HP Software manual Passphrase, Encryption Options

Page 41

Passphrase

A passphrase is a series of characters that must be provided for input to the cryptographic key generation process.

Passphrases must be no less than 8 logical characters. You may create the passphrase or have one randomly generated by a separate application.

If you create the passphrase, it should be difficult to guess and should contain a mix of lowercase/uppercase letters, digits and special characters.

The passphrase is one of the components Data Protector Express uses to generate the encryption key. A longer or random passphrase will increase the strength of the encryption key even more.

To aid in remembering the passphrase, you may enter a hint message. The use of this field is optional.

If a backup job spans multiple media, the same passphrase will be used for all media in the set.

Passphrases for the media are stored in the Data Protector Express catalog, so Data Protector Express can read and append to the encrypted media without prompting for a passphrase, as long as the media is being accessed by the instance of Data Protector Express that first encrypted it.

When a media is deleted or exported from the Data Protector Express catalog the passphrase is also deleted. There are two instances when you need to know the passphrase:

When importing the media into another machine or another instance of Data Protector Express

During disaster recovery

CAUTION: Managing the passphrase is a critical component of any encryption system. Data may be stored for months or years, so passphrases must be archived securely. You should keep a record or backup of encryption passphrases and store them in a secure place separate from the computer running Data Protector Express. If you are unable to supply the passphrase when requested to do so, neither you nor HP support will be able to access the encrypted data.

Encryption Options

Encryption is enabled on the job’s Encryption page.

Off

Both hardware and software encryption are disabled.

Automatic

This selection will use hardware encryption, if it is available from the device; otherwise, software encryption will be used

Software

Software encryption will be used. When Software is selected, you can choose the strength of software encryption

Hardware

Hardware encryption will be used, if the device supports it. If the device does not support encryption and this option is selected, you will be prompted with an alert stating that the device cannot be used because it does not support hardware encryption.

Software Strength

Options for the software encryption strength are: low, medium and high. Low is the easiest method to decipher by outside methods, High is the hardest method to decipher by outside methods. As you progress from low to high, the encryption algorithm requires more CPU computations for each

41

Image 41
Contents Data Protector Express User Guide Acknowledgments Contents Index Disaster RecoveryTerminology OverviewConcepts Overview Simple, Immediate Backup Restore to a Different Location Restore to a Different Location Main Window Administering BackupUsing the Administrator Opening Property Pages Missing FeaturesProperty Pages Viewing Data Protector Express status Using Quick Access from TaskbarManaging Data Protector Express Managing JobsMonitoring jobs SettingsManaging Alerts Managing LogsOther Commands About the Data Protector Express ServiceMicrosoft Windows and the Data Protector Express Server Linux and the Data Protector Express DaemonAbout the Data Protector Express Service Selecting Devices Configuring Backup JobsSelecting Files Encryption ConfigurationSchedule Settings Backup mode Mode SettingsAuto verify mode Type of Fixed RotationSplit File Write modeAuto format mode Interval SettingsScheduled Dates Media to be usedAdvanced Options Advanced SettingsLog Options Settings for WindowsExecution Barcode FilterSelecting Versions Configuring Restore and Verify JobsSelecting Files Restoring files and folders to a different folder Restoring foldersRestoring a file with a new name Advanced Restore Options Execution Options Advanced Verify OptionsBarcode Filter Options Device Properties Working With DevicesSelecting Devices for Jobs Element status Device CommandsWorking With Devices Device Commands Working with Tape Libraries Installation and ConfigurationInitialization Process Barcodes and MIC memory in cartridgeBarcode Filters Media Management Sharing storage devices on a SANScheduling, Rotations, and Media Management Backup Schedule ConsiderationsIntervals Scheduling ConceptsMedia Sets Implications for Restoring Data Media Rotation Types Comparing rotation types Running Jobs with RotationsCryptographic Algorithms Encryption and CompressionEncryption Encryption Options PassphraseCompression Key ManagementWorking with Third-Party Applications Configuring a Microsoft Exchange ServerMicrosoft Exchange Server Supported PlatformsBacking up Microsoft Exchange Server Restoring Microsoft Exchange Databases Preparing to Restore the Microsoft Exchange Server Disaster Recovery with Microsoft Exchange ServerSystem-level Disaster Recovery Restoring Microsoft Exchange Databases Mailbox Backup and RecoveryRestoring the Microsoft Exchange MTA Database Backing Up Mailboxes ConfigurationRestoring Mailboxes RequirementsWorking with Microsoft SQL Server PowerShell AccessSupported Exchange Server versions Mailbox PermissionsMicrosoft SQL server concepts Configuring the Microsoft SQL ServerBacking up Microsoft SQL Server Restoring Microsoft SQL Server Microsoft SQL Server Databases and the backup modeRestoring Microsoft SQL Server user databases Restoring Microsoft SQL Server 2000 master databases Restoring Microsoft SQL Server master databasesCreate Database Alter Database Stop the Data Protector Express and SQL Server servicesRebuild the master database Restart SQL Server in single-user modeRestore the master database from the most recent backup Drop invalid databases Apply changes to the master databaseRestoring Microsoft SQL Server 7 master databases Start the Data Protector Express and SQL Server servicesRestore the msdb database Disk Mirror Disk Unmirror Disk Remirror Restart Microsoft SQL Server in single-user mode Drop invalid databases and database devices Protecting Windows SharePoint Services Protecting Microsoft Windows SharePoint ServicesWindows SharePoint Services protection concepts Restoring SharePoint Services Using Disaster Recovery with Windows SharePoint Services Working with Certificate ServicesImportant guidelines Disaster RecoveryBoot Media Restoring to dissimilar hardware Advantage of Bootable Backup DevicesPreparing For a Disaster Create bootable media Configuring Backups to Support Disaster RecoveryTest the media Disaster Recovery with Libraries Recovering From a DisasterDisaster Recovery Disaster recovery for Windows 2003, Windows XP and earlier Disaster recovery for LinuxLimitations Completing the Data RestoreMail Settings Backup Domain ConfigurationPerformance Settings Alert SettingsSetting a User Password Client Upgrade SettingsDomain Security OptionsJob Log options Advanced Job OptionsLog Type Log file formatsPre Execution Commands Job Pre-Post Execution CommandsMail log AuditingLogs Post Execution CommandsBarcode Filters for Jobs Advanced Job Options Contacting HP Support and other resourcesRelated information Typographic conventionsDocumentation feedback Index Index VSS
Related manuals
Manual 1 pages 61.46 Kb Manual 1 pages 6.39 Kb