Deployment and Operations
This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.
|The latest Enterprise Library information can be found at the Enterprise Library site.|
Two of an administrator's main tasks will be to make sure that the initial deployment of the Cryptography Application Block is planned and managed and to make sure that subsequent updates are deployed with minimal impact to existing applications that use the application block. For details, see Deploying the Cryptography Application Block.
In addition, administrators must decide if they want to use the instrumentation exposed by the application block. For details of how to enable and disable instrumentation, see Enabling Instrumentation. For information on the instrumentation contained within the Cryptography Application Block, see the following topics:
- Cryptography Application Block Performance Counters
- Cryptography Application Block Event Log Entries
- Cryptography Application Block WMI Events