Fellow TSM Admins,

We are in the process of bringing VTLs into our TSM Environment.  In order to 
take full advantage of deduplication features on the VTL we need to go after 
the clients that are performing client based encryption and compression.  With 
that in mind, does anyone know an easy way to tell which clients are using 
these features?

Thanks,
Chad Harris 

Reply via email to