# Limitations, FAQ and Best Practices

### Known Issues & Limitations

| Issue                                  | Description                                                                                                                                                              | Workaround                                                                                                                                                                                                                                         |
| -------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| Slow performance with multiple clients | When multiple computers try to encrypt files on the same network share (SMB) simultaneously, file locking can cause the process to slow down significantly.              | Assign different specific folders to each client machine instead of having them all work on the exact same folder concurrently.                                                                                                                    |
| No UI to monitor encryption status     | The tool does not have a dedicated graphical interface (UI) to show detailed progress while encrypting or decrypting files. Progress tracking is limited.                | You can monitor the `Status` and `DetailedStatus` registry keys (mentioned in the configuration documentation) for updates on the current task.                                                                                                    |
| Key sync not checked on uninstall      | When uninstalling the tool, it doesn't automatically check if all the encryption keys or file logs have been successfully synchronized (synced) with the central server. | **Crucially:** Before uninstalling, manually check or confirm that all keys and logs have been fully synced. Uninstalling before sync is complete can lead to data loss, as you won't be able to decrypt files whose keys weren't saved centrally. |
| Tool Un-registration Display Issue     | After the tool is uninstalled from a computer, the central management dashboard might still show the tool as being registered for a period.                              | This is typically a display delay. The central system should update eventually.                                                                                                                                                                    |

***

### Troubleshooting & FAQs

**Q: The tool is not encrypting files. What should I do?**

* **Check Permissions:** Ensure the account running the FenixPyre service has the necessary read, write, and modify permissions for the folder(s) you are trying to encrypt (`FolderPath` setting).
* **Check Service Account:**
  * By default, the `FPEncDecService` (the tool's Windows service) runs using the 'Local System' account. This works fine for local folders.
  * If encrypting **local folders**, try restarting the `FPEncDecService` with Administrator privileges.
  * If encrypting **network share folders**, the 'Local System' account usually doesn't have network access. You need to change the service's "Log On As" setting:
    1. Open Windows Services (services.msc).
    2. Find `FPEncDecService`.
    3. Go to Properties -> Log On tab.
    4. Select "This account" and enter the credentials of a user account that has full permissions on the target network share.
    5. Restart the service.

**Q: How do I verify if a file is encrypted by this tool?**

* Try opening the file using a simple text editor like Notepad.
* If the file has been successfully encrypted by the FenixPyre tool, the content will usually start with the text `MONADNOCK_SODS` followed by seemingly random characters (garbled text). The original content will not be readable.

**Q: How can I share logs with the FenixPyre team for troubleshooting issues?**

* The utility stores all the logs inside `C:\Users\Public\FenixPyre` folder. Compress and send the archive to FenixPyre team.

***

### Performance Tips & Best Practices

* **Use Fast Storage:** For significantly faster encryption and decryption speeds, run the tool on drives that use Solid State Drive (SSD) technology rather than traditional Hard Disk Drives (HDD).
* **Network Share Strategy:** Avoid having multiple FenixPyre clients encrypting files within the *exact same network folder* at the same time, as this can cause slowdowns (see Known Issues). If multiple clients need to work on network shares, assign them different target folders to process.

***


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.fenixpyre.com/fenixpyre-for-admins/admin-dashboard/fenixpyre-standalone-encryption-utility/limitations-faq-and-best-practices.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
