Specifications
Endpoint Encryption for Files and Folders client
80 |
By default, the open-close-wipe option is selected. If the Extract option is selected
instead, the user may select where to permanently save the unpacked and decrypted
Self-Extractor. The user may browse for a suitable location with the Browse button.
Figure42:SelectingstoragelocationfortheunpackedSelf‐Extractor
Self-Extractors may be read on any computer running Windows 2000 and later. There
is no need to have the Endpoint Encryption for Files and Folders client installed. Nor is
there any need to have local administrator rights in order to open a Self-Extractor.
NOTE:IfafileisencryptedwithEndpointEncryptionforFilesandFolders‐whencreatingaself‐extracting
file,thecopyofthefilebeingplacedintheself‐extractorwillbedecrypted.However,theself‐extractoris
itselfencrypted(bythepasswor
dselectedbytheuser).Also,onlythecopyofthesourcefileusedforthe
self‐extractorisdecrypted,notthesourcefile/folder.
CAUTION:Whenopeningthefilesinthe self‐extractor,i.e.the“regular”files,withthedefaultapplications,
e.g.MSWord™,temporaryfilesandworkingcopie
smaybecre
atedfromthe“regular”files.Thesefile
copiescontaintracesofthecontentofthe fileintheself‐extractor.Thus,deletingtheself‐extractingfile
andanyextractedfilemaynotbesufficientfromasecurityperspective,shouldtheself‐extractorcontain
sensitiveinformation.Inaddition,tracesofanyfileopenedonthecomputermaybefoundinthesystem’s
pagefile.Thus,makesuretoadviseyouruserstobecarefulonwhatcomputerstheself‐extractingfilesare
“opened”;sensitivedatamaybeleftbehindeventhoughtheself‐extractingfileandanyextractedare
“safely”deleted.
Attach encrypted to e-mail…
This option only appears when right-clicking files, not folders. It allows the user to
send a particular document (plaintext or encrypted) in a protected way to a recipient
that also has Endpoint Encryption for Files and Folders installed. The option creates a
special encrypted format of the document and attaches it automatically to an e-mail
that you can send. The recipient must have Endpoint Encryption for Files and Folders
installed and also have access to the encryption key used when creating the encrypted
attachment, i.e. either having a connection to the Endpoint Encryption database
hosting the key or having shared a user local encryption key.
NOTE:Ifyouattachanencrypteddocumenttoane‐mailwithoutusingtheEncryptandE‐mail...function,
thedocumentwillbeattachedinplaintextevenifthedocumentisencryptedondisk.Thesourcedocument
willstillbeencrypted,butthecopycreatedasanattachmentwillbeinplaintextandthe recipientwill
receiveitinplaintext.Ifyouwantthe“standard
”enc
ryptiontoremainintheattachedfile,youneedtoset
thee‐mailapplicationasanExemptedProcesses.










