Research groups and members of staff working with sensitive data can encrypt their data using Symantec File Share Encryption. Symantec File Share Encryption works by installing itself as part of the Windows Operating System and for the most part, it works transparently to the user.  Encrypted files and folders are encrypted and decrypted without you even noticing.  Anyone with access to the file system, but who is not part of the encryption group and/or does not have the Symantec Encryption Desktop client installed, won't be able to access or read the files or folders. 

Note: This service is only available for Windows users. Please note that Symantec is not compatible with Microsoft OneDrive for Business, as files can get decrypted when they are synced to the cloud and/or will report incorrect encryption status/properties. 

If you decide to use this service, ICT will need to set up a few things first. 

  1. ICT will create you a new group (or use an existing group if you have one already) that is used for encryption purposes
  2. ICT will also need to install the Symantec Encryption Desktop client on the PC/laptop of everyone that is going to use the service

Once set up, you will need to decide on a folder within your network shares that you designate as an encrypted folder (should you want to keep encrypted and non-encrypted folders separate).  It is possible to create more than one encrypted folder, but this might increase the management overhead of your encrypted (and non-encrypted) filing system. Please contact the ICT Service Desk to get this set up. 

FAQs

How do I set up an encrypted folder?

To start using Symantec File Share Encryption, you will need to set up an encrypted folder.  To do this, follow these steps or contact the ICT Service Desk for more assistance. 

  1. Right-click the folder you want to encrypt and choose from the context menu Symantec Encryption DesktopEncrypt “<folder name here>” with Symantec File Share…Advanced
  2. In the new dialogue box (Add Users) that appears, click the ‘Add’ button
  3. In the new dialogue box (User Selection) that appears, click ‘icsecsem.cc.ic.ac.uk’ and then search for your encryption group by typing the first few characters of the group's name in the search box and pressing the search icon (magnifying glass)
  4. Highlight your group on the left-hand side column and click ‘Add’ (bottom left corner) to move your group into the right-hand side column and click ‘OK
  5. In the previous dialogue box (from 2. earlier), right-click your group name and make your group one of the following roles and then click ‘Next’: 
  • Admin (has full control over encryption groups)
  • Group Admin (has limited control over encryption groups)
  • User (has no control over encryption groups)

Deciding on one of the three choices above.  In general, if you alone want to maintain control from the encryption management side of things, choose the ‘User’ role for the group.  However, if you want the group to have full encryption management responsibilities, chose the ‘Admin’ role instead. (these can always be changed at any time if you decide to change your mind)

6. Choose a signer from the drop-down list (it will most likely be your name) and click ‘Next
7. This is the last dialogue box.  Depending on the size of your folder and/or how many files/sub-folders you have, this might take some time.  When it has been completed, click the ‘Finish’ button to close the dialogue box. 

I added my colleague to the encryption group, how come they still cannot decrypt the files/folders?

This all depends on when the person was added to the group.  Group membership usually takes about an hour to synchronise over to the Symantec Encryption Server.  However, on some occasions, this can take up to 6 hours.  Unfortunately, this sync time constraint is beyond ICT’s control. 

Why do I see PGPFS.INI files in the root of every encrypted folder?

These system files will only be visible by users with access to the files and folders, but do not have the Symantec Encryption Desktop client installed. 

How can I immediately tell if a folder is encrypted or not?

If you have the Symantec Encryption Desktop client installed, encrypted files and folders will have a blue padlock icon displayed in the bottom left-hand corner of the icon.  

Files demo

Note: Unfortunately, sometimes, this blue padlock icon does not always get displayed and this can usually be fixed by refreshing your Windows Explorer window by pressing the ‘refresh’ icon or pressing F5

If you do not have the Symantec Encryption Desktop client installed, encrypted folders will be identifiable as folders with PGPFS.INI file within it.

PGPFS.INI

What happens if I take an unencrypted file/folder and move it to an encrypted folder?

If you have SED installed, and you move (or copy) an unencrypted file or folder to an encrypted folder, that file or folder (and its contents) will automatically become encrypted to the same settings/groups as its parent folder. 

What happens if I take an encrypted file/folder and move it to an unencrypted folder?

If you have SED installed, and you move (or copy) an encrypted file or folder out of an encrypted folder, that file or folder (and its contents) will remain in its encrypted state. 

How can I decrypt a file or folder to share with someone who is not part of my encryption group and is not using Symantec Encryption Desktop?

Firstly, using Microsoft Outlook, if you attach an encrypted file/document(s) to an email, that file/document(s) will be automatically decrypted ‘on the fly’, so there is nothing extra the user must do in this respect. 

If you want to share a document with a user who is not part of the encryption group, yet you have a common file share/folder that you both use outside of the encrypted folder system, then simply copy (or move) the file/folder to the shared area and decrypt it.  To decrypt the file/folder, right-click and from the context menu choose:

  • Symantec Encryption Desktop>
    • Decrypt “<insert file/folder name here>” with Symantec File Share 
I am in the right encryption group, and I have Symantec Encryption Desktop installed, why don’t I have rights to decrypt a file or folder?

There may be occasions where you cannot access encrypted files or folders, despite being in all the right groups and having Symantec Encryption Desktop installed. This is often because the file or folder has had the parent folder’s group key removed and has been encrypted with either a single users key or another group’s key. (see illustration below)

Symantec error screenshot

If this happens, you will need to contact the ICT Service Desk who will then determine rightful ownership of the data, and if applicable, use the Additional Decryption Key (ADK) to realign the encryption settings and make the file/folder accessible again within the parent group/folder structure. 

My Symantec Encryption Desktop client is asking me for a passphrase and/or something is not right, what can I do?

The Symantec Encryption Desktop client works by synchronising your private keys (which are secured on the Symantec Encryption Management Server) to your local PC/laptop.  Sometimes, these keys can either get corrupt or get out of sync.  If this error occurs or something is not working how you expect it to, the most common solution is to update the Symantec Encryption Desktop client policy. 

To do this, right-click the Symantec Encryption Desktop system tray icon and choose ‘Update Policy’.Symantec system tray

My Symantec Encryption Desktop client is still not right and updating the policy has not fixed it, what can I do?

In rare cases, the Symantec Encryption Desktop client installation itself can become corrupt and you can get all manner of errors ranging from ‘Contact your Administrator’ or ‘This file is corrupt’.  When this happens, it is possible to reset your SED client completely and start afresh. To do this, either contact the ICT Service Desk for assistance or if you feel comfortable enough, you can reset the client yourself by performing the following:

  1. Close the SED client completely by right-clicking the system tray icon and choosing ‘Exit PGP Services
  2. Click ‘OK’ to the warning message
  3. Press the Windows key (on your keyboard) together with the letter ‘R’ and in the dialogue box that pops up enter ‘%appdata%’ (without quotes) and press ‘OK
  4. In the new explorer window that pops up, navigate into the ‘PGP Corporation’ folder
  5. Copy (or move) the ‘PGP’ folder to a safe location (this is just a precaution in case there are keys in there that do not exist on the server, but this is extremely rare)
  6. Now delete the ‘PGP’ folder completely and close this window
  7. From your Windows Start menu, find and start Symantec Encryption Desktop
  8. You will now be required to enrol and trust the Symantec Encryption Management server certificate and enter your college username and password again
  9. Symantec Encryption Desktop should now be performing as expected
Why are my files are corrupt/unreadable?

If your documents look like this (see illustration below), you are most likely using a PC or laptop that does not have Symantec Encryption Desktop installed.  This can arise if you have had to switch from your regular PC or laptop to a temporary one. 

Encrypted file notepad

In this scenario, contact the ICT Service Desk to have Symantec Desktop Encryption installed on your temporary device. 

How can I see the various Symantec File Share Encryption settings and permissions on my encrypted folder(s)?

Right-click the file or folder in question and choose the Symantec File Share tab

Encrypted properties window

How can I see the various Symantec File Share Encryption settings and permissions across multiple encrypted folders?

For more advanced usage, Symantec provides a command-line tool (pgpnetshare.exe) bundled with the Symantec Encryption Desktop client.  With some Windows command line or PowerShell scripting, it is possible to report on multiple folders across your network shares or file system, as well as other encryption/decryption tasks.

For more information on what this command-line tool can offer and how to use it, please refer to the documentation/user guide at the bottom of this page or contact the ICT Service Deskcommand line symantec

User guides