Encryption Rules

Encryption Rules

Encryption Rules Overview
The Encryption Rule Overview provides a summary of all the active Encryption Rules in use by your organisation, grouped by Encryption Key.


  1. Encryption Location Path - path to which the Encryption Rule applies.  This may be a:
    1. Predefined location such as the user Desktop or  Documents folder
    2. Network share
    3. Common local device path
  2. Encryption Key - the Encryption Key associated with the rule.  Encryption Rules are grouped by Encryption Key easier management.
  3. Initial Encryption - whether or not Initial Encryption has been enabled. 
  4. Platform  -  the platform to which the rule applies. Can be Windows, macOS or both.
  5. Created By - Administrator who created the rule for auditing purposes
  6. Date Created - the date the rule was created
  7. Action - buttons to:
    1. Edit the associated Encryption Rule
    2. Delete the associated Encryption Rule

Creating Encryption Rules

To add a new Encryption Rule, click the Add a new rule button on the Encryption Rules Overview page and:
  1. Select an Encryption Key from the list of existing keys, or Create a new one
  2. Set the location to be Encrypted
  3. Specify whether or not the location is a mapped drive or network share
  4. Choose whether to enable Initial Encryption for the location (not available for shared locations)
  5. Add any subfolders within the target location to be excluded
  6. Enable advanced group assignment to include/exclude specific group for which the rule should apply.
  7. Click the SAVE button to create the rule. 

Deleting Encryption Rules

To delete an Encryption Rule,
  1. Click on the Delete button from the Action buttons next to the rule you wish to delete.
  2. At the prompt, type DELETE. (This helps prevent accidental deletion of rules).

  3. Click OK

Good to know...
When a rule is deleted:
  1. New files added to the location will no longer be encrypted automatically;
  2. Existing files will remain encrypted unless they are decrypted manually.

    • Related Articles

    • Managing encryption rules for SharePoint Online

      SmartEncrypt's SharePoint Online "virtual client" enables you to create encryption rules for files stored in SharePoint from directly within the SharePoint Online interface.  This means that there is no need to sync files to set encryption rules and ...
    • Encryption Keys

      Encryption Keys Overview The Encryption Keys Overview provides a summary of your organisation's Encryption Keys and Encryption Rules with which they are associated. Features Add a new key button  - create new Encryption Keys up to the allowed limit ...
    • Installing and configuring SmartEncrypt for SharePoint Online

      SmartEncrypt for SharePoint Online is a SharePoint app that acts as a "virtul client", enabling administrators to navigate to a SharePoint Online document document library and encrypt the contents, which in turn creates and uploads a corresponding ...
    • Encryption Key Backup and Recovery

      You can recover encrypted files using a backup of your Encryption Keys from the SmartEncrypt Management console and an installed copy of the SmartEncrypt desktop client software. An activate subscription or internet connection is not required to ...
    • Why are there different keys for the same location in SharePoint Online?

      In SharePoint Online, encrypted files are depicted by the key name in additional column.  In some cases, you may notice that the same location has files encrypted with different keys.  There are reason why this may occur. 1. The encryption key was ...