key="epw" value="<encrypted value of the password>" /> and change "epw" to

Page 20 - 20 Configuration Guide

Configuration Guide 27Remote Management Console Instructions1If needed, log on to the Remote Management Console.2Click Domains and click the Detail ic

Page 22 - Forced Poll

Configuration Guide 297Assign Forensic Administrator RoleBy default, Forensic Authorization is enabled on back-end servers and disabled on front-end s

Page 23 - Non-Domain Activations

Configuration Guide 3Contents1 Configure the Compatibility Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5server_config.xm

Page 24 - 24 Configuration Guide

30 Configuration Guide

Page 25 - Authentication/Authorization

Configuration Guide 318Cron ExpressionsThis section explains how to use cron expression formats and special characters.Introduction to Cron Expression

Page 26 - Windows Service Instructions

32 Configuration Guide• The / character is used to specify increments.0/15 in the seconds field means the seconds 0, 15, 30, and 45. 5/15 in the secon

Page 27 - Configuration Guide 27

Configuration Guide 33ExamplesExpression Meaning0 0 12 * * ? Fire at 12pm (noon) every day0 15 10 ? * * Fire at 10:15am every day0 15 10 * * ? Fire at

Page 28 - 28 Configuration Guide

34 Configuration Guide

Page 29 - User Search Results

Configuration Guide 359Create a Self-Signed Certificate Using Keytool and Generate a Certificate Signing RequestNOTE: This section details the steps t

Page 30 - 30 Configuration Guide

36 Configuration Guide•Organization: Enter the appropriate value (example, Dell).•City or locality: Enter the appropriate value (example, Austin).•Sta

Page 31 - Cron Expressions

Configuration Guide 37Figure 9-1. Example .CSR File2Follow your organizational process for acquiring an SSL server certificate from a Certificate Aut

Page 32

38 Configuration Guide2Select Request a certificate and click Next >.Figure 9-2. Microsoft Certificate Services3Select Advanced Request and click

Page 33 - Examples

Configuration Guide 394Select the option to Submit a certificate request using a base64 encode PKCS #10 file and click Next >.Figure 9-4. Advanced

Page 34 - 34 Configuration Guide

4 Configuration GuideForced Poll . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22Inventory O

Page 35 - Organizational unit:

40 Configuration Guide6Save the certificate. Select DER encoded and click Download CA certificate.Figure 9-6. Download CA Certificate7Save the certif

Page 36 - Key password for alias:

Configuration Guide 418Import the converted signing authority certificate. Return to the DOS window. Type:keytool -import -trustcacerts -file <csr-

Page 40

Configuration Guide 51Configure the Compatibility ServerThis chapter details the parameters that may be changed to tune the Compatibility Server to yo

Page 41 - Configuration Guide 41

6 Configuration Guidermi.recovery.host To use Multi-Server EMS Recovery:<!--- uncomment and change host names to your fully qualified domain names

Page 42 - 42 Configuration Guide

Configuration Guide 7triage.execute.time 0 0 0/6 * * Triage is the process of reconciling the users and groups that the Server already knows about.Th

Page 43

8 Configuration Guidesecurity.authorization.method.IAdministrativeService.findLdapGroupsSystemAdmin,SecAdmin Roles required to find LDAP groups.securi

Page 44 - 0 XXXXXA0 X

Configuration Guide 9db.schema.version.patch Patch version of database schema.dao.db.driver.dir $dell.home$/lib/mssql-microsoft Default location of th

Comments to this Manuals

No comments