Specifications
Endpoint Encryption for Files and Folders Policy Settings 
| 25 
Show About option on system tray menu 
Enables the option in the system tray menu that opens a dialog about the current 
configuration of this instance of Endpoint Encryption for Files and Folders. 
Show option for unloading all keys 
The option Unload keys enables users to close all the keys that have been opened to 
access data, thus securing (locking) the system. 
Options - System 
Attempt logon with Endpoint Encryption for PC credentials 
This option allows automatic logon to Endpoint Encryption for Files and Folders from 
the pre-boot authentication using Endpoint Encryption for PC. This option must be 
enabled for the client to attempt to logon to Endpoint Encryption for Files and Folders 
with Endpoint Encryption for PC credentials – if it is not set, the Endpoint Encryption 
for Files and Folders logon will appear as normal. Also, if this option is set but Endpoint 
Encryption Manager is not installed (or an incompatible version of Endpoint Encryption 
for PC is installed), then the Endpoint Encryption for Files and Folders logon will revert 
to its normal behavior. 
The automatic Endpoint Encryption for Files and Folders logon happens at each 
Windows logon (but not screen saver logon). If the user closes the keys and doesn't 
re-logon to Windows, then the user will be prompted to logon to Endpoint Encryption 
for Files and Folders as normal as if the user accesses a protected file. Doing a manual 
Endpoint Encryption for Files and Folders Synchronize will also work exactly as 
before. 
The automatic logon is independent of what Endpoint Encryption supported 
authentication token is used. 
Disable forcing of logon on first boot 
This option enables/disables the enforcement of a first logon after the first re-boot 
after the installation of Endpoint Encryption for Files and Folders. If enabled, there will 
be a mandatory logon dialog, forcing the user to authenticate properly in order to 
retrieve the correct set of encryption keys and the correct encryption policy. If forced, 
the logon cannot be by-passed until proper Endpoint Encryption authentication 
credentials have been entered. This ensures that the user cannot work without proper 
encryption policies applied. If disabled, the user has to manually logon in order to 
retrieve encryption policies and keys. Until then, the user will work with the default 
policy from which the install set was created (i.e. a “blank” policy if not created from a 
dedicated policy). 










