If a key is restricted, anyone can use the key to back up data, but only the key owner or a user who knows the pass phrase can use the key to restore the encrypted data. Restricted:- Select this option to make this a restricted key. If a key is common, anyone can use the key to back up and restore data. You can use only printable ASCII characters.Ĭonfirm pass phrase:- Retype the pass phrase.Ĭommon:- Select this option to make this a common key. Note:- Veritas recommends that you use more than the minimum number of characters. For 256-bit AES encryption, the pass phrase must be at least 16 characters. For 128-bit AES encryption, the pass phrase must be at least eight characters. Pass phrase:- Type a pass phrase for this key. However, backup jobs may process more slowly with 256-bit AES encryption than with 128-bit AES encryption. The 256-bit AES encryption provides a stronger level of security than 128-bit AES encryption. Your choices are 128-bit AES or 256-bit AES. The name can include up to 256 characters.Įncryption type:- Select the encryption type to use for this key. Key name:- Type a unique name for this key. The desired encryption key can be specified through the -Key parameter, either. ConvertTo-PgpEncryptedFile -Path C:INPUT.txt -KeyStore c:my.keystore -KeyStorePassword 'pass123' -Key '' -Output c:encrypted.pgp. We can also encrypt using a public key located in a KeyStore file: 1. Complete the appropriate options as follows: Encrypting with a public key from a KeyStore. To create an encryption key, perform the following steps.ģ. However any unencrypted backup sets can be encrypted. When administrators create a Duplicate backup sets job, backup sets that are already encrypted are not re-encrypted. However, it is possible to override the default key for a specific job. On-tape catalog file and directory information,īackup Exec does not encrypt Backup Exec metadata or on-disk catalog file and directory information.īackup Exec Administrator can set a default encryption key to use for all backup jobs and duplicate backup set jobs. Metadata, such as file names, attributes, and operating system information. User data, such as files and Microsoft Exchange databases. When Backup Exec is installed, the installation program installs the necessary encryption software on the media server and on remote computers that use the Remote Agent.īackup Exec encrypts the following types of data: Backup Exec then writes the encrypted data on a set-by-set basis to tape or to a backup-to-disk folder. Backup Exec can encrypt data at a computer that uses the Remote Agent, and then transfer the encrypted data to the media server. When the data on a tape is encrypted, you protect it from unauthorized access.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |