
Introduction
| 9
The document remains encrypted regardless of where it is moved. Thus, the file will
remain encrypted even if stored on a USB memory stick, a floppy disk or on a
network share - persistent encryption. This means that even if a document is
misplaced in another folder, or placed on a floppy disk, it stays encrypted and always
secure.
Documents and folders can only be decrypted via user interaction, by right-clicks;
however, this may also be restricted in your policy. Also, decryption can be centrally
enforced using policies defined by your Endpoint Encryption Administrators.
Documents moved to PDAs will lose their encryption. You will be presented a warning
if moving encrypted documents to media not supported by Endpoint Encryption for
Files and Folders. Documents moved from the PDA to an encrypted directory at the PC
will certainly be encrypted
What encryption keys you can access is defined by your Endpoint Encryption
Administrator. You will receive your set of encryption keys when you have logged on
to Endpoint Encryption. They are securely delivered to your Endpoint Encryption for
Files and Folders client over the network. You must authenticate to Endpoint
Encryption for Files and Folders before you can access the key, and thus access an
encrypted document. The authentication is performed with the Endpoint Encryption
logon dialog. Failing authentication renders you unable to read encrypted documents.
Your Endpoint Encryption Administrator may also allow you to create your own local
user encryption keys. You can manage these keys depending on what your Endpoint
Encryption Administrator has allowed in your policy. You can protect your local keys
with another password than your Endpoint Encryption password if you like. You may
also use your digital certificate to protect your locally created encryption keys.
Once you have accessed an encryption key, it (optionally) can be stored securely on
your PC for future use (called the key cache). Other keys may only be available
directly from the Endpoint Encryption Server, preventing data encrypted with them
from being used outside the corporate environment. Your Endpoint Encryption
Administrator decides what settings your encryption keys have. Your locally generated
keys will always be available also when offline. You are in charge of your locally
generated keys.
Endpoint Encryption for Files and Folders encrypts folders and documents
transparently and on-the-fly, at the original location of the document or folder. Thus
the amount of user interaction is very low and you will perceive your working
environment almost as identical as before encryption.
As a user, you can never change or affect the policy that your Endpoint Encryption
Administrator has applied to you. Your policy is enforced automatically in the
Kommentare zu diesen Handbüchern