educational course/tutorialoutlet.com educational course/tutorialoutlet.com | Page 24

to ensure that Confidential data is properly stored on encrypted drives and that all confidential files are transmitted using encrypted methods . Reporting based on these classification tabs will allow administrators to detect and respond to violations of the WWTC ‘ s data classification policy . Failover cluster services will be implemented so that the entire network has hardware , software , and storage redundancy . This independent group of servers and storage devices will work together to increase the availability of applications and services . If one clustered device fails , another will provide the lost services ( called failover ). The cluster validation wizard will be used to ensure that all network components are compatible prior to implementation . It will also be used after implementation and as new devices are added to the network to maintain this capability . By implementing backup for all servers and storage , WWTC ensures that users experience a minimum of disruptions in service . Cache encryption will be implemented to store encrypted data by default . This means that data in cache is stored encrypted by default providing data security without requiring entire drive encryption . BranchCache will be implemented to increase performance , manageability ,