Specifications
Endpoint Encryption for Files and Folders client 
| 71 
For more information about setting up and configuring Endpoint Encryption Web 
Recovery, please see the Endpoint Encryption Manager Administration Guide, chapter 
about Web Recovery. 
Show status 
This entry opens a dialog presenting the ongoing activities in the Endpoint Encryption 
for Files and Folders client. For example, if the client is active in encrypting the content 
of a network folder, it will be displayed in the dialog along with an approximation for 
how long it will last. 
There are also two buttons available: 
Diagnostics 
This buttons automatically creates an e-mail with an XML attachment using the system 
default e-mail application. The attachment contains (non-sensitive) system data for 
support purposes. The better description of the machine needing support, the better 
understanding the Endpoint Encryption support staff will get and thus the chance of a 
quick resolution of the support issue is dramatically improved. 
The e-mail with the XML attachment shall be sent to the Endpoint Encryption support 
representative along with a description of the support issue. 
Again, it is important to stress that no secret or sensitive system data is gathered, but 
only system configuration data. Under no circumstances is sensitive information about 
encryption keys included, nor are any encryption keys, or pieces of these, ever sent to 
Endpoint Encryption. As you may verify by reviewing the XML file in a standard Web 
browser, there is no data disclosure of files stored on the machine, again only system 
configuration data is extracted. 
Endpoint Encryption makes no further use of the data sent to us other than trying to 
understand and reproduce the support issue. As soon as it can be done safely, the 
information sent to us is destroyed. 
Also, if there is information included in the text file that you find inappropriate, then 
edit the file before sending it to your Endpoint Encryption support representative. 
The default e-mail address may be changed by altering a registry value on the 
machine where the Diagnostics operation is executed. See the Client Registry controls 
s
e
ction for details. 
Synchronize 
Triggers a client synchronization with the Endpoint Encryption database. See the 
following section for details. 










