While physically verifying encryption can be done, it is time-
consuming (client tracing, inspecting files on TSM volumes, attempting
recall without key).  A wise thing to do at the administrative level
is to employ a management class whose name includes indication of
encryption, and to set up client Include specs which use this class
name.  Then, once stored on the TSM server, querying for the
management class name from the client or server will clearly indicate
that encryption was at least intended, if not actually realized.

   Richard Sims

Reply via email to