6 Index

A

Abstract

Access control

Additional considerations

Applicable protocols

Architecture

Assumptions

B

Back Up and Restore Data use case group

   backing up or restoring encrypted file

   creating shadow copy storage association

   overview

Backup and restore data

   overview

C

Capabilities

   backing up and restoring data

   file encryption and access control

   managing disks and volumes

   managing removable media

   overview

Capability negotiation

Change tracking

Coherency requirements

Communications

   with other systems

   within system

   within the system

Component dependencies

Concepts

Configuring iSCSI initiator example

Considerations

   additional

   security

Creating and deleting media pool example

Creating shadow copy storage association example

D

Decrypting encrypted file example

Deleting media pool example

Dependencies

   on other systems

   within system

   within the system

Design intent

   Back Up and Restore Data use case group

   backup and restore data

   encrypted file access control and encryption

   Encrypted File Access Control and Encryption use case group

   manage disks and volumes

   Manage Disks and Volumes use case group

   manage removable media

   Manage Removable Media use case group

   overview

E

Encrypted file access control and encryption

   overview

Encrypted File Access Control and Encryption use case group

   decrypting encrypted file

   encrypting file

   overview

   providing cryptographic access permissions to encrypted file

Encrypting file example

Encryption

Environment

Error handling

Examples

   configuring iSCSI initiator

   creating and deleting media pool

   creating shadow copy storage association

   decrypting encrypted file

   encrypting file

   making offline disk into online disk

   overview

Extensibility

   Microsoft implementations

   overview

External dependencies

F

File encryption

Functional architecture

Functional requirements - overview

G

Glossary

H

Handling requirements

I

Implementations - Microsoft

Implementer - security considerations

Informative references

Initial state

Introduction

M

Making offline disk into online disk example

Manage disks and volumes

   overview

Manage Disks and Volumes use case group

   configuring HBA ports and iSCSI initiators

   converting basic disk to dynamic disk

   creating and modifying volumes

   making offline disk into online disk

   overview

Manage removable media

   overview

Manage Removable Media use case group

   creating and deleting media pool

   deleting work queue items

   mounting and dismounting media

   overview

Microsoft implementations

O

Overview

   abstract

   summary of protocols

   synopsis

Overview (synopsis)

P

Preconditions

Product behavior

R

References

Relationship among protocols

Requirements

   coherency

   error handling

   overview

   preconditions

S

Security considerations

System architecture

System dependencies

   within the system

System errors

System protocols

System requirements - overview

System use cases

   backup and restore data

   encrypted file access control and encryption

   manage disks and volumes

   manage removable media

   overview

T

Table of protocols

Tracking changes

U

Use cases

   Back Up and Restore Data

   backup and restore data

   encrypted file access control and encryption

   manage disks and volumes

   manage removable media

   overview

V

Versioning

   Microsoft implementations

   overview

Show: