Cryptzone Support

If you wish to submit a support ticket please sign in to your customer portal or use the “submit a ticket” button at the top menu.
If you need to find documentation about our Sheriff Suite please login to the Hive- Click Here



Which are the different Protection Methods in SEP

« Go Back

Which are the different protection methods? 
The information can be protected through encryption with the following protection methods: 


  • Recovery password (default)
  • Private Password
  • Master Password (default)
  • IFilter Key
  • Custom Password
  • Always secure for the selected users and groups
  • Let the user select who to secure for

The only exception for these protection methods is Secured eMail, who uses different protection methods - for how to decrypt secured eMails, read more here 

Use recovery password 
The recovery password will be activated and can be used for unlocking files and folders where the regular password has been lost or forgotten. 

Use private password 
When enabled the normal client level password is used for encryption/decryption. Changes are tracked by the system 

Use master password 
When enabled the user and administrator can encrypt and decrypt using the master password. 

Use IFilter key 
When enabled users can search for content inside secured documents residing in SharePoint. 

Ask for custom password 
The Custom password is used when only one unique password should be able to decrypt the file. Note that the master password will still be able to decrypt unless disabled. Changes are not tracked by the system. 

Always secure for the selected users and groups 
Click select to set the users and groups that always will have access regardless of what user sets as selection.  

Let the user select who to secure for 
Asks the user to decide which  users and groups that will share access to files. The limit selection limits the scope presented to the user for selection 


Article Info
3/13/2015 11:57 AM
3/13/2015 11:57 AM



Was this article helpful?



Please tell us how we can make this article more useful.

Characters Remaining: 255