Skip to main content

Policies

User and Group Policies

Overview

Before users can use Smartcrypt successfully, system administrators must establish effective data encryption policies. Smartcrypt policies, defined on this tab, are responsible for controlling the end user experience, configuring and locking program options and most importantly, specifying administrative policy keys for use by Audit, Discovery and Data Loss Prevention (DLP) people, processes and technology.  

Each client device's agent application checks in with the manager at a standard (configurable) interval.  When the client checks in, Smartcrypt Enterprise Manager (SEM) applies any policy changes. Policy order on the Policies page is important; the client agent processes the Policies list from the top down. The agent uses the first one that applies to its particular user. Each policy has a defined scope of users that it applies to. When group policies are applied to a client, those policies always override the site-wide policy. If no policy is defined for a particular user, they will receive the site-wide-default policy.

For example, let's say you want to define a policy that applies to your Admin group, composed of one person from each of your departmental groups (Sales, Executive, Marketing, IT). When you add a new policy, it assumes the top position. For the Admin group policy to be applied to those departmental representatives, you should define the departmental policies first. Otherwise, you can adjust the processing order by dragging policies Up or Down in the Order column. The Site-wide Default policy cannot be re-ordered.

Most policy controls will have four drop-down options:

Option

Description

Allowed (default on)

Option is end user configurable and its default state is on

Allowed (default off)

Option is end user configurable and its default state is off

Required

Option is not end user configurable and has been locked on

Disabled

Option is not end user configurable and has been locked off

Affected policy controls and their default settings are listed in this table.

SectionControlDefault Setting
Integration

Save changes as soon as possible

Allowed (default off)
Alternate Data StreamsStore Alternate Data StreamsAllowed (default off)
Encryption
Allowed (default on)
EncryptionPassphraseAllowed (default on)
EncryptionSmartkeysAllowed (default on)
EncryptionCertificatesAllowed (default on)
Signing
Allowed (default on)
OpenPGP File CreationASCII ArmorAllowed (default off)
OpenPGP File CreationEncryptionAllowed (default on)
OpenPGP File CreationEncryption PassphraseAllowed (default on)
OpenPGP File CreationEncryption OpenPGP KeyAllowed (default on)
OpenPGP File CreationSign FilesAllowed (default on)
Outlook Plugin Behavior SettingsExclude Email SignaturesAllowed (default on)
Outlook Plugin Behavior SettingsPrompt Before ZippingAllowed (default on)
Outlook Plugin Behavior SettingsAuto-search RecipientsAllowed (default on)
Outlook Plugin Behavior SettingsInclude Unzip InstructionsAllowed (default on)
Outlook Plugin Behavior SettingsSign AttachmentsAllowed (default off)
Outlook Plugin Behavior SettingsRe-Encrypt AttachmentsAllowed (default on)
MacOS Policy SettingsAutomatically open extracted itemsAllowed (default on)
MacOS Policy SettingsDelete file(s) on encryptionAllowed (default on)
MacOS Policy SettingsDelete archive on decryptionAllowed (default off)

For administrative access to enterprise-wide encrypted content, Smartcrypt supplies two options for customers. 7361943 and 7361943. A contingency key is included with any encrypted file created in an organization, and can be opened by anyone with access to the contingency key's private key. A Contingency Group allows all members of that group to open files encrypted by the other group members.


Contingency Public Keys

Contingency keys enable an organization to decrypt files encrypted by anyone in the organization, whether the files were passphrase-encrypted or were encrypted for specific recipients.

Contingency keys are third-party OpenPGP or X.509 formatted public keys that will be automatically included in every encryption operation performed by Smartcrypt.  These can be keys that you generate outside of the Smartcrypt ecosystem in accordance with your organization's security policy.

Whether the files are password-encrypted or encrypted for specific recipient public keys, contingency keys provide a safeguard to be sure that important information belonging to the organization does not become inaccessible because no one in the organization can decrypt it.

Contingency keys must use RSA-2048 (or stronger) encryption. To add a contingency key to Smartcrypt Enterprise Manager (SEM) for use in a Policy:

  1. Go to Archive > Policies.
  2. Click Add in the Contingency Public Keys section.
  3. Browse your system for the public key file.
  4. Click Upload.

When you need to open a file encrypted with a contingency key, be sure the private key is accessible.

Changing a Key Name

SEM uses the key file name to identify the Contingency Key. If you wish to change this Name, click Edit and type in the new Name.

Defining Policy

Smartcrypt provides a default Site-wide Default policy that Admins can edit. To add a group policy, you enter a similar form, but you will need to define the Group that the policy applies to.

General Settings

These settings regulate how often clients must connect with connect with Smartcrypt Enterprise Manager (SEM) for different purposes.  

Setting

Description

Name

The name of the policy (such as "Legal Group" or "Accounting"). If you don't name the policy, SEM will describe the Policy with a date and timestamp. Note: You cannot edit the name of Site-wide Default policy.

Authentication Check Interval (minutes)

How often an agent re-authenticates with the Smartcrypt Manager (in minutes). Default: 15 minutes. Edit the field to change this interval.

Offline Access Limit (hours)

Smartcrypt agents cache encryption keys they have access to on the systems they run on. If an agent loses connection with the manager (For example, the user's AD account has been disabled and the agent can no longer log in) this is the maximum time (in hours) the agent will keep the keys before it automatically purges them from that device. Default: 24 hours. Edit the field to change this interval. Note: Keys will be re-synced if / when the device is successfully re-authenticated.

Allow Mobile App AccessEnables or disables the ability to use Smartcrypt for iOS or Smartcrypt for Android for the specific user set defined in the policy. Default: Enabled.
Allow Authority Information Access Certificate Chain RetrievalsDefault: Enabled.
Reset Client DefaultsChecking this box will reset any existing policy on any Smartcrypt client device before applying this new policy.

FIPS Mode

FIPS is an abbreviation for Federal Information Processing Standards, a set of standards for information processing in federal agencies in the United States. In FIPS 140 mode, encryption and decryption are done using only encryption and hashing algorithms that have been validated for compliance with FIPS 140-2 security requirements for cryptographic modules by NIST (National Institute of Standards and Technology), a branch of the US government.

Click your preferred FIPS compliance options. Your selection will turn a bright blue; this is the default for clients that this policy applies to. The site-wide policy by default displays all the options, allowing clients to change from the default. To enforce just one selection (such as Use FIPS 140 Mode), delete the remaining options.

Note: FIPS mode is not supported on MacOS X.

FIPS Setting

Description

Prefer fastest available algorithms

Use the fastest version of the Advanced Encryption Standard (AES) available on the system. This is the default.

Use FIPS 140 mode

Use only FIPS-validated algorithms to encrypt or decrypt files, email messages, and email attachments.

Use FIPS-validated algorithms; allow AE extraction

Always choose FIPS-validated algorithms for encryption and decryption, but allow unzipping files encrypted with the AE-2 algorithm used by some compression applications.

Prefer FIPS-validated algorithms

Choose FIPS-validated algorithms over others, but does not require them.

Integration

If your user receives a ZIP archive with a single file in it, often they will want to open and read the zipped file without having to manually extract (decompress) it first. With the Integration section, administrators can define a set of file extensions that will automatically open. A default set of extensions, including Microsoft Office files, PDF and graphics files, are included.

To add a file type to the list, type the extension into the edit box. You'll be asked to confirm the addition.

To remove a file type from the list, select the extension by clicking the box and press Delete. You may undo the choice.

Save changes as soon as possible

By default, when someone opens a single-file ZIP archive, the ZIP container stays open until the file is closed. If the user makes changes to the file, the archive container doesn't record the change until the file is closed and returns to the container. Use the drop-down menu to change the policy to allow users to edit documents and update the archive.

If your policy allows this feature, client Office Integration settings will display this option; the user can turn this on or off. If your policy requires the feature, the setting will be checked; the user cannot change this. If your policy Disables the feature, the setting will not display in the client.

Caution

If the user continues making changes in the file while Smartcrypt is saving the previous changes, the data in the ZIP archive could be corrupted. It is always safer to enable the default behavior.

File Collaboration Options

These options set priorities for when single-file ZIP archives are auto-opened, accessible to anyone.

Collaboration Mode: Anyone can open and view a document inside a single-file ZIP, but only the first person to save a single-file archive is allowed to edit/change/save the source file. If others attempt to save changes, they are prompted to save a new ZIP, which can be merged into the original document later.

Exclusive Mode: Only one user can open and edit a document inside a ZIP. Anyone else attempting to open and read the document in this file will get an announcement that the file is open. They may optionally ask to be notified when the archive is available.

Collaboration and Exclusive Mode: If a file is auto-opened, Collaboration Mode applies. All other file types operate in Exclusive Mode.

No Collaboration Mode: Anyone can open an archive and view its content. If a second person opens the file (in read-only mode), the first person cannot save changes to the archive.

Caution

If Save changes as soon as possible and Collaboration Mode are both enabled, it's possible that two separate versions of the same document may exist. That is, User #1 opens DocumentX.docx, and while that document is being edited, User #2 opens DocumentX.docx, edits the same section. Both users save the document into a ZIP archive. User #3 might not know what wording is correct.

Users / Groups

Use these settings to define who is subject to this Group Policy.

Setting

Description

Users/Groups

List of Active Directory users and groups for which this policy should apply. Note: If a user is defined in more than one policy, the first one in the policy list will be applied.

Admins

List of Active Directory users and groups that are allowed to control and modify this policy. Note: If a user is defined that is not currently a Sys Admin, the user will be added to the SEM Admins list configured as a Security Admin.

Advanced Definitions of Users and Groups

Admins can use Boolean expressions to identify people and groups that expand beyond the limits of standard Active Directory Groups. You can select multiple users and groups, exclude some users with the NOT operator, and add other users

In this example, the LargeData Marketing group is the Group that this policy applies to, but the policy excludes user mig1@qanet.com.

To generate this result:

  1. Click
    In the Users/Groups field to display your options.
  2. Start typing the name of the User or Group you want to apply this policy to. Smartcrypt Enterprise Manager will display a list you can select from.
  3. Click Add Row.
  4. In the left-most field, change to User.
  5. To exclude a user, change the second field to not equal.
  6. Start typing the user name and select the user you want to exclude from this policy.
  7. At the top, change the Boolean operator. By default, the OR operator is selected. Change this to AND.
  8. Click outside the box to confirm the changes.

Note: The Smartcrypt Manager will query Active Directory to auto-complete an entry.

ZIP File Creation

Set encryption and signing policies for creating ZIP archives with the following.

Alternate Data Streams

In a sense, a file is a stream of data stored on a hard drive. When you open a file, the stream takes up space in a computer's memory. On modern Windows computers using the NTFS file system, individual files can contain multiple data streams. The content of a file is one data stream, but the same file can contain one or more alternate data streams. In the relatively rare instance that an alternate stream is created, it usually contains additional information about a file. For example, when Internet Explorer downloads a file from the Internet, it adds an alternate stream noting that the file originated outside the local network. Smartcrypt always retains this stream in archives. These streams are not common, but can add size to a file.

SettingDescription
Store Alternate Data StreamsPreserve the alternate data stream of a file during compression. Default setting: Allowed (default off)
Restore Alternate Data StreamsRe-apply the alternate data stream of a file when extracting. Default: None

Encryption

Administrators can choose whether to require every ZIP archive to be encrypted, and whether to allow users to Skip encrypting files on a case-by-case basis. Default: Allowed (default on)

Algorithm

Smartcrypt supports AES in several key lengths as well as AE2 (256-bit) and 3DES (168-bit). By default, Smartcrypt uses the strongest available algorithm and key length (AES-256). This displays in bright blue. Other allowed key lengths are displayed in a grayer blue. Admins can delete any algorithm to prevent its use.

Passphrase
Setting to control whether or not passphrase based encryption is allowed. Default: Allowed (default on)
Smartkeys

Default: Allowed (default on)

In addition to the basic usage settings, these options are available when Smartkeys are allowed:

Setting

Description

Allow users to create Smartkeys

Users can create and define recipients of Smartkeys. Default: Enabled

Allow users to delete Smartkeys

Users can delete Smartkeys they have created. Default: Disabled

Allow users to copy Smartkey passphraseSmartkeys automatically contain a passphrase. If you have users who share Smartkey-encrypted files with non-Smartcrypt users, this option allows those users to access the Smartkey passphrase and allow the recipient to open the encrypted file. Default: Enabled.

Allow encryptions with user's private Smartkey

Data can be encrypted with a private Smartkey issued with an account. Note: Files encrypted with private Smartkeys are not decryptable by contingency keys or contingency group members. Default: Enabled

Allow encryption using Smartkeys owned by other individuals (besides community keys)

Data can be encrypted with a Smartkey owned by another user. Note: "Another User" may be a Smartcrypt user outside of your organization. Default: Enabled

Certificates (X.509)

Default: Allowed (default on)

If you allow users to employ public key encryption In addition to Smartkeys, check the appropriate box to configure these options:

Setting

Description

Allow X.509 Certificates

Users can encrypt with X.509 personal certificates

Allow OpenPGP Keys

Users can encrypt with OpenPGP keys

Perform Strict checking

Strict checking identifies certificates that are valid and designated for encryption. See next section for 7361943.

Filter Issuer (CN)

If you wish to only see certificates created by a specific certificate authority, type the complete issuer's name in this box. You'll find this information in the Details tab of Certificate Properties.  Look for the Issued by section in the Details tab, and type everything after CN=.

For example, if all your company's certificates are issued by COMODO, type (no quotes) "COMODO Client Authentication and Secure Email CA" in this box.

Filter Subject (OU)

If you wish to only see certificates issued to someone in a specific organization, type the complete Organizational Unit (OU) name in this box.  You'll find this information in the Details tab of Certificate Properties.  Look for the Issued to section in the Details tab, and type everything after OU=.

For example, if all your company's certificates have an OU of Corporate Secure Email, type (no quotes) "Corporate Secure Email" in this box

Check certificate revocation

This option causes Smartcrypt to warn you if a selected certificate to add a signature appears on an accessible list of certificates that have been revoked. If strict checking is also turned on, Smartcrypt does not use a revoked certificate.

You must first download a list of revoked certificates from a certificate authority to use this option.

Strict Checking Options

Option

Description

Check Key Usage

Check the purpose for which the certificate is designated (encryption or signing).

Check Time Validity

Check whether the current date is within the valid range of dates for the certificate

Check Time Nesting

Check whether the period of validity of the certificate does not extend past the dates when the issuer certificate is valid. For example, if the issuer certificate is valid from February 1, 2015, to January 31, 2018, the date range during which the selected certificate is supposed to be valid does not begin before February 1, 2015, or end after January 31, 2018.

Signing and Certificate Options

Default: Allowed (default on)

Option

Description

Signature Algorithm

The signature algorithm creates a hash value for the file to be signed.

The hash value uniquely represents the file: any change to the file gives it a different hash value. Comparing the hash value of the file when it was signed with the file's current hash value reveals whether the file has been changed.

Smartcrypt uses the SHA2 hash algorithm at 256-bit strength by default. Stronger versions (384- and 512-bit) of SHA2 are also available. Click the button to approve the use of either of these algorithms.

Note: You may allow the use of the MD5 or SHA1 algorithms by clicking in a blank space on this line. These algorithms are deprecated for signing keys, and not recommended.

Perform Strict checking

Strict checking identifies certificates that are valid and designated for encryption. See 7361943.

Filter Issuer (CN)

If you wish to only see certificates created by a specific certificate authority, type the complete issuer's name in this box. You'll find this information in the Details tab of Certificate Properties.  Look for the Issued by section in the Details tab, and type everything after CN=.

For example, if all your company's certificates are issued by COMODO, type (no quotes) "COMODO Client Authentication and Secure Email CA" in this box.

Filter Subject (OU)

If you wish to only see certificates issued to someone in a specific organization, type the complete Organizational Unit (OU) name in this box.  You'll find this information in the Details tab of Certificate Properties.  Look for the Issued to section in the Details tab, and type everything after OU=.

For example, if all your company's certificates have an OU of Corporate Secure Email, type (no quotes) "Corporate Secure Email" in this box

Check certificate revocation

This option causes Smartcrypt to warn you if a selected certificate to add a signature appears on an accessible list of certificates that have been revoked. If strict checking is also turned on, Smartcrypt does not use a revoked certificate.

You must first download a list of revoked certificates from a certificate authority to use this option.

Check certificate revocation when verifying

Check whether an X.509 certificate has been revoked that has been used to sign or encrypt any file in the archive or the archive itself

Split Archives
OptionDescription
Allow Archive SplittingEnabling this option gives users the ability to take a zip file and split it into many zip files that together can make the original zip file.

OpenPGP File Creation

OpenPGP File Creation is optional in Smartcrypt. If you want to permit clients to create OpenPGP files, check Allow OpenPGP file creation.

Option

Description

ASCII Armor

ASCII armor (also known as Radix-64) is a character format that creates an ASCII character stream that could be used in transferring OpenPGP files through transport mechanisms that can only handle character data (for example, email body text). Default: Allowed (default off)

EncryptionYou have the option to allow users to create OpenPGP files AND disable Encryption. The default is Allowed (default on).

Algorithm

Smartcrypt offers the choice of the algorithms shown below. Different key lengths are supported for the Advanced Encryption Standard (AES) algorithm. In general, the longer the key, the stronger the encryption. Encryption also takes slightly longer in proportion to the length of the key.

Algorithm

Description

AES

The standard algorithm adopted by the U.S. federal government and in widespread use in banking and credit card operations.

CAST5

This algorithm is the default algorithm for many popular OpenPGP clients.

IDEA

This is an optional algorithm in the OpenPGP standard, used in many OpenPGP clients.

PassphraseDefault: Allowed (default on)
OpenPGP KeyDefault: Allowed (default on)
Sign FilesDefault: Allowed (default on)

Algorithm

Smartcrypt uses the SHA2 hash algorithm at 256-bit strength by default. Stronger versions (384- and 512-bit) of SHA2 are also available. Click the button to approve the use of either of these algorithms.

Note: You may allow the use of the MD5 or SHA1 algorithms by clicking in a blank space on this line. These algorithms are deprecated for signing keys, and not recommended.

Configuring Passphrase Complexity

To secure passphrase-encrypted files, use passphrases that are long enough and are not easy to guess. Smartcrypt helps administrators set requirements for both minimum and maximum passphrase lengths. Check the Enforce passphrase complexity rules box to do this.

For example, you can require a minimum passphrase length of 15 characters, or even 260 characters, instead of the default minimum of eight. Whenever your user encrypts with a passphrase, Smartcrypt enforces your rules by rejecting any proposed passphrase that does not comply.

You define these requirements after checking the box:

Requirement

What it means

Minimum Length

The minimum number of characters that a passphrase must contain. Passphrases shorter than this are rejected.

Longer passphrases are harder to guess. You can require a minimum length as great as 260 characters. Default is 8 characters.

Maximum Length

The maximum number of characters that a passphrase can contain. Passphrases longer than this are rejected. Default is 250 characters. You can assign a maximum length as great as 260 characters.

Maximum Repeats

Sets the maximum number of adjacent, case-sensitive occurrences of the same character. A setting of 1 allows no repetitions. A setting of 2 allows two adjacent occurrences, and so on. A setting of 0 (the default) turns the option off and allows all repetitions.

For example, a setting of 2 disallows a passphrase that contains aaa but allows aAa or a1a2a.

Minimum Lowercase

Minimum number of lower case alphabetical characters a passphrase requires. Default is 0.

Minimum UppercaseMinimum number of upper case alphabetical characters a passphrase requires. Default is 0.
Minimum DigitsMinimum number of digits (integers 0-9) a passphrase requires. Default is 0.
Minimum Symbols

Minimum number of special characters a passphrase requires.  By default a special character is defined as any non-alphanumeric character. Examples include

@#$%''*()_-+={}&&:;<>,.?/\`~!"* ^[]

Default is 0.

Placement rules

These rules restricts certain character types from being used as the FIRST character or LAST character of a passphrase. Use the drop-down menu next to the relevant character type (Lowercase, Uppercase, Digits, or Symbols).Choices include:

SettingDescription
Prohibit in first or last positionRejects the selected passphrase if the selected character type starts or ends the passphrase.
Prohibit if only in first or last positionRejects the selected passphrase if the selected character type starts or ends the passphrase, and does not appear elsewhere in the passphrase.

By default, Smartcrypt does not check for placement.

Configuring Contingency Keys

Choose from a list of existing 7361943 associated with this installation.

To define a contingency key, return to the main Policies page and click Add New Contingency Key.

Configuring Contingency Groups

A Contingency Group allows all members of that group to open files encrypted by the other group members. Choose from a list of Active Directory users to define Smartcrypt users that will be able to decrypt all information encrypted by users in this policy.

Outlook Plugin Policy Settings

The Smartcrypt Desktop application on Windows has a plugin that can run to control encryption operations for outgoing email in Outlook. There are several policies that dictate the use and control of the encryption settings.

Check the Enforce Outlook Integration box to set policy options for the Smartcrypt Outlook  Plugin. The following options will display.

General Settings

SettingDescription
Plugin Actions

This allows for control on the default and available actions from the Smartcrypt Outlook Plugin. The default option displays in bright blue. Other allowed actions are displayed in a grayer blue. Admins can delete actions to prevent there use.

ActionDescription
Encrypt message body and attachmentsIncluding this option allows users to send an email that is an email body encrypted email. The only part of the message that is not encrypted into a .zip archive is the subject line. This will require the recipient to use a email mime (.eml) viewer to read the original message. This is the most secure option, but also the most obtrusive to your normal email workflow.

Encrypt attachments only

Including this option allows users to send an email and ignore the body of the email message, and only encrypt the attachments to the email. The attachments will be gathered and included in 1 zip archive and then encrypted.
Compress attachments onlyIncluding this option allows users to send an email and ignore the body of the email message, and only compress the attachments to the email. The attachments will be gathered and included in 1 zip archive and then compress, but not encrypted.
Skip actionsIncluding this option allows users to send an email that bypasses the Smartcrypt Outlook Plugin. If this bypass is not desired, the option should be removed from the list of available actions.


Extensions to Include

Defining extensions to include creates a small subset of extensions that will be considered by the Smartcrypt Plugin when performing Compress attachments only and Encrypt Attachments only actions.

Example

Setup - The policy is set to include extensions ".pdf"

User Action - The user sends an email with a .PDF attached

Smartcrypt Outlook Plugin Option SelectedActionDescription
Encrypt Message body and attachmentsEmail body, and all attachments encrypted.Since email body encryption encrypts the body and attachments, the extension filters are ignored and the body and attachments are encrypted.
Encrypt Attachments onlyPDF is added to encrypted archive.Since there is a direct match on the extension in the email, the attachment is encrypted by Smartcrypt.
Compress attachments onlyPDF is added to compressed archive.Since there is a direct match on the extension in the email, the attachment is compressed by Smartcrypt.


User Action - The user sends an email with a .PNG attached

Smartcrypt Outlook Plugin Option SelectedActionDescription
Encrypt Message body and attachmentsEmail body, and all attachments encrypted.Since email body encryption encrypts the body and attachments, the extension filters are ignored and the body and attachments are encrypted.
Encrypt Attachments onlyNo action.No direct match on extension, no actions taken.
Compress attachments onlyNo action.No direct match on extension, no actions taken.
Extensions to exclude

Defining extensions in the extensions to exclude creates a small subset of extensions that will be ignored by the Smartcrypt Plugin when performing "Compress attachments only" and "Encrypt Attachments only" actions.

Example

Setup - The policy is set to exclude extensions ".pdf"

User Action - The user sends an email with a .PDF attached

Smartcrypt Outlook Plugin Option SelectedActionDescription
Encrypt Message body and attachmentsEmail body, and all attachments encrypted.Since email body encryption encrypts the body and attachments, the extension filters are ignored and the body and attachments are encrypted.
Encrypt Attachments onlyNo action.Direct match on extension, no actions taken because extension is set to be excluded.
Compress attachments onlyNo action.Direct match on extension, no actions taken because extension is set to be excluded.


User Action - The user sends an email with a .PNG attached

Smartcrypt Outlook Plugin Option SelectedActionDescription
Encrypt Message body and attachmentsEmail body, and all attachments encrypted.Since email body encryption encrypts the body and attachments, the extension filters are ignored and the body and attachments are encrypted.
Encrypt Attachments onlyPNG is added to encrypted archive.No direct match on extension, the attachment is encrypted by Smartcrypt.
Compress attachments onlyPNG is added to compressed archive.No direct match on extension, the attachment is compressed by Smartcrypt.
Exclude Email SignatureIf this option is enabled, text and pictures included in the signature element in an email will not be included in the archive and will appear in plain text in the email. Default: Allowed (default on)

Mail Encryption Settings

Use these settings to determine how Microsoft Outlook encrypts email message under this policy. Any changes made here to encrypting with Smartkeys, X.509 certificates or passphrases will apply to all Outlook messages, regardless of how encryption behaves outside of email.

Click inside the Email Encryption Options box to activate any of these option settings: PKWARE Identity, Certificates, Smartkey or Passphrase. Whatever you activate is available to Outlook users; to require an encryption option, click your choice again.

Depending on how SEM is configured, PKWARE Identity may not appear.

When you activate one or more options, these settings appear:

SettingVisibleDescription
Passphrase Instructions PromptWhenever Passphrase is selected

Enter text appearing when a passphrase is required for this email message.

Examples: Explain why a passphrase is required or if you have created passphrase complexity rules.

Use pre-selected Smartkeys when auto-search for recipients fails to find a SmartkeyWhenever Smartkey is selectedCheck this box to define one or more Community Keys to use if the initial search for recipients does not find a Smartkey. The Outlook plugin will select the first available Community Key.
Hide Smartkey selections when prompting for passphrase entryWhen Smartkey and Passphrase or all three are selectedCheck this box to display the Passphrase entry prompt before showing available Smartkeys.
Maximum Identities Per Server LookupWhenever Smartcrypt Identity is selectedSet a limit for how many recipients should be called up from each LDAP server. Default setting is 25.
Maximum Identities Used Per EmailWhenever Smartcrypt Identity is selectedSet a limit for how many recipients without a certificate or Smartkey can be included in an email message. Default setting is 25. 
Require passphrase entry for non-internal mail recipientsWhen Smartkey and Passphrase or all three variables are selectedAllows you to require a passphrase for each message sent outside the organization.

Recipient Filtering

Recipient filtering allows for specific rules to apply based on who the email is being sent to. The Smartcrypt Outlook Plugin can scan the To, and Carbon Copy (CC) fields and mandate certain Smartcrypt Outlook Plugin actions occur based on recipients.

To enable recipient filtering, type the email address to filter in the field next to the action you want done. Use wildcards to identify multiple addresses, as you see in the following example.

Example Recipient Filtering Rules

Smartcrypt Outlook Plugin OptionEmail List
Email Body Encryptionlegal@pkware.com
Encrypt Attachments
Compress Attachments
Skip Actions *@pkware.com
Internal Mail Recipients*@MyCompany.com

In this example, any email addressed to legal@pkware.com will automatically apply the action to encrypt message body and attachments, regardless of what the user has selected.

An email to any other @pkware.com email address will skip all processing. In this example, all email to @pkware.com except to the legal mailbox would be un-encrypted, and un-compressed.

You can further define any other Internal Mail Recipients to ensure that your organization's users skip any special handling for external recipients.

External Recipient Handling

These settings force users to take extra care when emailing people outside your organization. Check the Configure external recipient warnings box to display these settings.

Use the following check boxes to prompt your users (under this policy) when these conditions apply:

Prompt user on ...

  • Emails to external recipients
  • Emails to external recipients with attachments
  • Meeting invitations to external recipients
  • Meeting invitations to external recipients with attachments

By default, all these conditions are enabled. Clear the box to turn off the prompt.

When any of these boxes are enabled, you can configure how much information is included in the user prompt.

  • Display Recipient Expand Limit: When a user mails content to a list of external recipients subject to the policy, Smartcrypt will display all the addresses in the list by default, where the user can deselect individual recipients from processing. As an admin, you can define a top limit of how many individual emails to display. If, for example, the recipient list contains 1500 external addresses, you may not want Smartcrypt to individually process all of them to check for existing Smartkeys. With this setting, you can limit the number of list recipients to display.
  • External Email Recipient Prompt Instructions: Type the message you want to display when prompting the user. Tell the user what to do next. You are allowed to use Mini HTML rich-text features, including bold, underlined and italic formatting, line breaks <br>, and changing text fonts and colors in these instructions.
  • Distribution Exemptions: If you have a large distribution list, such as an "All Employees" list, type the list address (such as AllEmployees@MyCompany.com) here to prevent Smartcrypt from displaying every name in the list.

Content Filtering

Content filtering allows you to mandate a Smart Filter Bundle for Discovery purposes. Click in the Discovery Filter field, and use the drop-down menu to display the current list of Smart Filter Bundles (defined on the Discovery page). Select a filter bundle, or leave it blank.

For more complex filtering, click

. This7361943 behaves much like the 7361943, but only applies to Smart Filter Bundles.

Check Override Recipient Filtering to resolve conflicts between the actions mandated by the Discovery Filter and the actions mandated by the Recipient Filter.

You can also identify Outlook elements to apply Discovery rules to. These elements are activated by default:

  • Email Subject
  • Email Body
  • Email Attachments
  • Meeting Subject
  • Meeting Body
  • Meeting Attachments

Advanced Discovery Filters

Admins can use Boolean expressions to identify people and groups that expand beyond the limits of standard Active Directory Groups. You can select multiple Smart Filter Bundles, exclude some items with the NOT operator, and add others. In this example, the filter will search for all Personally Identifiable Information, but not credit cards or Social Security numbers.


To generate this result:

  1. Click
    in the Smart Filter Bundles row to display your options. The icon changes to
    .
  2. Start typing the name of the bundle. Smartcrypt Enterprise Manager will display a list you can select from.
  3. Click Add Row.
  4. To exclude a subset of information, change the second field to not equal.
  5. Again, type the bundle to select the information you want to exclude.
  6. At the top, change the Boolean operator. By default, the OR operator is selected. Change this to AND.
  7. Click outside the box to confirm the changes.

Outlook Plugin Behavior Settings

The Outlook Plugin has some basic behaviors that trigger a different user experience. The same 4-state drop down options apply here as well (Allowed On, Allowed Off, Required, Disabled) to the following options:

Behavior Option

Description

Prompt Before Zipping

There is another dialog that the Plugin can open to select user controlled options for Smartcrypt. This is useful when sending email outside of outlook (from a "send an email option" in other applications). Default: Allowed (default on).

Display Reason for Policy Based EncryptionCheck this box to display a message when this policy forces encryption of a message, Default: Enabled.
Add PKWARE header tag to emailYou may need to differentiate Smartcrypt-processed mail from the rest of your email traffic. Check this box to add an x-header tag to each email processed by the Outlook plugin.

Auto-search Recipients

Auto-Search Recipients will look at the users existing Smartkeys are try to pick a Smartkey that all recipients have access to. If a Smartkey is not found, a new only can be created with all recipients included on the email message. Default: Allowed (default on).

Include Unzip Instructions

Smartcrypt can include a plain text (non encrypted) document with instructions on how to decrypt the attachment. Default: Allowed (default on).

InstructionsText added here will be provided in a text file that is sent out automatically when a user sends an encrypted attachment. This text can be plaintext or HTML formatted. Note: This is not used when email body encryption is activated or when discovery filter override recipient filtering is not checked.

Sign Attachments

The zip archive produced by Smartcrypt can be automatically signed with a digital certificate (when present). Default: Allowed (default off).

Re-Encrypt Attachments

Users can change the encryption on existing ZIP archives attached to an email message. This option must be set if you want Smartcrypt to encrypt existing archives. Default: Allowed (default on).

Default ZIP Name

Smartcrypt gives the same, generic name to all ZIP file attachments that contain multiple files. In this field, specify the generic name to use.

When you zip a single attached file, ordinarily the ZIP file is named after the attached file itself. For example, if the attached file is my_file.docx, Smartcrypt names the ZIP file my_file.zip. (Exception: If the Security option to Encrypt file names is set, the generic name is always used.)

Following the Default ZIP Name, you can also define an alternate three-character extension for ZIP archives. Some networks have security settings that prevent file attachments with the ZIP extension from being sent or received. Use this feature if this is an issue for you or your recipient

If a standard name is required for all ZIP attachments (to possible be allowed through a mail gateway or to skip some other processing), a standard name can be defined as well by entering a name in the Default Zip Name field.

MacOS Settings

SettingDescription
Extract file location(s)

By default, Smartcrypt extracts compressed files in the same directory as the original archive. If another file with the same name is located in that same directory in Finder, the newly-extracted file is added as a copy of the original file.

This setting allows you to select a new default folder, or be prompted for a destination folder each time you open an archive. Choose from these options:

  • Original archive folder (default)
  • The user's Desktop
  • Other folder. This option opens a Finder box. Choose any folder for all extracted files to be extracted to.
  • Prompt for folder. When you select this option, you will be asked where to put the extracted files each time you extract an archive with Smartcrypt.
Extract email attachment location(s)

By default, Smartcrypt extracts compressed files in the same directory as the original archive. If another file with the same name is located in that same directory in Finder, the newly-extracted file is added as a copy of the original file.

This setting allows you to select a new default folder, or be prompted for a destination folder each time you open an archive. Choose from these options:

  • Original archive folder (default)
  • The user's Desktop
  • Other folder. This option opens a Finder box. Choose any folder for all extracted files to be extracted to.
  • Prompt for folder. When you select this option, you will be asked where to put the extracted files each time you extract an archive with Smartcrypt.
File select action option(s)

Define what happens when a user selects an archive.

Extract Archive: Unzip the files in the archive in Finder.

View Archive: Display the files in a Smartcrypt window.

Automatically open extracted itemsWhen the user extracts file(s) from an archive, open them in the associated application. Default: Allowed (default on).
Delete file(s) on encryptionWhen a file is encrypted, the unencrypted file is removed from the system. Default: Allowed (default on).
Delete archive on decryptionWhen files are decrypted (encryption is removed), the encrypted archive is deleted. Default: Allowed (default off).

Performance Management

Agent/Service

This setting can be enabled from the support page:

SettingDescription
Max Worker CountThe minimum number of worker threads when using the default optimal worker count algorithm. Default: 12
Min Worker CountThe maximum number of worker threads when using the default optimal worker count algorithm Default: 2
Worker Job Sleep (ms)The amount of time to sleep after a job is finished (successes AND failures). Default: 0

Cloning a Policy

Administrators can develop very finely-grained policies. Policies can be applied to individual users and groups, defined narrowly or widely. As an administrator, you might find that an effective set of permissions for one group simply do not work for one group. In cases where administrators want to tweak some policy settings for some users, you can Clone a policy to copy all its settings in a separate policy. You can then use the cloned policy as a template for the clone. When you have completed changing the settings in the clone, save the changes.

In the User and Group Policies section, click Clone to the right of the Policy you want to serve as the template for your new version. The new policy is named "Policy cloned from <original policy name> at <timestamp>.

You can then Edit the cloned policy as you would any other.

Note: You do not need to clone the Site-wide Default policy. It is the template for any new policy.

Performance Policies

Performance policies are policies that can be defined to customize the performance consumption by PKWARE clients. When policies defined here can be applied to clients by selecting devices on the "Archive/Devices" page and selecting a performance policy. It is recommended to read Microsoft's documentation on scheduling priorities here and that these policies be tested in lab environments before they are deployed in production.

You can Clone a policy to copy all its settings in a separate policy. You can then use the cloned policy as a template for the clone. When you have completed changing the settings in the clone, save the changes. In the User and Group Policies section, click Clone to the right of the Policy you want to serve as the template for your new version. The new policy is named "Policy cloned from <original policy name> at <timestamp>. You can then Edit the cloned policy as you would any other.

The "Default" policy settings are what all PKWARE clients start with unless given a different performance policy. These default settings include "Normal" thread priorities for both the agent and discovery. There are three PKWARE pre-defined performance policies that can be customized,

  • Normal User Workstation - Designed for a standard user workstation that will keep Agent thread priority at "Normal" and the Discovery Thread Priority at "Below Normal"
  • Minimal User Workstation - Created for user work stations with less resources and therefore may require PKWARE clients to consume reduced resources.
  • Dedicated Server - Meant for stand alone server machines that are dedicated to running Smartcrypt clients with lockers or assignments. Agent thread priotiy and Discovery thread priority are set to "Above Normal" with a higher worker max count and redaction process count.
SettingDescription

Name

Unique name for the performance policy
Agent CPU Max (%)Upper limit of CPU utilization of the Smartcrypt Agent and Smartcrypt Service processes.
Agent Thread PriorityPriority for the directory scanning and remediation handling threads in the Smartcrypt Agent and Smartcrypt Service processes. For more information on the different options see Microsoft's documentation here
Discovery CPU Max (%)Upper limit of CPU utilization of the Discovery Agent process.
Discovery Thread PriorityPriority for the active scanning threads in the Discovery Agent process. For more information on the different options see Microsoft's documentation here
Max Worker CountMaximum number of workers allowed to take items off the queue to process.
Min Worker CountMinimum number of workers allowed to take items off the queue to process.
Worker Job SleepAmount of time to sleep in between jobs per worker thread. A value of 0 will never sleep.
Periodic Scan Delay Max (minutes)Maximum randomized delay in the start of the periodic scan. The delay will be between 0 and the defined number.
Queue ThrottleHow many items are allowed to be in the queue per locker/assignment.
Queue Rate AmountNumber of items to be processed before Smartcrypt can sleep for X milliseconds, based on the Queue Rate Sleep value. A value of 0 will result in no delays.
Queue Rate Sleep (milliseconds)Amount to sleep in between the Queue Rate Amount intervals. A value of 0 will result in no delays.
Max Redaction ProcessesMaximum concurrent redaction processes allowed to be executed. A value of 0 will result in no limitations.
JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.