Fellow TSM Admins, We are in the process of bringing VTLs into our TSM Environment. In order to take full advantage of deduplication features on the VTL we need to go after the clients that are performing client based encryption and compression. With that in mind, does anyone know an easy way to tell which clients are using these features?
Thanks, Chad Harris