Collapse AllExpand All
  • accounts
    • See user management
  • activation code [1]
  • administration tasks [1]
    • configuring date format and time zone [1]
    • configuring Deep Security [1]
    • configuring session timeout [1]
    • setting up notifications [1]
  • Advanced Encryption Standard (AES) [1]
  • authentication [1]
  • auto-detection [1]
  • automatic provisioning [1]
  • auto-provisioning [1]
  • cloning
    • adding clones to the Inventory [1]
  • cloning devices [1]
  • Configuration and Provisioning Wizard for Microsoft Windows [1]
  • Configuration Tool [1] [2] [3] [4]
  • credential keys, in Amazon EC2 [1]
  • Deep Security, configuring [1]
  • Default Policy [1] [2] [3]
  • device cloning [1]
  • device keys [1]
  • devices
    • and Inventory screen [1]
    • checking status [1]
    • creating a RAID array [1]
    • deleting from the Inventory [1]
    • deleting RAID arrays [1]
    • managing [1]
    • manually encrypting [1]
    • restoring [1]
  • encryption
    • boot volume [1]
    • full disk [1]
  • encryption key requests [1] [2]
    • approving manually [1]
  • Google Authenticator [1] [2] [3]
  • integrity checking [1] [2] [3] [4]
    • running on-demand [1]
    • scheduling [1]
  • inventory [1]
  • Inventory
    • deleting devices [1]
  • Inventory screen [1]
  • Key Exporter tool [1]
  • Key Management Server [1] [2] [3] [4]
  • license
    • See product license
  • logs [1]
    • archive time limit [1]
    • managing [1]
    • running a query [1]
    • types of [1]
  • Managed Service Provider (MSP) [1]
  • multi-factor authentication (MFA) [1] [2] [3] [4]
    • activating MFA accounts [1]
    • managing [1]
    • MFA backup codes [1]
    • system requirements for MFA devices [1]
    • unregistering MFA devices [1]
    • using MFA backup codes [1]
  • new features [1]
  • notifications, setting up [1]
  • password, changing [1]
  • policies [1] [2] [3]
    • and rules [1]
    • creating [1]
    • editing or deleting [1]
    • See also Default Policy
  • product license [1] [2]
  • provisioning
    • See encryption
  • provisioning, automatic [1]
  • provisioning pass phrase [1]
  • RAID array
  • reports [1]
    • generating [1]
    • managing [1]
    • types of [1]
    • viewing archived reports [1]
  • restoring devices [1]
  • rules [1]
  • SecureCloud
    • about [1]
    • components [1]
    • getting started [1]
    • Key Management Server [1]
    • SecureCloud Agent [1]
    • Web Console [1]
  • SecureCloud Agent [1] [2]
    • configuring [1] [2]
    • encrypting devices [1]
    • installing [1]
    • installing on Linux [1] [2]
    • installing on Linux with a custom kernel [1]
    • installing on Microsoft Windows [1]
    • system requirements [1]
    • troubleshooting migration [1]
    • updating to a newer version [1]
  • SecureCloud Hosted Service [1]
  • Software as a Service (SaaS) [1]
  • subscribing
    • activating a subscription [1]
    • SecureCloud Hosted Service [1]
    • via a Managed Service Provider (MSP) [1] [2]
    • via Trend Micro [1] [2]
  • user management [1]
    • adding user accounts [1]
    • changing your password [1]
    • user rules [1]
  • Web Console [1]
    • logging on [1] [2] [3] [4]
    • logging on using an MFA code [1]
    • logging on via the Licensing Management Platform [1]
    • logging on with an MFA backup code [1]
    • troubleshooting log on issues [1]
    • troubleshooting MFA log on issues [1]

Creating and Encrypting a RAID Array Parent topic

Before you begin

Before creating a RAID array, administrators must:
  • Create the devices
  • Upload the devices to the inventory
  • Ensure the devices are unencrypted

Procedure

  1. On the Inventory screen, click the name of the machine.
  2. Select the devices to add to the RAID array.
    Tip
    Tip
    Trend Micro recommends using the same device size for each device in a RAID array. In a Microsoft Windows environment, the maximum volume size is 2TB for simple and mirrored volumes and up to 64TB for Windows striped volumes (2TB per disk with a maximum of 32 disks per volume).
    In Amazon EC2, Trend Micro recommends limiting the RAID array to a maximum of eight devices. In a CSP environment, the maximum number of devices you can add to a RAID array is 32.
  3. Click Create RAID Array.
    The RAID Array screen appears.
    raid_array_information.jpg
  4. In the RAID Information section, specify the RAID array name, type, file system, and mount point.
    The RAID array name cannot contain any special characters.
  5. In the Available Devices section, choose from the following options:
    • Add an available device to the RAID array by selecting the device from the Available list and clicking Add.
    • Remove a device from the RAID array by selecting the device from the Selected list and clicking Remove.
  6. Click Create RAID Array.
    WARNING
    WARNING
    All data on the selected devices is erased when the RAID array is created.
  7. To encrypt the RAID array, select the RAID array and click Encrypt.