Specifications
Endpoint Encryption for Files and Folders client
| 81
CAUTION:Pleaseobservethefollowingregardingthisoption:First,inordertohaveEncryptandE‐mail…
availableinthecontextmenu,itmustfirstbeenabledintheuser’spolicy.Second ,thisoptionwillonlybe
visiblewhenright‐clickingafile,i.e.unliketheSelf‐Extractors,notonfolders.
The foll
owing is a step-by-step instruction to the user how to send a document as an
encrypted e-mail attachment.
Creating and sending the attachment
Select document
Select the document that shall be sent as an encrypted attachment by right-clicking it
and select Attach encrypted to E-Mail... from the menu that appears.
CAUTION:Thedecisiontosendaparticulardocumentasanencryptedattachmentisdoneoutsidethee‐
mailapplication.TheAttachencryptedtoE‐mail...operationisselecteddirectlyonthedocumentandnot
fromwithinthee‐mailapplication.Theencryptedattachmentwillthenautomaticallybeattachedto
whatevere‐mailapplicationisusedinanewe‐mail.
Select encryption key
The di
al
og that opens up will ask for a selection of encryption key for the attachment.
If the document is already encrypted, it is possible to proceed by clicking OK.
However, in that case the recipient must also have the key the document is already
encrypted with.
If the document was not already encrypted, the user cannot click OK until an
encryption key is selected from the list of available keys.
Select the encryption key to use for the attachment and then click OK to continue.
Authenticate and Send
Depending on whether the selected key is loaded or not, the user may be prompted to
authenticate before proceeding. Once the attachment is created and encrypted, it will
automatically be attached to a new e-mail that is created. The user then fills in the
rest of the e-mail and sends it.
Reading the attachment
For the recipient to read the attachment, first assure that Endpoint Encryption for Files
and Folders is installed and that the user can access the encryption key used to
encrypt the attachment.
Then the recipient simply double-clicks the attachment and it will open in its correct
application. If the key used to encrypt the attachment is not available, the recipient
must first authenticate.
The user may read the attachment and save it in an encrypted state.










