Export (0) Print
Expand All

6 Index

A

Abstract

Access control

Additional considerations

Applicable protocols

Architecture

Assumptions

B

Back Up and Restore Data use case group

backing up or restoring encrypted file

creating shadow copy storage association

overview

C

Capabilities

backing up and restoring data

file encryption and access control

managing disks and volumes

managing removable media

overview

Capability negotiation

Change tracking

Coherency requirements

Communications

with other systems

within system

Component dependencies

Concepts

Configuring iSCSI initiator example

Considerations

additional

security

Creating and deleting media pool example

Creating shadow copy storage association example

D

Decrypting encrypted file example

Deleting media pool example

Dependencies

on other systems

within system

Design intent

Back Up and Restore Data use case group

Encrypted File Access Control and Encryption use case group

Manage Disks and Volumes use case group

Manage Removable Media use case group

overview

E

Encrypted File Access Control and Encryption use case group

decrypting encrypted file

encrypting file

overview

providing cryptographic access permissions to encrypted file

Encrypting file example

Encryption

Environment

Error handling

Examples

configuring iSCSI initiator

creating and deleting media pool

creating shadow copy storage association

decrypting encrypted file

encrypting file

making offline disk into online disk

overview

Extensibility

Microsoft implementations

overview

External dependencies

F

File encryption

Functional architecture

G

Glossary

H

Handling requirements

I

Implementations - Microsoft

Implementer - security considerations

Informative references

Initial state

Introduction

M

Making offline disk into online disk example

Manage Disks and Volumes use case group

configuring HBA ports and iSCSI initiators

converting basic disk to dynamic disk

creating and modifying volumes

making offline disk into online disk

overview

Manage Removable Media use case group

creating and deleting media pool

deleting work queue items

mounting and dismounting media

overview

Microsoft implementations

O

Overview

abstract

summary of protocols

synopsis

P

Preconditions

Product behavior

R

References

Relationship among protocols

Requirements

coherency

error handling

overview

preconditions

S

Security considerations

T

Table of protocols

Tracking changes

U

Use cases

Back Up and Restore Data

Encrypted File Access Control and Encryption

Manage Disks and Volumes

Manage Removable Media

overview

V

Versioning

Microsoft implementations

overview

 
Show:
© 2014 Microsoft