Policy Rules Guide
Explore this glossary to discover various rules that may be incorporated into a policy.
Last updated
Was this helpful?
Explore this glossary to discover various rules that may be incorporated into a policy.
Last updated
Was this helpful?
Protected folders are fundamental in FenixPyre, defining specific folder locations accessible to designated users and groups. These folders allow users and groups within your organization to access and consume encrypted content using FenixPyre. Notably, encrypted files can only be accessed within these protected folders, whether via FenixPyre's Windows agent or cloud integrations. Examples of protected folder paths include common user directories, on-premises network drives, and cloud-based document sharing services.
The following permission decide what type of actions can be performed by the user or group on FenixPyre.
Can Encrypt
This permission determines whether a user can encrypt files
This permission determines whether a user can encrypt files
Can Decrypt
This permission determines whether a user can decrypt files and remove protection.
This permission determines whether a user can decrypt files
Can Share
This permission determines whether you can share a file via outlook or right-click option via FenixShare.
The permission determines whether you can share a file from SharePoint, OneDrive, Egnyte or Box Drive using FenixShare.
Can View Audit Logs
This permission determines whether a user can view audit logs form the right-click option
Thiis permission determines whether a user can view audit logs .
Can Open
Rolling out soon
Rolling out soon
Can Edit
Rolling out soon
Rolling out soon
Can Add Protection
Rolling out soon
Rolling out soon
Can Delete
Rolling out soon
Rolling out soon
With FenixPyre installed on Windows Desktops, you can control which applications can access encrypted files and how they do so.
There are a number of configurations that you can manage for an application while adding them to a policy.
Automatic encryption service is a windows endpoint feature that FenixPyre offers in which it encrypts any file that has been newly added to or created within an a protected folder.
Managing Automatic Encryption Disruptions
The suggested delay is 5,000 ms. We recommend keeping the delay value below 60,000 ms (or 1 minute).
Anchor's automatic encryption service may disrupt workflows by encrypting new files in protected folders immediately. This encryption can cause application conflicts, such as interrupting an SFTP file transfer, depending on how files are created in the folder. To address these issues, we have introduced a delay setting to allow more flexible handling of such cases.
If you are looking for a solution for encryption files on cloud - SharePoint/OneDrive, Egnyte or Box we suggest you learn about Auto-Encryption on FenixShare
FenixPyre offers a Windows feature called the Periodic Encryption Service, which regularly scans protected folders and encrypts any unencrypted files. You can set the scan frequency between 30 minutes (recommended) and 1440 minutes (every 24 hours).
Recommended value: 30 mins
Offline mode allows offline access to encrypted files, enabling users to work without an internet connection. Administrators can determine which users have offline access and set a time limit of up to 90 days. While an internet connection is typically needed for accessing Anchored files, offline mode balances offline functionality with maintaining control and protection of Fenixpyre encrypted files
Recommended period: 15 days
By default, any file whose extension is listed under Allowed Extensions is encrypted automatically by the Automatic Encryption Service and the Periodic Encryption Service on the FenixPyre Windows agent.
By default, FenixPyre preserves original file timestamps when encrypting or decrypting. This means the "last modified date," "last access date," and "last write date" stay the same even after files are processed. If you want these timestamps to reflect the time of encryption or decryption instead, you can change this default behavior.
Recommended Value: Enabled
You can keep a file’s security details, like its Discretionary Access Control List (DACL), even after encrypting or decrypting. A DACL controls who can access files and folders in a computer system.
Recommended Value: Enabled
Access Rules define the conditions that must be met before encrypted data can be opened. They are automatically applied to new and existing files, which makes managing access controls much easier.
Default Rule (Organization): The device must belong to the data-owning organization. All files are given this global default rule upon encryption.
Geo-Fencing: Currently only supports the US, so files can only be opened if accessed from within the United States. This is verified using geolocation, IP addresses, or both.
The FenixPyre Office Add-In offers various settings that help Data Loss Prevention (DLP) in Office 365. These settings disable any features that could compromise data security, ensuring your sensitive information remains protected.
Can Lock Files
FenixPyre automatically handles file locking for Office files synced from OneDrive or SharePoint. It ensures encrypted files are edited by only one user or device at a time, preventing conflicts and maintaining data security.
enabled
Can Share
Enable or Disable Share Options in Microsoft Office
disabled
Can View Info
Enable or Disable View Info Option in Microsoft Office
disabled
Can Transform
Enable or Disable Transform Option in Microsoft Office
disabled
Can Export
Enable or Disable Export Option in Microsoft Office
disabled
Can Publish
Enable or Disable Publish Option in Microsoft Office
disabled
Can Print
Enable or Disable Print Option in Microsoft Office
disabled
Can Custom Preview
Enable or Disable Custom Preview Option in Microsoft Office
disabled
Can Save to Non-Protected Folders
disabled
User Policy Update Interval
The Windows agent updates user policies at regular intervals. By default, these updates occur every 60 seconds.
60 seconds
Access Control Heartbeat Interval
Frequency at which FenixPyre verifies user status and ensures compliance with file access rules.
15 seconds
All admin approved and FenixPyre approved applications are displayed on the policy page.
This option determines whether the application can open encrypted files stored outside of .
Read this for more details
Learn more about
Learn more about
Learn more about
If you want to change how applications encrypt files on your system, visit
For FenixPyre cloud integrations, encrypting, decrypting, opening, and sharing files on is limited to these Allowed Extensions. This serves as a protective measure, ensuring only authorized users can access the encrypted files.
IP Address: Limit access to selected public IP ranges (supports multiple IPs and ).
This setting controls the ability to save files to non-protected folders. It overrides similar setting in , including Microsoft Word, Excel, and PowerPoint.