Specifications

Endpoint Encryption for Files and Folders client
72 |
Synchronize
Synchronizing Endpoint Encryption for Files and Folders triggers an authentication to
the Endpoint Encryption database. Upon synchronization, the user’s policy is updated
to reflect any changes in the Endpoint Encryption database. Also, all encryption key
assignments and settings are updated. For example, the user may have been revoked
access to a certain encryption key. After synchronization the revoked encryption key
will no longer be available to the user.
Also, any successful Endpoint Encryption for Files and Folders authentication when the
central database can be reached automatically updates the user’s policy and the
encryption key settings. Hence, it is not necessary to do a manual Synchronization to
get the policy updated; yet the option exists for immediate synchronizations.
For information on what settings are available in a Endpoint Encryption for Files and
Folders policy see the Endpoint Encryption for Files and Folders Policies chap
ter in this
guide.
Local user key management options
There are entries on the Endpoint Encryption for Files and Folders tray icon menu that
relate to the management of local user generated keys; each entry is subject to policy
control. When selected, each entry starts a wizard that assists the user in
accomplishing that operation in an easy and intuitive manner.
Figure33:Localuserkeymanagementmenuoptions