Administrator's Guide

List of Figures
1-1 EVFS Data Flow.............................................................................................................................20
1-2 Encryption Metadata (EMD) and Volume Encryption Keys........................................................21
1-3 Enabling an EVFS Volume............................................................................................................23
1-4 Software Types..............................................................................................................................26
11