# Policy Rules Guide

## Protected folders

<figure><img src="https://3947089720-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FOuMyGdeUQs2m5OYPFuwT%2Fuploads%2FjS3ieWnwy0QGXGhNg3DE%2FFenixPyre%20Admin%20Dashboard%20Concept%201.jpg?alt=media&#x26;token=15b4c443-e64e-4806-894d-8aeb9de32ce8" alt=""><figcaption><p>Concept of Protected Folders</p></figcaption></figure>

Protected folders are fundamental in FenixPyre, defining specific folder locations accessible to designated users and groups. These folders allow users and groups within your organization to access and consume encrypted content using FenixPyre. Notably, encrypted files can only be accessed within these protected folders, whether via FenixPyre's Windows agent or cloud integrations. Examples of protected folder paths include common user directories, on-premises network drives, and cloud-based document sharing services.

### Supported Path Types

#### 1. Windows Local Paths

Local paths are used for protecting folders on users' Windows machines.

<figure><img src="https://3947089720-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FOuMyGdeUQs2m5OYPFuwT%2Fuploads%2FSIOoDP8iizhLqar10dBB%2Fimage.png?alt=media&#x26;token=4850231a-eb84-4f6d-a21d-3d4b0c4775ec" alt=""><figcaption></figcaption></figure>

**Syntax**

```
C:\Users\%username%\path\to\folder
```

**Key Features**

* Supports `%username%` variable for dynamic user paths
* Case-insensitive
* Backslashes (`\`) required as separators
* Drive letter (e.g., `C:`) must be specified

**Examples**

```
C:\Users\%username%\Desktop\Confidential
C:\Users\%username%\Documents\HR_Files
C:\Program Files\Company\Secure
```

**Best Practices**

* Use `%username%` for paths that should work across different user profiles
* Avoid spaces in folder names when possible
* Use consistent casing for better readability
* Verify the path exists before adding

#### 2. Network Paths

Network paths allow protection of shared folders on network drives. Supports UNC, DFS, and mapped drive paths.

<figure><img src="https://3947089720-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FOuMyGdeUQs2m5OYPFuwT%2Fuploads%2FcJyi3U3RFTktbL3tzpLf%2Fimage.png?alt=media&#x26;token=34f8f47d-a0f4-4faa-81a6-13fca3880eb0" alt=""><figcaption></figcaption></figure>

**UNC Path Syntax**

```
\\server_name\share_name\folder_path
```

**DFS Path Syntax**

```
\\domain\dfs_root\folder_path
```

**Key Features**

* Double backslashes (`\\`) required at start
* Server/domain name must be specified
* Supports both IP addresses and hostnames

**Examples**

```
\\fileserver\shared\Finance
\\192.168.1.100\documents\Legal
\\domain.local\dfs\Department\HR
```

**Best Practices**

* Use UNC paths instead of mapped drives for reliability
* Verify network connectivity before adding
* Ensure proper network share permissions
* Consider using DFS for location independence

#### 3. SharePoint/OneDrive Paths

Cloud paths for protecting content in Microsoft 365 environments.

<figure><img src="https://3947089720-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FOuMyGdeUQs2m5OYPFuwT%2Fuploads%2FmJ0E9r6ClacvxwoxBEW8%2Fimage.png?alt=media&#x26;token=c318ae22-be10-45fd-9a85-9f0500d74839" alt=""><figcaption></figcaption></figure>

**Syntax**

```
\\<sharepoint_domain>\sites\<site_name>\<folder_path>
```

**Features**

* Automatic conversion from web URLs
* Supports both SharePoint and OneDrive locations

**Examples**

```
\\company.sharepoint.com\sites\HR\Confidential
\\company-my.sharepoint.com\personal\user_company_com\Documents
```

**Automatic URL to Path Conversion**

Web URLs are automatically converted to the correct format. You can just paste any sharepoint/onedrive link and it will automatically be converted to the desired format:

```
https://company.sharepoint.com/sites/HR/Confidential
→ \\company.sharepoint.com\sites\HR\Confidential
```

#### 4. Egnyte Paths

For organizations using Egnyte cloud storage.

<figure><img src="https://3947089720-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FOuMyGdeUQs2m5OYPFuwT%2Fuploads%2FvjX7aTeCkqJ06uavJGgb%2Fimage.png?alt=media&#x26;token=08eaa8e9-4ea9-44a8-afa5-e7c2c5a64e80" alt=""><figcaption></figcaption></figure>

**Syntax**

```
\\<domain>.egnyte.com\<folder_path>
```

**Examples**

```
\\company.egnyte.com\Shared\Finance
\\company.egnyte.com\Private\HR
```

#### 5. Box Paths

For organizations using Box cloud storage.

<figure><img src="https://3947089720-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FOuMyGdeUQs2m5OYPFuwT%2Fuploads%2FNU3JmPt5GyIfkDZ2GGbu%2Fimage.png?alt=media&#x26;token=6715c284-3bfd-4bbc-ac9f-964fef4dcb63" alt=""><figcaption></figcaption></figure>

**Syntax**

```
\\<enterprise ID>@app.box.com\<folder path>
```

**Examples**

```
\\1174000000@app.box.com\New Folder\test
\\1174000000@app.box.com\All Files\Shared\Lab Folders
```

## User Permissions

The following permission decide what type of actions can be performed by the user or group on FenixPyre.&#x20;

<table><thead><tr><th width="128">Permission</th><th width="230">FenixPyre Windows Agent</th><th>FenixShare (SharePoint, OneDrive and other cloud integrations)</th></tr></thead><tbody><tr><td>Can Encrypt</td><td>This permission determines whether a user can encrypt files   </td><td>This permission determines whether a user can encrypt files  </td></tr><tr><td>Can Decrypt</td><td>This permission determines whether a user can decrypt files and remove protection. </td><td>This permission determines whether a user can decrypt files   </td></tr><tr><td>Can Share</td><td>This permission determines whether you can share a file via outlook or right-click option via FenixShare.</td><td>The permission determines whether you can share a file from SharePoint, OneDrive, Egnyte or Box Drive using FenixShare.</td></tr><tr><td>Can View Audit Logs</td><td>This permission determines whether a user can view audit logs form the right-click option</td><td>Thiis permission determines whether a user can view audit logs .</td></tr><tr><td>Can Open</td><td>Rolling out soon</td><td>Rolling out soon</td></tr><tr><td>Can Edit</td><td>Rolling out soon</td><td>Rolling out soon</td></tr><tr><td>Can Add Protection</td><td>Rolling out soon</td><td>Rolling out soon</td></tr><tr><td>Can Delete</td><td>Rolling out soon</td><td>Rolling out soon</td></tr></tbody></table>

## User Applications

{% hint style="info" %}
All admin approved and FenixPyre approved applications are displayed on the policy page. [Learn how to add a new application](https://docs.fenixpyre.com/fenixpyre-for-admins/admin-dashboard/user-applications)
{% endhint %}

With FenixPyre installed on Windows Desktops, you can control which applications can access encrypted files and how they do so.

<figure><img src="https://3947089720-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FOuMyGdeUQs2m5OYPFuwT%2Fuploads%2FCc04ifRSCyerUJT2jiGr%2FProject%202025-01-22%20at%2020.53.25.gif?alt=media&#x26;token=45bee69c-8b8c-41dc-b93d-ffa03584af07" alt=""><figcaption><p>Enabling an application for a policy</p></figcaption></figure>

There are a number of configurations that you can manage for an application while adding them to a policy.&#x20;

<figure><img src="https://3947089720-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FOuMyGdeUQs2m5OYPFuwT%2Fuploads%2F9pvKSBDEgGvEqs0HfBb7%2FScreenshot%202025-01-22%20at%208.59.03%E2%80%AFPM.png?alt=media&#x26;token=39d8eb10-49e7-4f1c-9ff3-9ce25ad9999c" alt=""><figcaption><p>User application configuration</p></figcaption></figure>

{% stepper %}
{% step %}

#### Enable opening files from non-protected folders

This option determines whether the application can open encrypted files stored outside of [protected folders](#protected-folders).
{% endstep %}

{% step %}

#### Enable saving files to non-protected folders

This option determines the application encrypts all the files saved irrespective of the folder it's saved to. This setting will be useful to enforce a stricter encryption policy and not worry about defining protected folders.
{% endstep %}

{% step %}

#### Enable compliance mode

Read this [article](https://docs.fenixpyre.com/fenixpyre-features/compliance-mode) for more details
{% endstep %}

{% step %}

#### Enable real-time file block

Enable this option to have FenixPyre automatically close the application and files when access rules are violated or a user
{% endstep %}

{% step %}

#### Enable returning original file size

Enable this option to have FenixPyre return decrypted (original) file size or encrypted file size when applications request file information using the windows directory listing api call. Recommended value: Enabled
{% endstep %}

{% step %}

#### Prevent opening protected and unprotected files together

When this option is enabled, the users will not be able to open encrypted and non-encrypted files at the same time. This is to prevent accidental sharing of sensitive data
{% endstep %}
{% endstepper %}

## Endpoint Settings

### Automatic Encryption Service

Automatic encryption service is a windows endpoint feature that FenixPyre offers in which it encrypts any file that has been newly added to or created within an a protected folder.

**Managing Automatic Encryption Disruptions**

The suggested delay is 5,000 ms. We recommend keeping the delay value below 60,000 ms (or 1 minute).

Anchor's automatic encryption service may disrupt workflows by encrypting new files in protected folders immediately. This encryption can cause application conflicts, such as interrupting an SFTP file transfer, depending on how files are created in the folder. To address these issues, we have introduced a delay setting to allow more flexible handling of such cases.

{% hint style="info" %}
Limitations

* **Sequential Processing**: When adding multiple files to a protected folder, the encryption service processes each file one at a time. Each file is subject to a delay, regardless of any accumulated delay.
* **Placeholder Files**: The service does not encrypt placeholder files.
* **Active File Usage**: Files may not be encrypted if they are in use by another application or process.
* **Zero-byte Files**: Files with zero bytes are not encrypted.
  {% endhint %}

{% hint style="success" %}
Learn more about [Automatic Encryption Service](https://docs.fenixpyre.com/fenixpyre-features/automatic-encryption-service)<br>

If you are looking for a solution for encryption files on cloud - SharePoint/OneDrive, Egnyte or Box we suggest you learn about Auto-Encryption on FenixShare
{% endhint %}

### Periodic Encryption Service

FenixPyre offers a Windows feature called the Periodic Encryption Service, which regularly scans protected folders and encrypts any unencrypted files. You can set the scan frequency between 30 minutes (recommended) and 1440 minutes (every 24 hours).

Recommended value: 30 mins

{% hint style="info" %}
Limitations

* Placeholder files in OneDrive or SharePoint folders will remain unencrypted.
* Network shared folders are excluded from scans, except for Egnyte Connected Folders.
  {% endhint %}

{% hint style="success" %}
Learn more about [Periodic Encryption Service](https://docs.fenixpyre.com/fenixpyre-features/periodic-encryption-service)
{% endhint %}

### Offline Mode

Offline mode allows offline access to encrypted files, enabling users to work without an internet connection. Administrators can determine which users have offline access and set a time limit of up to 90 days. While an internet connection is typically needed for accessing Anchored files, offline mode balances offline functionality with maintaining control and protection of Fenixpyre encrypted files

Recommended period: 15 days

{% hint style="success" %}
Learn more about [Offline mode](https://docs.fenixpyre.com/fenixpyre-features/offline-mode)
{% endhint %}

### **Allowed Extensions**

By default, any file whose extension is listed under *Allowed Extensions* is encrypted automatically by the Automatic Encryption Service and the Periodic Encryption Service on the FenixPyre Windows agent.

{% hint style="info" %}
If you want to change how applications encrypt files on your system, visit [User Applications.](https://docs.fenixpyre.com/fenixpyre-for-admins/admin-dashboard/user-applications)
{% endhint %}

For FenixPyre cloud integrations, encrypting, decrypting, opening, and sharing files on [FenixShare](https://docs.fenixpyre.com/fenixpyre-for-users/fenixpyre-sharing) is limited to these *Allowed Extensions*. This serves as a protective measure, ensuring only authorized users can access the encrypted files.

## File Settings

### Preserve File Timestamps

By default, FenixPyre preserves original file timestamps when encrypting or decrypting. This means the "last modified date," "last access date," and "last write date" stay the same even after files are processed. If you want these timestamps to reflect the time of encryption or decryption instead, you can change this default behavior.

Recommended Value: Enabled

### Preserve File Security Info

You can keep a file’s security details, like its Discretionary Access Control List (DACL), even after encrypting or decrypting. A DACL controls who can access files and folders in a computer system.

Recommended Value: Enabled

### File Access Rules

Access Rules define the conditions that must be met before encrypted data can be opened. They are automatically applied to new and existing files, which makes managing access controls much easier.

<figure><img src="https://3947089720-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FOuMyGdeUQs2m5OYPFuwT%2Fuploads%2FTr4QW8sSEikJaKTLHGwJ%2FScreenshot%202025-01-27%20at%201.12.19%E2%80%AFPM.png?alt=media&#x26;token=8a936dc5-fee3-4d5e-8b7b-eaace42bb799" alt=""><figcaption><p>Adding File Access Rules with IPs and Geo location</p></figcaption></figure>

* **Default Rule (Organization)**: The device must belong to the data-owning organization. All files are given this global default rule upon encryption.
* **IP Address**: Limit access to selected public IP ranges (supports multiple IPs and [CIDR notation](https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing)).&#x20;
* **Geo-Fencing**: Currently only supports the US, so files can only be opened if accessed from within the United States. This is verified using geolocation, IP addresses, or both.

## Office Add In Settings

The FenixPyre Office Add-In offers various settings that help Data Loss Prevention (DLP) in Office 365. These settings disable any features that could compromise data security, ensuring your sensitive information remains protected.

| Setting Name                      | Description                                                                                                                                                                                                                       | Recommended Value |
| --------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------- |
| Can Lock Files                    | FenixPyre automatically handles file locking for Office files synced from OneDrive or SharePoint. It ensures encrypted files are edited by only one user or device at a time, preventing conflicts and maintaining data security. | enabled           |
| Can Share                         | Enable or Disable Share Options in Microsoft Office                                                                                                                                                                               | disabled          |
| Can View Info                     | Enable or Disable View Info Option in Microsoft Office                                                                                                                                                                            | disabled          |
| Can Transform                     | Enable or Disable Transform Option in Microsoft Office                                                                                                                                                                            | disabled          |
| Can Export                        | Enable or Disable Export Option in Microsoft Office                                                                                                                                                                               | disabled          |
| Can Publish                       | Enable or Disable Publish Option in Microsoft Office                                                                                                                                                                              | disabled          |
| Can Print                         | Enable or Disable Print Option in Microsoft Office                                                                                                                                                                                | disabled          |
| Can Custom Preview                | Enable or Disable Custom Preview Option in Microsoft Office                                                                                                                                                                       | disabled          |
| Can Save to Non-Protected Folders | This setting controls the ability to save files to non-protected folders. It overrides similar setting in [User applications](#user-applications), including Microsoft Word, Excel, and PowerPoint.                               | disabled          |

## Advanced Settings

| Setting Name                      | Description                                                                                                     | Recommended Value |
| --------------------------------- | --------------------------------------------------------------------------------------------------------------- | ----------------- |
| User Policy Update Interval       | The Windows agent updates user policies at regular intervals. By default, these updates occur every 60 seconds. | 60 seconds        |
| Access Control Heartbeat Interval | Frequency at which FenixPyre verifies user status and ensures compliance with file access rules.                | 15 seconds        |
