The PK Protect Agent is an application running on user’s desktop machines, that performs actions based on instructions it receives from the PK Endpoint Manager (PEM) configured by the IT administrative department in your organization.
The PK Endpoint Agent will automatically attempt to connect to the PEM whenever the desktop system is running. It uses your Windows system username/password to authenticate and establish a connection to the SEM.
HINT: If the PK Endpoint Agent can’t connect, or if your Windows system password has recently changed, you may be prompted to enter your new Windows username/password for the PK Endpoint Agent to recognize the change.
How to Identify Encrypted PK Protected Files
After a file has been protected, it is very easy to identify. There are several ways to determine that a file has been encrypted with PK Protect.
PK Protect Icon
- A visual indicator of the Smartcrypt icon is displayed on top of the traditional application’s icon.
- The ‘tool tip’ hover information will display ‘PK Protect Archive’ as the file type.
Details in Windows Explorer
- In Windows Explorer, the file type column will display ‘PK Protect File’ as well as the icon.
To show the original file type, add the ‘Tags’ column:
- On the menu, click View then Add Columns to reveal the selection options.
- Click Tags to add a check mark next to it.
The Tags column will now appear in the list showing the original file type.