Specifications

Endpoint Encryption for Files and Folders Policy Settings
| 25
Show About option on system tray menu
Enables the option in the system tray menu that opens a dialog about the current
configuration of this instance of Endpoint Encryption for Files and Folders.
Show option for unloading all keys
The option Unload keys enables users to close all the keys that have been opened to
access data, thus securing (locking) the system.
Options - System
Attempt logon with Endpoint Encryption for PC credentials
This option allows automatic logon to Endpoint Encryption for Files and Folders from
the pre-boot authentication using Endpoint Encryption for PC. This option must be
enabled for the client to attempt to logon to Endpoint Encryption for Files and Folders
with Endpoint Encryption for PC credentials – if it is not set, the Endpoint Encryption
for Files and Folders logon will appear as normal. Also, if this option is set but Endpoint
Encryption Manager is not installed (or an incompatible version of Endpoint Encryption
for PC is installed), then the Endpoint Encryption for Files and Folders logon will revert
to its normal behavior.
The automatic Endpoint Encryption for Files and Folders logon happens at each
Windows logon (but not screen saver logon). If the user closes the keys and doesn't
re-logon to Windows, then the user will be prompted to logon to Endpoint Encryption
for Files and Folders as normal as if the user accesses a protected file. Doing a manual
Endpoint Encryption for Files and Folders Synchronize will also work exactly as
before.
The automatic logon is independent of what Endpoint Encryption supported
authentication token is used.
Disable forcing of logon on first boot
This option enables/disables the enforcement of a first logon after the first re-boot
after the installation of Endpoint Encryption for Files and Folders. If enabled, there will
be a mandatory logon dialog, forcing the user to authenticate properly in order to
retrieve the correct set of encryption keys and the correct encryption policy. If forced,
the logon cannot be by-passed until proper Endpoint Encryption authentication
credentials have been entered. This ensures that the user cannot work without proper
encryption policies applied. If disabled, the user has to manually logon in order to
retrieve encryption policies and keys. Until then, the user will work with the default
policy from which the install set was created (i.e. a “blank” policy if not created from a
dedicated policy).