Policy Inheritance |
Dropdown to select Do Not Inherit Parent Policy or Inherit Parent Policy. New policies default to Inherit Parent Policy + Authorization Disabled. Inheriting parent policies combines policies across objects; not inheriting applies only the object's own policy. |
Enable Authorization Settings |
When checked, settings below (e.g., allow decryption requests) become active. |
Allow Decryption Requests |
Default encryption permission; users can request document decryption from administrators. |
Advanced Settings |
Restrict which files can be requested for decryption by clients. |
File Name |
Defaults to all files. Specific file types (e.g., *.dwg, *.dxf) can be set, with separate inclusion and exclusion lists; exclusions take precedence over inclusions. |
Security Attributes |
Defaults to all attributes and levels. Specific secure objects and levels can be set with inclusion and exclusion ranges; exclusions take precedence. |
Allow Direct Decryption |
Permission to decrypt encrypted files directly without administrator approval. |
Advanced Configuration |
Limits the number or total size of files that clients can decrypt directly. Enable Settings must be checked for the following options to take effect. |
Time |
Cycle for quota calculation; choose Daily or Hourly. |
Quantity Quota |
When checked, set the maximum number of files that can be decrypted within the cycle. |
Size Quota |
When checked, set the maximum total file size (in MB) that can be decrypted within the cycle. |
Action |
Determines behavior when quota is exceeded: Deny prevents further decryption; Allow permits continued decryption. |
Alarm |
When checked, exceeding the quota triggers an alert in the console; alert levels can be adjusted. |
Warning |
When checked, set a warning message to display on the client when the quota is exceeded. |
Backup Decrypted Documents |
Back up decrypted files; the backup is the original encrypted file before decryption. |
Backup Range |
Only documents within this size range will be backed up. |
Allow External Release Requests |
Users can request external release of documents from the administrator. |
Advanced Settings |
When requesting external release, restrict the selectable external release objects and configuration; external release configuration can be chosen from existing templates via the button or set manually. Click the button to save the current settings as a new external release template. |
External Recipients |
When a client requests file export, it can only be sent to designated recipients. It can also be configured to require at least one recipient for each export request. |
File Configuration |
When a client requests file export, each permission can only be set as specified.
Printing, Virtual Printing, Clipboard, Screenshot, Editing, Auto-Delete, Hide:
- Unlimited: The client can freely select or deselect this permission when requesting file export.
- Prohibited: The client cannot select this permission, and it cannot be changed.
- Allowed: The client must select this permission, and it cannot be changed.
- Maximum Open Count & Validity Period:
- Unlimited: The client can choose whether to set a maximum open count or validity period.
Input Value:
- Open Count: Enter a positive integer from 1–99; the client can only set this value as the maximum open count, which cannot be changed.
- Validity Period: Enter a positive integer from 1–1000; the client cannot set a validity period longer than the specified number of days.
Decrypt-Only Files:
- Prohibited: The client cannot enable file decryption.
- Input Value: Enter file types separated by commas (e.g., *.dwg,*.dxf). The client can select "Allow File Decryption", and only files of the specified types will be decrypted. Files generated via "Save As" from the exported file will be decrypted if they match the specified types; all others remain encrypted.
Password Authentication:
- Unlimited: The client may set a password or leave it unset; there is no restriction on the password.
- Password Required: The client must set a password when requesting file export.
- Password Complexity Required: The client must set a password that meets complexity requirements.
|
Allow Direct Export of Documents |
Generate exported documents directly without administrator approval. |
Advanced Settings |
Restrict recipient selection and export configuration when the client exports files directly. See Advanced Settings for Export Request Permissions for details; settings are similar. |
Backup Exported Documents |
Backup exported documents. |
Backup Range |
Only exported documents within this size range will be backed up. |
Allow Extraction of Documents Within Client Permissions |
Clients can extract exported documents with access rights within their own permissions. |
Allow Extraction of Higher-Permission Documents |
Clients can extract exported documents with access rights higher than their own. |
Allow Request to Modify Encrypted Document Properties |
Clients can request administrators to modify encrypted document properties. |
Additional Advanced Settings |
When set for domain users or groups, further advanced options can be configured per user. When clients request document property changes, restrictions can be applied to searchable/viewable audiences and user permissions. |
Reading Audience |
Settings below take effect only when "Enable User Permission Control" is checked;
- Users and roles that the client can find under the "Search" tab when modifying document properties. Users and roles outside this scope cannot be searched. Default is the entire network (all users and roles).
- Users and roles that the client can view when modifying document properties. Default is empty; the "User Structure" tab will not appear. Once a browsable audience is selected, the "User Structure" tab appears showing the selected audience.
|
User Permissions |
When the client modifies document user permissions, each file permission can only be set as specified.
- Read, Modify, Set Permissions: Can be set to Prohibited or Allowed + Prohibited.
- Copy, Print, Screenshot: Can be set to Prohibited, Not Set + Prohibited, or Allowed + Not Set + Prohibited.
- Decryption Permission: Can be set to Prohibited or Not Set + Prohibited.
Permission Effects:
- Allowed + Not Set + Prohibited: The client can set the reader's permission to Allowed, Not Set, or Prohibited.
- Not Set + Prohibited: The client can set the reader's permission to Not Set or Prohibited.
- Allowed + Prohibited: The client can set the reader's permission to Allowed or Prohibited.
- Prohibited: The client can only set the reader's permission to Prohibited.
- When a permission is set to Not Set, its effect depends on the authorized software used to open the file. For example, if a DOCX file's "Print" permission is set to Not Set, printing is blocked if the Office Word software used to open the encrypted file prohibits printing. If the software allows printing, the encrypted document can be printed.
Validity Period:
- Unlimited: The client can choose whether to set a document validity period.
- Input Value: Enter a positive integer 1–1000; the document validity cannot exceed this number of days.
|
Template Settings |
When modifying document user permissions, the client can only select from templates set by the administrator.
- Allow Template Selection: Enables the user permission template feature; check to turn it on.
- Selected Template: Default is empty. Click to open the template selection window and choose from available templates.
- Allow Modifying Permissions in Template: Default is unchecked. If unchecked, the client cannot change permission states after selecting a template. If checked, the client can modify permission states within the template's allowed range.
|
Allow Direct Modification of Encrypted Document Properties |
Modify encrypted document properties directly without administrator approval. |
Advanced Settings |
When setting for domain users or groups, additional per-user advanced options can be configured. When the client directly modifies encrypted document properties, restrictions apply to searchable or browsable audiences and user permissions. See Advanced Settings for Modification Request Permissions for details; the settings are similar. |
Allow Proxy Admin Login |
Allows administrator accounts to log in as a proxy admin on the client for decryption and export approvals. |
Allow Client to Logout of Encryption System |
The client can log out of the encryption system while online. All encryption functions are disabled upon logout and restored after logging back in. |
Encryption Login Method |
If Allow Client to Logout of Encryption System is checked, the client can log out of the encryption system.
- Allow Client to Set Login: The client can configure online and offline login preferences under "Encryption Icon → Right-Click → Options → Encryption System Login Settings."
- Force Manual Login: Online and offline login are set to "Force Manual Login" and cannot be changed.
- Automatic Login: Online and offline login are set to "Automatic Login" and cannot be changed.
|