LogoLogo
SupportDashboard
  • 👋Welcome to FenixPyre
  • Overview
    • 💡What we do
  • FenixPyre for Admins
    • Getting Started
      • Prerequisites Checklist
      • Creating a tenant for your Organization
      • Invite your team members
      • Create your Master Encryption Key
      • Setup SSO and automatic user provisioning
      • Create your first cloud integration
      • Setup User Policies
      • Install FenixPyre Windows Client in a machine
      • Firewall Whitelisting Requirements for FenixPyre Services
    • Admin Dashboard
      • Home
      • User Management
        • Invite your team members
        • Manage Guests
      • Groups Management
      • Installers
        • FenixPyre Windows Client
          • How to download FenixPyre Windows Agent from Installers Page
          • Auto Update and Upgrade Management of FenixPyre Windows Client
      • Reports
      • Integrations
        • SharePoint/OneDrive
          • Overview
          • How to enable FenixPyre integration in SharePoint
          • How to configure SharePoint Integration in Admin Dashboard
          • How to configure Auto Encrypted folders
        • Egnyte
        • Box
          • How to enable FenixPyre integration in Box
          • How to configure Box Integration in the Admin Dashboard
          • How to configure user policy (Protected folder)
      • Sharing Settings
      • Identity & Provisioning
        • Domain Management
          • Primary Domain
          • Guest Domain
        • SAML Single Sign-On (SSO) Setup
          • Set-up SAML SSO with Azure
            • Verify the SAML SSO
            • Sign-in to Admin Dashboard with Azure AD
            • Sign-in to SharePoint integration with Azure AD
          • Set-up SAML SSO with Okta
            • Adding users to Okta Application
            • How to verify SSO sign-in
            • Sign-in to SharePoint integration with Okta
        • Automatic Account Creation
        • SCIM
          • User Management with SCIM(SCIM events)
          • Set-up SCIM for Azure
            • How to provision a user
            • How to de-provision a user?
            • Known limitations
          • Set-up SCIM for OKTA
            • How to provision a user?
            • How to de-provision a user?
            • Known limitations
          • What happens when a user is de-provisioned?
          • Known Limitations
      • Key management
        • Master Encryption Keys
          • Create Master Encryption Key with FenixPyre
          • Setup Bring Your Own Master Encryption Key (BYOMEK) with Azure
            • Configure Azure Key Vault as Bring Your Own Key Provider
            • Create a Master Encryption Key and Store in Azure Key Vault
          • Setup Bring Your Own Master Encryption Key (BYOMEK) with Google HSM
            • Configure Google HSM as Bring Your Own Key Provider
            • Create a Master Encryption Key and Store in Google HSM
            • Import a master encryption key from Google HSM to FenixPyre
      • User Policies
        • Policy Rules Guide
      • User Applications
    • FenixPyre Windows Agent
      • Prerequisites for FenixPyre Windows Client Installation
      • How to download and install windows agent
      • How to install FenixPyre Windows Desktop Client
      • How to install FenixPyre Windows Desktop Client via command line or RMM
      • How to login to FenixPyre Windows Agent
    • Cloud Integrations
      • SharePoint/OneDrive
      • Box
      • On-Prem Secure Sharing Solution
        • Overview
  • FenixPyre For Users
    • SharePoint
      • Install and activate FenixPyre Chrome extension
      • How to encrypt files
      • How to open encrypted files
      • How to share and collaborate with a encrypted file
      • How to share and collaborate with a FenixPyre protected folder
      • How to decrypt files
      • How to view access logs for an encrypted file
      • How to clear browser cache for SharePoint
    • FenixPyre Sharing
      • How to encrypt files
      • How to open encrypted files
        • Supported File types for FenixPyre Sharing Open
      • How to share and collaborate with a encrypted file
      • How to share and collaborate with a FenixPyre protected folder
      • How to view access logs for an encrypted file
      • How to download a file
    • Windows Agent
      • How to login to FenixPyre Windows Agent
      • How to protect/un-protect folders with FenixPyre Windows Agent
      • How to encrypt a file using FenixPyre
      • How to open a file using FenixPyre
      • How to share a file using FenixPyre
      • How to un-install FenixPyre Windows Client
  • FenixPyre for Recipients
    • FenixPyre Sharing Guide
      • How to create new files from a FenixPyre shared link
      • How to request access for a link on FenixPyre
      • How to Create New Folders in a FenixPyre Shared Link
      • How to upload files to a FenixPyre shared link
      • How to download files from a FenixPyre shared link
      • How to co-edit a encrypted file from a FenixPyre shared link
      • How to open a FenixPyre encrypted file shared via SharePoint/OneDrive/Teams
  • FenixPyre Features
    • Offline mode
    • Compliance mode
  • FAQs / Trouble Shooting
    • How to collect FenixPyre agent logs
    • How to reload SharePoint Integration in FenixPyre
    • How to update SharePoint client Certificate
  • Release Notes
    • FenixPyre Windows Client Releases
      • Windows Agent v6.4.0
      • Windows Agent v6.3.0
      • Windows Agent v6.2.0
    • FenixPyre Cloud Releases
      • May 2025
      • March 2025
      • January 2025
  • References
    • Glossary
    • How to Guides
      • How to install WebView2 on your Windows Machine
      • How to enable TLS 1.2 on Windows for Agent Installation?
      • How to install Microsoft Visual C++ Redistributable (x64) 2019 or higher?
      • How to Whitelist FenixPyre's Windows Agent in your Antivirus/EDR/XDR?
      • How to zip and share FenixPyre windows client logs?
  • Group 1
    • Page 1
Powered by GitBook

© 2018-2025 FenixPyre Inc

On this page
  • What is Compliance Mode?
  • What Problem Does Compliance Mode Solve?
  • How Does It Work?
  • Use Cases
  • Key Benefits

Was this helpful?

  1. FenixPyre Features

Compliance mode

What is Compliance Mode?

Compliance Mode is an advanced security feature in FenixPyre that allows users to interact exclusively with encrypted data when enabled. It ensures sensitive files remain encrypted and inaccessible in their decrypted form, enforcing stringent control over data visibility and usage.


What Problem Does Compliance Mode Solve?

Compliance Mode directly addresses challenges in environments where sensitive data (such as Controlled Unclassified Information - CUI) and non-sensitive data coexist. It prevents accidental exposure or unauthorized access to sensitive decrypted data, significantly reducing data leakage risks and strengthening compliance with security standards like CMMC.


How Does It Work?

  • Enabled Compliance Mode:

    • Users can only access encrypted files.

    • Attempting to open a decrypted file automatically encrypts it upon saving, maintaining compliance.

  • Disabled Compliance Mode:

    • Users have full access to decrypted files but cannot view or edit encrypted files, as they appear in ciphertext.

Compliance Mode can be selectively activated for specific applications, enabling fine-grained control and flexibility without disrupting existing workflows or user experience.


Use Cases

Compliance Mode is specifically valuable in regulated industries and scenarios requiring strict data governance, including:

  • Defense and Government Agencies (CMMC Compliance):

    • Managing Controlled Unclassified Information (CUI) alongside regular data without cross-contamination risks.

  • Healthcare and Financial Services:

    • Ensuring sensitive personal or financial data remains protected at all times.

  • Enterprise Environments with Mixed Data Sensitivity:

    • Safely using encrypted and unencrypted data within the same user environments, enhancing security posture without user friction.


Key Benefits

  • Seamlessly maintains data encryption, enforcing security policies transparently.

  • Protects sensitive data automatically without additional user training or complexity.

  • Enables organizations to confidently comply with regulatory frameworks like CMMC.


PreviousOffline mode NextHow to collect FenixPyre agent logs

Last updated 2 months ago

Was this helpful?

For more information on how to enable and setup compliance mode please contact .

FenixPyre Support