You Can Encrypt:
- Files stored on local hard drives of your workstation,
- Files stored on removable media,
- Entire removable drives,
- Entire hard disk drives.
Encrypting Files Stored on Local Hard Drives of the Workstation
- The administrator generates, within the policy, lists of files based on file extensions or groups of file extensions and folders located on the client computer’s hard drives.
- The administrator then creates actions within the policy that the application will use to encrypt files created by other software.
- The application will encrypt and decrypt files after the policy is applied.
Encrypting Data on Removable Media
- The administrator creates a default encryption rule within the policy that will apply to all removable media. This default rule will have the lowest priority.
- The administrator then creates rules for specific models of removable media.
- Finally, the administrator creates rules for removable media with specific identifiers, which will have the highest priority.
- The application will encrypt and decrypt files after the policy is applied, in accordance with the rule priorities.
Managing Application Permissions for Access to Encrypted Files
- The administrator can configure access rules for encrypted files on a per-application basis. Access will either be allowed (only in encrypted form) or denied.
Creating Encrypted Archives
- Users can create encrypted archives and protect them with a password.
Encrypting Hard Drives
- The administrator creates a default encryption rule for all hard drives within the policy.
- The administrator creates a list of hard drives that will be excluded from encryption.
- After the policy is applied, the application will encrypt all logical partitions of the hard drives sector by sector.