Specifications
Endpoint Encryption for Files and Folders client 
72 | 
Synchronize 
Synchronizing Endpoint Encryption for Files and Folders triggers an authentication to 
the Endpoint Encryption database. Upon synchronization, the user’s policy is updated 
to reflect any changes in the Endpoint Encryption database. Also, all encryption key 
assignments and settings are updated. For example, the user may have been revoked 
access to a certain encryption key. After synchronization the revoked encryption key 
will no longer be available to the user. 
Also, any successful Endpoint Encryption for Files and Folders authentication when the 
central database can be reached automatically updates the user’s policy and the 
encryption key settings. Hence, it is not necessary to do a manual Synchronization to 
get the policy updated; yet the option exists for immediate synchronizations. 
For information on what settings are available in a Endpoint Encryption for Files and 
Folders policy see the Endpoint Encryption for Files and Folders Policies chap
ter in this 
guide. 
Local user key management options 
There are entries on the Endpoint Encryption for Files and Folders tray icon menu that 
relate to the management of local user generated keys; each entry is subject to policy 
control. When selected, each entry starts a wizard that assists the user in 
accomplishing that operation in an easy and intuitive manner. 
Figure33:Localuserkeymanagementmenuoptions










