You can encrypt:
- files stored on local hard disks of your workstation;
- files stored on removable media;
- entire removable drives;
- entire hard disk drives.
Encryption of files on local hard disks of a workstation
- The administrator generates file lists in the policy according to file extensions or groups of extensions, and folders contained on hard disks of client hosts.
- Next, the administrator creates actions in the policy to be used by the application to encrypt files belonging created by different software.
- The application encrypts and decrypts files after applying the policy.
Encryption of data on removable media
- The administrator creates a default encryption rule in the policy to be applied to all removable drives. This default rule has the lowest priority.
- The administrator creates rules for individual removable device models.
- The administrator creates rules for removable drives with paricular IDs. This is the top priority rule.
- The application encrypts and decrypts files after applying the policy according to the rule priority.
Managing applications' access permissions to encrypted files
The administrator can configure rules of access to encrypted files for any software. Access can be either allowed (in the form of ciphertext only) or denied.
Creating encrypted archives
The user can create encrypted archives and password-protect them.
Encrypting hard disks
- The administrator creates a default encryption rule for all hard disks in the policy.
- The administrator generates a list of hard disks excluded from encryption.
- After applying the policy, the application encrypts all logical partitions of hard disks sector by sector.