PowerProtect Data Manager uses multiple methods to protect product code and downloads against compromise or corruption. These methods include SHA-256 checksums and digital signatures that you can verify through the methods included in this chapter.
The
Drivers & Downloads area on
Customer Support provides a set of checksum values for every file.
Critical processes, such as the deployment and update workflows, automatically check authenticity and integrity, and fail if either is compromised. However, there are several points where you should verify components and binaries before using them:
After you download the deployment or update packages.
After you download the application agents and other
PowerProtect Data Manager installable binaries.
After you download hotfixes.
Some procedures, such as
PowerProtect Data Manager deployment and updates, contain steps or opportunities to verify certificates or signatures.
Data is not available for the Topic
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\