PROTECT Management Console

This guide provides instructions on using the GuardWare PROTECT Management Console and is intended for administrators. The GuardWare PROTECT Management Console provides administrators with a central place to configure, monitor, and manage encryption, security groups, users, user policies, user access, authorised applications and websites, key management, and view reports.

Requirements

Before you begin, ensure you have:

  • A supported web browser (Google Chrome, Microsoft Edge, Brave Browser).

  • The PROTECT Management Console URL provided during the Server setup.

  • Your login credentials:

    • Super Admin: Credentials created during the PROTECT Server setup.

    • Organisation User: Username and one-time password shared by the Super Admin.

  • A mobile device with Google Authenticator or Microsoft Authenticator installed for 2FA.

PROTECT Management Console Login/Logout

Super Admin Login

The Super Admin is a user account created during the PROTECT Server setup. This account has full administrative access to the Management Console.

  1. Open PROTECT Management Console in your web browser.

  2. Log in using the Super Admin credentials created during the Server setup.

  1. When prompted, set up two-factor authentication (2FA):

    1. Open your Authenticator app.

    2. Scan the QR code displayed on the screen.

    3. Enter the verification code from the app.

  2. Read and accept the End User Licence Agreement (EULA).

  3. You will now be prompted to create a new password. Enter and confirm the new password.

  4. Once the password is updated, you’ll again be asked to enter the verification code from the Authenticator app.

  5. Enter the latest verification code again to complete the login. You are then redirected to the GuardWare PROTECT Management Console landing page.

New Organisation User Login

A new organisation user is an account created by a Super Admin. This account grants the new user access to the GuardWare PROTECT Management Console for the organisation in question.

  1. Open PROTECT Management Console in your web browser.

  2. Enter your username (email address) and one-time password received via email or sent by your Super Admin.

  3. Scan the QR code using the Google or Microsoft Authenticator app on your mobile device.

  4. Enter the 2FA verification code in the Authentication field and click Authenticate.

  1. Create a new password when prompted, then click Login to access the console.

Log Out

To log out, click the Power (⏻) icon in the top-right corner of the console.

ORGANISATION

The ORGANISATION section lets you manage users and configure the organisation-level settings used in GuardWare PROTECT. This includes creating organisations, adding users, configuring SMTP for email notifications, and defining the organisation’s identity settings.

These configurations ensure that notifications, reports, and alerts are sent from the correct email domain, user accounts are managed securely, and organisation-specific information is applied consistently across the PROTECT platform.

Create an Organisation

Super Admins can create and manage multiple organisations in the Management Console. Each organisation maintains its own users, settings, and data, ensuring clear separation between environments.

To create an organisation:

  1. Go to ORGANISATION and click +Create New.

  2. Enter a Name for the new organisation.

  3. Enter the Location.

  4. The Database Name is generated automatically.

  5. Select the appropriate Time Zone.

  6. Upload the Organisation logo. Supported file types are .jpg, .jpeg, and .png.

  7. (Optional) Enter the URL and Description.

  8. Click Create Organisation.

Adding a User to an Organisation

After creating an organisation, the Super Admin must add at least one user to begin. This interface is visible only to Super Admins.

To add a user:

  1. Go to ORGANISATION and select the organisation you created.

  2. Enter the Name and a valid Email address of the user.

  3. Click Create User.

SMTP Connection

The SMTP Connection section allows you to configure SMTP settings so the system can send emails, such as invitations, password resets, alerts, and reports, using your own mail server and domain.

If SMTP is not configured, GuardWare’s default SMTP server is used. Configuring SMTP is recommended for organisations that require domain-specific email notifications, such as [email protected] instead of [email protected].

To configure SMTP:

  1. Go to ORGANISATION > SMTP Connection.

  2. In SMTP Host, enter the server address that should be used to send emails.

  3. In SMTP Port, enter the port number used by your mail server (commonly 25, 465, or 587).

  4. In SMTP Username, enter the username required to authenticate with your mail server.

  5. In SMTP Email, enter the email address that will appear as the sender of email notifications.

  6. In SMTP Password, enter the password associated with the SMTP email account.

  7. In Use STARTTLS to connect to SMTP Host, select Yes if your mail server requires encrypted communication.

  8. In SMTP Authentication, select Yes if your server requires login credentials.

  9. In Test Email Address, enter an email address to validate the SMTP connection.

  10. Click Save to apply the SMTP configuration.

Users

The Users section allows admins to manage accounts that can access the PROTECT Management Console. From here, you can create new users, edit user details, disable accounts, and reset a user’s password or two-factor authentication (2FA) setup.

Add a New User

To add a new user to the organisation:

  1. Go to ORGANISATION > Users and click +Create User.

  2. In Username / Email, enter the user’s email address.

  3. In Display Name, enter the name that will appear in the console.

  4. In Select password verification, select one of the following:

    1. Email: The system sends a one-time password and login link to the email entered.

    2. Default: Manually enter a password or generate one using the key icon, then share it with the user.

  5. Click Save to create the user or Reset to clear the form.

Edit a User

  1. Go to ORGANISATION > Users and search for the user to edit.

  2. Click the Edit icon in the ACTIONS column.

  3. Update the required information and click Update to save the changes.

Disable a User

  1. Go to ORGANISATION > Users and search for the user to disable.

  2. Click the Disable icon in the ACTIONS column. You cannot disable your own account.

  3. Click Disable in the Confirmation alert.

Reset OTP

  1. Go to ORGANISATION > Users and search for the user whose OTP you want to reset.

  2. Click Reset OTP in the ACTIONS column.

  3. Click Reset in the Confirmation alert to force the user to re-register their 2FA device.

Reset Password

  1. Go to ORGANISATION > Users and search for the user whose password you want to reset.

  2. Click Reset Password in the ACTIONS column.

  3. In New Password, enter the new password.

  4. In Confirm Password, re-enter the password to match.

  5. Click Reset to apply the new password.

DATA GOVERNANCE

The DATA GOVERNANCE section defines how PROTECT identifies and handles sensitive information. Administrators can create and manage data classifications and control how classifications apply when multiple Data Types appear within a file.

Data Classification

Data Classification allows you to group multiple Data Types and assign a colour label for quick visual reference. PROTECT automatically assigns each classification a sensitivity level based on the order it was created (starting from level 0).

If a file contains multiple classified Data Types, PROTECT applies the highest sensitivity level detected to ensure the document receives the strictest classification.

Add Data Classification

You can create up to 16 classifications (levels 0–15).

  1. Go to ORGANISATION > Data Classification and click +New Classification.

  2. Enter a unique Classification Name and Description.

  3. Select a unique colour that will be used to visually identify this classification.

  4. Click Save.

Edit Data Classification

  1. Go to ORGANISATION > Data Classification.

  2. Search for the classification to edit and click the Edit icon in the ACTIONS column.

  3. Update the required information and click Update.

Delete Data Classification

  1. Go to ORGANISATION > Data Classification.

  2. Search for the classification to delete and click the Delete icon in the ACTIONS column.

  3. Click Delete in the Confirmation alert.

circle-info

When a classification is deleted, higher levels shift down by one. For example, deleting Level 6 moves the previous Level 7 to Level 6.

Data Owner

A Data Owner is an individual responsible for one or more Data Types. When sensitive information associated with a Data Type assigned to a Data Owner is detected, the system sends a summary alert to their registered email, covering all incidents that occurred within the configured time period.

Assigning a Data Owner ensures alerts are routed to the correct person responsible for that Data Type. The Data Owner does not need to be the same person who owns the device or the file where the data was found.

Add Data Owner

  1. Go to DATA GOVERNANCE > Data Owner and click +New Owner.

  2. Click +Assign Data Types. For details on Data Types, see Data Type.

  3. Search and select the Data Type to assign and click Save. You can skip assigning the Data Type if you want to create the Data Type later.

  4. Enter the Email address, Name, Description, and Contact number of the Data Owner.

  5. Click Save.

Data Type

Data Type defines the kind of information that PROTECT detects and protects during file operations. Each Data Type represents a rule, pattern, or phrase used to identify sensitive content within files before encryption and protection are applied.

You can use built-in Data Types (e.g., PII, PCI DSS) or create custom Data Types to detect organisation-specific information such as employee codes, internal document IDs, or project references.

Create a Data Type

  1. Go to DATA GOVERNANCE > Data Type and click +Data Type.

  2. Enter a unique Data Type Name and Description.

  3. In Data Identifier, select how PROTECT should identify this Data Type.

    1. Sensitive Words Select Sensitive Words if the Data Type should be detected based on specific terms or phrases. Choose one of the following detection rules:

      1. Sensitive Words

        1. ALL of the phrases in the following set must be present in the text. Specify phrases that must all appear together in a file for it to be classified as sensitive. For example, if you specify phrases "credit card" and "cardholder", any file containing these two phrases will be marked as sensitive. If only one phrase is present, the file will not be marked sensitive. ALL of the phrases.png

          1. Must have space in the front: When enabled, PROTECT only matches the phrase if there is a space immediately before it. This helps prevent false positives where the phrase appears as part of another word. Example: It will match "My cardholder" , but not "Mycardholder".

          2. Must have space in the back: When enabled, PROTECT only matches the phrase if there is a space immediately after it. This ensures the phrase is detected as a standalone term. Example: It will match "cardholder name" , but not "cardholderName123".

        2. At Least (n) of the phrases in following set must be present in the text Specify a minimum number of matching phrases required for detection. For example, if you set the value to 1 and add phrases "Credit Card Number" and "Cardholder", any file containing at least one of these phrases will be marked as sensitive. At Least (n) of the phrases.png

          1. Must have space in the front: When enabled, PROTECT only matches the phrase if there is a space immediately before it. This helps prevent false positives where the phrase appears as part of another word. Example: It will match "My Cardholder" , but not "MyCardholder".

          2. Must have space in the back: When enabled, PROTECT only matches the phrase if there is a space immediately after it. This ensures the phrase is detected as a standalone term. Example: It will match "Cardholder Name" , but not "CardholderName123".

        3. None of the phrases in the following set are present in the text Specify phrases that must not appear in the file. If any of these phrases are found, the file will not be marked sensitive. None of the phrases.png

      2. Sub-type Select the Data Sub-types to assign to the new Data Type to refine how PROTECT classifies content. For details on creating, see Data Sub-type.

        1. Sub-type if present: Content is flagged as sensitive only when all selected Data Sub-types are detected in the file.

        2. If one or more Sub-type: Content is flagged as sensitive when any one of the selected Data Sub-types is detected in the file.

      3. Context Parameters

        1. Context Length: Define how many words before and after the detected sensitive term should be displayed in the results. For example, if the context length is set to 3 and the sensitive word is “cardholder”, the result will show three words on either side of the matched term. This helps administrators understand the surrounding text and determine whether the detection is valid or a false positive. For example, if the context length is set to 3 and the sensitive word is “cardholder”, and the original text is: “The customer details were reviewed by the cardholder before submission of the form.” The captured result will appear as: “reviewed by the cardholder before submission of” This helps administrators review the surrounding text to determine whether the information is genuinely sensitive or a false positive. image-20251031-095205.png

        2. Number of Hits: Specify the minimum number of times a sensitive word must appear in a document before it is flagged as sensitive. Adjust this value to control detection sensitivity and reduce unnecessary alerts. image-20251031-095803.png

    2. Regular Expressions Use Regular Expressions to define custom text patterns that PROTECT should detect as sensitive. This is useful for identifying structured data such as IDs, codes, or formatted strings.

      1. Regular Expression Example: Detecting a 10-Digit Phone Number Regex: \b[0-9]{10}\b This pattern detects a standalone 10-digit phone number (for example, 9841234567).

        1. Must have space in the front: Enable this option if the detected value must have a space immediately before it. Example: It will match " My 9841234567" , but not "My9841234567"." This helps ensure the phone number is captured as a separate token rather than embedded in another string.

        2. Must have space in the back: Enable this option if the detected value must have a space immediately after it. Example: It will match "9841234567 abc" , but not "9841234567abc". This ensures the detected number appears as a standalone value.

        3. Test Text: Use the Test Text field to check whether your regular expression works as intended. Enter sample text and click +Validate to confirm that the pattern correctly detects the target data before saving your configuration. Regex data type.png

        4. Checksum (Luhn): Select Luhn if the pattern represents number formats that must pass Luhn checksum validation, such as credit card numbers. When enabled, PROTECT verifies that the detected number satisfies the Luhn algorithm.

      2. Sub-type Select the Data Sub-types to assign to the new Data Type to refine how PROTECT classifies content. For details on creating, see Data Sub-type.

        1. Sub-type if present: Content is flagged as sensitive only when all selected Data Sub-types are detected in the file.

        2. If one or more Sub-type: Content is flagged as sensitive when any one of the selected Data Sub-types is detected in the file. 3.

      3. Context Parameters

        1. Context Length: Define how many words before and after the detected sensitive word should be displayed. image-20251031-095205.png

        2. Number of Hits: Specify the minimum number of times a sensitive word must appear in a document before it is flagged as sensitive. Adjust this value to control detection sensitivity and reduce unnecessary alerts. image-20251031-095803.png

        3. Hide rule from Rule Violation screen (Mask): Determine how much of the detected sensitive data is hidden. Available masking levels include:

          1. None: No masking applied; complete data is visible.

          2. 1/4 Mask (Quarter Masking): 25% of the data is hidden.

          3. 1/2 Mask (Half Masking): 50% of the data is hidden.

          4. 3/4 Mask (Three-Quarter Masking): 75% of the data is hidden.

    3. Filename Expressions: Specify file name patterns or folder paths to define a Data Type. If a file matches either a folder-level expression or a file-level naming pattern, PROTECT automatically identifies it as belonging to that Data Type. For example: If you add the expression C:\Users\*\Downloads\*.* and give it a name “Internal files”, any file saved in the Downloads folder will be classified as the Data Type “Internal files”.

  4. After selecting the data identifier and its corresponding detection rules, select a Data Classification from the drop-down.

  5. Select Data Owner(s) from the drop-down to assign to the new Data Type.

Data Sub-types

Data Sub-types refine parent Data Types to provide more precise and controlled detection. They help reduce false positives by ensuring PROTECT accurately identifies specific categories of sensitive information.

Correct configuration is important.

For example: If MasterCard is mistakenly added as a Data Sub-type under VISA Card, PROTECT will treat MasterCard data as part of the VISA Card category. This inflates results and prevents accurate reporting.

As a guideline, ensure Data Sub-types align with their parent Data Type. For example:

Parent Data Type: VISA Card

Data Sub-types: Visa Card Australia, Visa Card Global

These maintain a clear and accurate hierarchy.

Add Data Sub-type

  1. Go to DATA GOVERNANCE > Data Type and click the Data Sub-types tab.

  2. Click +Data Sub-type. Data sub types.png

  3. Enter the Data Type Name and Description.

  4. Select a Data Identifier from the drop-down(Sensitive Words, Regular Expressions, or Filename Expressions). For details on data identifiers, see Create a Data Type.

  5. Click Save.

Assign Classification to a Data Type

  1. Go to DATA GOVERNANCE > Data Type.

  2. Search and select the Data Type to assign and click Assign Classification.

  3. Select a classification from the drop-down and click Assign.

PROTECT

The PROTECT section lets you configure, monitor, and manage security groups, users, user policies, user access, authorised applications and websites, key management, and view reports.

Key sections:

Security Groups

Security Groups define which users are allowed to access protected files. When a file is protected using GuardWare PROTECT, only users in the selected Security Groups can access it. Any user who is not a member of those groups is automatically restricted from accessing the file. Security Groups can be created manually or imported directly from Active Directory.

Users must be assigned to a Security Group to use GuardWare PROTECT on their PC. Any new user who installs GuardWare PROTECT Client and logs in successfully is automatically assigned to the default Security Group called All Users. A user can belong to multiple Security Groups.

Add a Security Group

  1. Log in to the GuardWare PROTECT Management Console.

  2. Go to PROTECT > Security Groups.

  3. Click +New Security Group. You’ll see an option to create a security group manually or from AD. Add new security group.png

  4. To create manually:

    1. Select Manually. PROTECT-manually-create-new-security-group.png

    2. In Security Group Name, enter a descriptive name for the group that reflects its purpose.

    3. In Description, enter a summary of the group’s role or scope. This helps other administrators understand the intended use.

    4. In Encryption Mode, select how files can be decrypted:

      1. Online: Decryption is allowed only when the user is connected to the network.

      2. Offline: Decryption is allowed even when the user is not connected to the network.

    5. In Security Group Type, select how membership is managed:

      1. Private: Only members and administrators can see the group; it’s hidden from non-members.

      2. Public: Visible to all users, and anyone can see the group.

    6. Click Save.

  5. To import from AD:

    1. Select From the AD.

    2. Search for the required AD group. Matching Security Groups appears in the SECURITY GROUPS list.

    3. Select the AD group. The selected group appears in the Selected Security Group panel on the right.

    4. Click Save. The group will now appear in the Security Group List. You can view the list either by the Group name or by users.

Assign Users to Security Group

  1. Go to PROTECT > Security Groups.

  2. In VIEW BY, select Security Groups. View by security group.png

  3. Search for the security group to assign users and click +Assign Users in the ACTIONS column. You’ll see the list of all users, including AD and external users. Assign users to security group.png

circle-info

External users appear on the list only after they have accepted the invitation, installed GuardWare PROTECT, and logged in successfully. For details on how to invite external users, see Invite Usersarrow-up-right.

  1. Search and select the users to add, and click Assign Users.

Assign Security Groups to Users

  1. Go to PROTECT > Security Groups.

  2. In VIEW BY, select Users. Assign Security Groups to Users.png

circle-info

External users appear on the list only after they have accepted the invitation and installed GuardWare PROTECT. For details on how to invite external users, see Invite Usersarrow-up-right.

  1. Search for the user and click Assign Security Group in the ACTIONS column. You’ll see the list of all Security Groups.

  2. Select the Security Groups and click Assign Security Group.

From here, you can also perform the following actions:

Edit a Security Group

  1. Go to PROTECT > Security Groups and search for the security group to edit.

  2. In the ACTIONS column, click the Edit icon.

  3. Update the required details and click Save.

Disable a Security Group

Disabling a security group immediately removes all assigned users from the group and revokes any permissions granted through it. The group remains available for future use, but you cannot add users while it is disabled. If you re-enable the group, you must add the users again.

Disabling a security group is useful when access needs to be revoked quickly. For example, when a project is completed, and all related files should no longer be accessible, disabling the project’s security group instantly removes access for all members.

To disable a Security Group:

  1. Go to PROTECT > Security Groups and search for the security group you want to disable.

  2. In the ACTIONS column, click Disable.

  3. Click Confirm.

circle-info

The All Users default group cannot be disabled.

User Policies

User policies determine which features and actions are available in the PROTECT Client, giving administrators control over the end-user experience. These policies define the options that appear in the right-click menu and in dialogs, such as the ability to add file protection to multiple files at once, change or remove file protection, create a ZIP package, etc. Each user can only be assigned one policy at a time.

Any new user who installs GuardWare PROTECT Client and logs in successfully is automatically assigned the Default policy. The Default policy cannot be deleted, but can be edited.

circle-info

End users only see the right-click options that are enabled on their user policy. Any options that are not permitted on the user policy are hidden from end users.

Add a User Policy

Administrators can create custom user policies to align with different roles or departments (e.g., granting more control to IT staff while restricting options for external contractors).

  1. Go to PROTECT > User Policies and click +New User Policy.

  2. Enter Policy Title and Description.

  3. If you want to duplicate a user policy, select the existing policy from the Clone from Existing Policy dropdown.

  4. Enable Detours if you want to prevent protected files opened in Word, Excel, and PowerPoint from being automatically saved and synced to OneDrive or SharePoint. When Detours is disabled, protected files are synced and stored in SharePoint in an unprotected state when edited, allowing others to download them via a OneDrive or SharePoint link. Detours ensures that the file does not sync throughout the editing process, reducing the risk of unprotected access and distribution.

  5. Configure the following policies and click Save.

Adding File Protection

This setting allows users to manually protect files. Users can select a classification label and specify which Security Groups are authorised to access the file.

  1. Ability to Add Protection to Unprotected Files: Enable this option to allow users to manually protect individual files.

  2. Ability to Add Protection to Multiple Files Simultaneously: Enable this option to allow users to protect multiple files at once.

  3. Need to Give Reason for Adding Protection to Unprotected Files: Enable this option if users must provide a justification for adding protection. This helps reviewers understand why the files were protected and supports security audits and compliance requirements.

Removing File Protection

This setting allows users to remove protection from a file. Removing a file’s protection clears file classification, Security Group restrictions, circulation restrictions, and all other applied protection.

  1. Ability to Remove File Protection: Choose whether users are allowed to remove protection from files:

    • User is unable to remove protection from files Select this option if users should never be able to remove file protection.

    • User is able to remove protection from all files Select this option if users are allowed to remove protection from any file.

  2. Ability to Remove Protection from Multiple Files Simultaneously Enable this option if you want users to remove protection from multiple files at once.

  3. Need to Give a Reason for Removing File Protection Specify whether a reason is required when users remove protection. This helps reviewers understand why the protection was removed and supports security audits and compliance requirements.

    • User never has to give a reason Select this option if no justification is needed when removing protection.

    • User always has to give a reason Select this option if users must provide a reason for removing protection.

Changing File Protection

This setting allows users to change the protection of a file by modifying the classification of protected files and updating the Security Groups that are allowed to access them.

  1. Ability to Change File Protection: Select whether users are allowed to modify protection settings:

    • User is unable to change file protection Select this option if you don’t want to allow users to update the classification or security group settings of any file.

    • User is able to change the file protection of all files Select this option if you want to allow users to modify protection on any protected file.

  2. Ability to Change Protection of Multiple Files Simultaneously: Enable this option if you want users to update protection for multiple files at once. 3. Need to Give a Reason for Changing File Protection: Specify whether a reason is required when users change protection. This helps reviewers understand why the protection as changed and supports security audits and compliance requirements.

    • User never has to give a reason for changing file protection Select this option if no justification is required.

    • User always has to give a reason for changing file protection Select this option if the user must provide a reason for applying changes.

Create ZIP Package

This setting allows users to securely share protected files to external recipients who do not have the PROTECT Client installed by creating a password-protected ZIP package.

  1. Ability to Package Files: Select whether users are allowed to create ZIP packages:

    • User is unable to package files Select this option if users are not allowed to share files with third parties by creating ZIP packages.

    • User is able to package all files Select this option to allow users to share files as password-protected ZIP packages. 2.

  2. Ability to Package Multiple Files: Enable this option if you want to allow users to include multiple files in a single ZIP package.

  3. Need to Give a Reason for Packaging Files: Specify whether a justification is required when users create a ZIP package. This helps reviewers understand why the ZIP package was created and supports security audits and compliance requirements.

    • User never has to give a reason for packaging files Select this option if no reason is required when creating a ZIP package.

    • User always has to give a reason for packaging files Select this option if a reason must be entered for creating a ZIP package.

Sharing Files Using Microsoft Information Protection (MIP)

This setting allows users to securely share protected files by using Microsoft Information Protection (MIP) with recipients who do not have the PROTECT Client installed. When a file is shared using this option, PROTECT’s protection is temporarily removed and replaced with Microsoft Information Protection.

  1. Ability to Share Files Using Microsoft Information Protection: Choose whether users are allowed to share files using MIP:

    • User is unable to share files using Microsoft Information Protection Select this if users should not be able to share files via MIP.

    • User is able to share all files using Microsoft Information Protection Select this if users are allowed to share protected files using MIP.

  2. Ability to Share Multiple Files Using Microsoft Information Protection: Enable this option to allow users to share multiple files at once.

  3. Need to Give a Reason for Sharing Files Using Microsoft Information Protection: Choose whether users must provide a justification when sharing files. This helps reviewers understand why the files were shared using MIP and supports security audits and compliance requirements.

    • User never has to give a reason Select this option if no reason is required when sharing files using MIP.

    • User always has to give a reason Select this option if users must enter a reason when sharing files using MIP.

Sharing Files as Encrypted HTML File

This setting allows users to convert protected MS Office files and PDFs into password-protected HTML files for secure external sharing. This keeps the original file unchanged while applying password-based access control for secure external sharing.

  1. Ability to Share Files as Password-Protected HTML File: Choose whether users are allowed to export protected files as secure HTML:

    • User is unable to share files as password-protected HTML file Select this option if HTML export should be disabled for all users.

    • User is able to share all files as password-protected HTML file Select this option to allow users to create secure HTML exports.

  2. Ability to Share Multiple Files as Password-Protected HTML File: Enable this option to allow users to export multiple files at once.

  3. Need to Give a Reason for Sharing Files as Encrypted HTML File: Choose whether users must provide a justification. This helps reviewers understand why the HTML file was created and supports security audits and compliance requirements.

    • User never has to give a reason Select this option if no reason is required when sharing files using secure HTML.

    • User always has to give a reason Select this option if a reason must be entered for generating secure HTML.

Adding Expiry Date

This setting allows users to restrict access to a protected file after a specific expiry date. After the expiry date, no users, including the one who set the expiry, can access the file.

circle-info

The device must be able to connect to the PROTECT server for the expiry policy to take effect.

  1. Ability to Add an Expiry Date to Files: Decide whether users are allowed to set expiry dates:

    • User is unable to add an expiry date to files Choose this option if expiry control should not be available.

    • User is able to add an expiry date to all files Choose this option to allow users to set expiry dates on any protected file.

  2. Need to Give a Reason for Adding an Expiry Date: Choose whether users must provide a justification when applying an expiry date. This helps reviewers understand why the expiry date was added and supports security audits and compliance requirements.

    • User never has to give a reason Select this option if no explanation is required for adding an expiry date.

    • User always has to give a reason Select this option if a reason must be entered for adding an expiry date.

Restricting Circulation

This setting allows users to prevent other users from expanding access by adding Security Groups. Once circulation is restricted, no one, including users with access, can add new Security Groups or expand who can open the file. This ensures that only the original file owner retains full control over sharing and access.

  1. Ability to Restrict the Circulation of Files: Choose whether users can apply circulation restrictions:

    • User is unable to restrict the circulation of files Select this option if users should not be allowed to restrict access permissions.

    • User is able to restrict the circulation of all files Select this option if users are allowed to prevent others from modifying file access

  2. Need to Give a Reason for Restricting the Circulation of Files: Choose whether users must provide a justification when applying a circulation restriction. This helps reviewers understand why the circulation was restricted and supports security audits and compliance requirements.

    • User never has to give a reason Select this option if no explanation is required for restricting circulation.

    • User always has to give a reason Select this option if a reason must be entered for restricting circulation.

Add Protection to Files in Folder

This setting enables automatic protection to be applied to any unprotected files that are moved or copied into a specific folder. Once enabled, users do not need to manually apply protection to files; the system will do it automatically when a file enters the folder.

  1. Ability to Add Protection to Unprotected Files in the Folder: Enable this option if you want automatic protection enforcement. When enabled, any unprotected file moved or copied into the folder will automatically have protection applied. This option is useful when a folder is designated as a secure storage area for confidential files.

  2. Need to Give a Reason for Adding Protection to Unprotected Files in Folder: Enable this option if users must provide a justification when this setting is applied. This helps reviewers understand why the files were protected and supports security audits and compliance requirements.

Change Protection Added to Files In Folder

This setting enables automatic protection changes to be applied to files when they are moved or copied into a specific folder. It ensures that any file placed in the folder automatically inherits the folder’s defined protection rules, such as updated classification or security group settings, without requiring manual action from the user.

  1. Ability to Change Protection to Protected Files in the Folder: Enable this option if you want PROTECT to automatically apply the folder’s protection settings to any files moved or copied into the folder.

  2. Need to Give a Reason for Changing Protection to Added Files in Folder: Enable this option if users must provide a justification when this setting is applied. This helps reviewers understand why the protection settings were altered and supports security audits and compliance requirements.

Remove File Protection

This setting enables automatic removal of protection from files when they are moved or copied into a specific folder. It is useful in scenarios where a designated folder is intended for storing or processing files in an unprotected state, for example, for internal reviews, temporary editing, or reclassification.

  1. Ability to Remove Protection to Protected Files in the Folder: Enable this option to allow automatic removal of protection from files moved or copied into the folder.

  2. Need to Give a Reason for Removing Protection from Files in Folder: Enable this option if users must provide a justification when applying this setting. This helps reviewers understand why the protection settings were altered and supports security audits and compliance requirements.

Disable Folder Rules

This setting allows users to remove all automated protection rules and actions previously applied to a specific folder. When this option is enabled, all existing folder-level operations, such as automatic Add Protection, Change Protection, or Remove Protection, will be deleted. However, the existing files in the folder remain unchanged. This will remove protection from the folder only, not from the files it contains.

  1. Remove All Folder Operations: Enable this option to remove all folder-level protection and automation rules.

  2. Need to Give a Reason for Removing Folder Operation: Enable this option if users must provide a justification when this setting is applied. This helps reviewers understand why the protection settings were altered and supports security audits and compliance requirements.

Edit User Policy

  1. Go to PROTECT > User Policies.

  2. Search for the policy to edit and click the Edit icon under ACTIONS.

  3. Update the policy and click Save.

Assign Users to User Policy

  1. Go to PROTECT > User Policies.

  2. Search for the policy to assign and click Assign User under ACTIONS.

  3. Search and select the users you want to assign the policy to, and click Assign Users. If the user already has a policy, it is replaced with the new one.

  4. Click Ok in the Alert.

Change User’s Policy

  1. Go to PROTECT > User Policies.

  2. In VIEW BY, select Users.

  3. Search and select the user whose policy you want to change, and click Change Policy.

  4. Select the new policy and click Assign.

Delete User Policy

  1. Go to PROTECT > User Policies.

  2. Search for the policy to edit and click the Delete icon under ACTIONS.

  3. Click Delete in the confirmation alert.

Encrypt by Data Type

A Data Type defines the kind of information PROTECT recognises as sensitive, such as personal details, financial data, or confidential business information. For details on Data Type, see herearrow-up-right.

This section defines whether PROTECT automatically protects files based on their contents or the location where they are stored.

PROTECT identifies sensitive files through:

  • Sensitive Words

  • Regular Expressions

  • Filename Expressions

Once a match is found, PROTECT encrypts the file according to the Data Type’s assigned Classification.

You must assign Security Groups to each Data Type to control who can access or decrypt the files that match that Data Type.

1. Sensitive Words

PROTECT scans files for pre-defined sensitive keywords or phrases. If any of the words or phrases are detected, PROTECT automatically encrypts the file. Example:

  1. Data Type: Payroll Documents

  2. Data Identifier: Sensitive Words

  3. Phrases: PAYSTUB In this example, if PROTECT finds the word PAYSTUB in any file, the file is automatically encrypted.

2. Regular Expression

Regular expressions are used to detect structured data patterns such as credit card numbers or identification numbers. If PROTECT finds a matching pattern, it automatically encrypts the file.

Example:

  1. Data Type: Card Number Regex

  2. Data Identifier: Regular Expression

  3. Expression: (?:\d[ -]*?){13,19} In this example, if a file contains a number that matches this pattern, PROTECT encrypts it.

3. Filename Expression

PROTECT can automatically encrypt files based on their folder paths or file-name patterns. These expressions can include:

  1. Folder expression: Encrypt files stored in a specific directory or path.

  2. File expression: Encrypt files that match certain naming patterns, regardless of where they are saved.

When a user creates, moves, or saves a file that matches any defined Filename Expression, PROTECT applies encryption even if the file content does not contain sensitive words or detection patterns.

Examples:

  1. Folder expression: *\Desktop*\Confidential* *\Desktop\Confidential* \192.168.0.5\Public\PROTECT\Confidential* In this example, any file stored in or moved to a folder path containing the word “Confidential”, whether on a local desktop or network location, will be automatically encrypted by PROTECT.

  2. File expression: *_salary.xlsx In this example, any file that ends with “_salary.xlsx”, no matter where it is saved, will be automatically encrypted.

Assign Security Group to a Data Type

  1. Go to PROTECT > Encrypt by Data Type. You’ll see a list of Data Types (both pre-defined and custom).

  2. Search for the Data Type you want to assign and enable the data type from the STATUS column. You’ll only be able to assign Security Groups once the Data Type is enabled.

  3. For Filename Expression, if folder expression is not required, you can disable it using Disable Folder Expression, while still keeping file expression active. For details on folder expression, see Filename Expression.

  4. Click +Assign Security Group in the ACTIONS column.

  5. Search for and select the Security Groups and click Assign Security Group. Only the assigned Security Group members can access the protected files.

Assign Data Type to a Security Group

  1. Go to PROTECT > Encrypt by Data Type. You’ll see a list of pre-defined Data Types.

  2. In VIEW BY, select By Security Groups.

  3. Search for the Security Group you want to assign and click +Assign Data Types in the ACTIONS column.

  4. Search for and select the Data Types and click Assign Data Types. Only the assigned Security Group members can access the protected files.

Applications

The Applications section defines which applications can open, edit, and save protected files. These applications ensure PROTECT can encrypt files when users save or export them in different formats. This ensures only approved applications can access or modify protected content.

Add an Application

  1. Go to PROTECT > Applications. The page displays the list of registered applications and allows adding or editing applications.

  2. Click +New Application.

  3. In Executable Name, enter the executable file name (e.g., winword.exe, acad.exe) of the application you want to register. This defines which program is authorised to access encrypted files.

  4. In Application Suite, specify the suite or category the application belongs to (e.g., Microsoft Office, Adobe, AutoCAD). This helps group related applications for easier management.

  5. In Folder Path, enter the path substring if the executable resides in a specific location. (e.g., C:\Program Files\Microsoft Office). Click + to add the folder path to the selected list. The selected paths appear under Folder Path Selected on the right.

  6. In Extensions that are encrypted/decrypted, define which file types the application can encrypt and decrypt securely. Choose one of the following options:

  7. All Extensions The application can encrypt/decrypt all files regardless of their extension.

  8. All but these extensions The application can encrypt/decrypt all files except those with the specified extensions. For example, if you enter .docx, .cad, the application will encrypt/decrypt all other file types except these two.

  9. Only these extensions The application can only encrypt/decrypt the file types listed here. For example, if you add .docx, .xls, .ppt, the application will encrypt/decrypt only these extensions. Click + to add each extension to the list.

  10. Enable Network Drive Support if the application needs to access encrypted files stored on network drives (shared folders or mapped drives).

  11. Click Save.

The application will appear in the Application List and will be allowed to encrypt or decrypt files securely based on your configuration.

Edit an Application

  1. Go to PROTECT > Applications.

  2. Search for the application to edit and click the Edit icon in the ACTIONS column.

  3. Update the necessary information and click Save.

Delete an Application

  1. Go to PROTECT > Applications.

  2. Search for the application to delete and click the Delete icon in the ACTIONS column.

  3. Click Delete in the Confirmation Alert.

Avoid Folders

The Avoid Folders section lets you define directories that can be excluded from encryption. Files stored in these folders will not be encrypted by PROTECT, even if they include sensitive words or match any pre-defined Data Type.

circle-info

Use this feature carefully to avoid accidental exposure of sensitive data.

Add a Directory to Exclude

  1. Go to PROTECT > Avoid Folders.

  2. Click +New Directory.

  3. In Title, enter a name for this exclusion rule. Example: Accounting Temp Folder.

  4. In Directory, enter the full directory path that should be excluded from encryption. Example: C:\Users\Public\AccountingTemp\

  1. In Sub Folders, click + and add a complete path of subfolders within the directory that must continue to be encrypted. These subfolders override the exclusion rule of the folder. While the main directory is excluded from encryption, any subfolder added here will continue to follow normal encryption rules. This allows you to exclude a directory for operational needs while still protecting specific subfolders that contain sensitive or regulated information. Use the + button to add multiple subfolders.

circle-info

You must enter a complete path in the Directory and Sub Folder.

Example: If you add C:\CompanyData\TempProcessing\ to Avoid Folders and specify C:\CompanyData\TempProcessing\Inbound\ and C:\CompanyData\TempProcessing\Archive\ as excluded subfolders, all other subfolders within TempProcessing will not be encrypted, while only these two specified subfolders will be encrypted.

  • C:\CompanyData\TempProcessing\Not encrypted

  • C:\CompanyData\TempProcessing\Inbound\Encrypted

  • C:\CompanyData\TempProcessing\Archive\Encrypted

  • Other sub folders inside TempProcessingNot Encrypted

  1. Click Save.

The directory will appear in the Directory List, where it can be edited or removed later.

Edit a Directory

  1. Go to PROTECT > Avoid Folders.

  2. Search for the directory to edit and click the Edit icon in the ACTIONS column.

  3. Update the necessary information and click Save.

Delete a Directory

  1. Go to PROTECT > Avoid Folders.

  2. Search for the directory to delete and click the Delete icon in the ACTIONS column.

  3. Click Delete in the Confirmation Alert.

Websites

The Websites section lets you add trusted websites that can open protected files. When a listed website interacts with encrypted files, PROTECT automatically decrypts the files during upload, so the website can process them and encrypts any file that is downloaded from the website for continued protection.

circle-info

Only websites added to this list are allowed to securely open or handle encrypted files.

Add a Website

  1. Go to PROTECT > Websites.

  2. Click +New Website.

  3. In URL, enter the website address that can interact with protected files. Example: https://protect.mycompany.com

  4. In Identifiers (Optional), click + to add an identifier. Identifiers help PROTECT detect specific elements or sections of the website where file uploads or downloads occur. This ensures decryption and encryption occur only on authorised upload/download components, not the whole page. Each identifier includes:

    1. DOM Element Selector: Enter the CSS selector for the webpage element that PROTECT should identify or match. This tells PROTECT which element on the page is linked to file operations. Examples: #uploadBtn , .input-field , div.file-section , button[data-action="upload"]

    2. Search Value: Enter a value that identifies your organisation in the selected element (for example, part of the signed-in email address or company name). PROTECT will only decrypt files when this value is found, so decryption happens only for accounts that belong to your company. Examples: guardware.com.au , @guardware.com.au , GuardWare Australia

  5. In Extensions that are decrypted, choose how PROTECT handles file extensions when interacting with the website:

    1. All: All encrypted files uploaded or downloaded by this website will be decrypted/encrypted automatically.

    2. All but these extensions: All files except the listed extensions will be decrypted.

    3. Only these extensions: Only files with the specified extensions will be decrypted for this website. Examples: .csv, .xml Use the + button to add multiple extensions.

  6. Click Save. The website will appear in the Website List, where you can edit or remove it later.

For example, with the configuration shown in the image, files will only decrypt during upload when the user is signed into SharePoint with a GuardWare Australia account. If the user is logged in with any other account, files remain encrypted.

Edit a Website

  1. Go to PROTECT > Websites.

  2. Search for the website to edit and click the Edit icon in the ACTIONS column.

  3. Update the necessary information and click Save.

Delete a Website

  1. Go to PROTECT > Websites.

  2. Search for the website you want to delete and click the Delete icon in the ACTIONS column.

  3. Click Delete in the Confirmation Alert.

Key Management

The Key Management section lets you manage encryption keys used by PROTECT. These keys ensure that only authorised users and applications can open encrypted files. In any encryption system, attackers may eventually gain access to private keys. To reduce this risk, the private keys used for file encryption should be changed regularly. To maintain security, PROTECT supports scheduled key rotation, immediate key rotation, offline key lifespan control, and user key status changes.

Scheduled Key Rotation

This section lets you set scheduled key rotation intervals. Regular key rotation ensures that even if old keys are compromised, newer files remain secure.

How Scheduled Rotation Works

  • PROTECT automatically generates new private keys based on the selected interval.

  • New keys are distributed to all PROTECT Clients before the old keys expire.

  • Once the old key expires, PROTECT Clients automatically use the updated keys.

To schedule key rotation:

In Key Rotation Interval, select a duration and click Scheduled Key Rotation to activate the rotation cycle.

Immediate Key Rotation

Use immediate key rotation if a private key has been compromised, such as in cases like lost or stolen devices, compromised accounts, and suspected security breaches.

To rotate the key immediately:

Click Rotate Keys Now! to immediately generate and deploy new encryption keys across the system.

Default Offline Key Lifespan

Offline keys determine how long a user can access encrypted files without being connected to the PROTECT server.

If a user does not reconnect to PROTECT within the defined timeframe, their offline key expires. This prevents unauthorised access when a device is lost, stolen, or offline for too long.

To define the default offline key lifespan:

In Default Offline Key Lifespan, select a duration and click Set Lifespan.

Change User Key Status

This section allows you to enable or disable encryption key access for specific users within a selected security group. When a user’s key status is disabled, they will no longer be able to access any protected files.

To change user key status:

  1. Select a Security Group from the dropdown.

  2. Select the users whose status you want to change.

  3. Click Enable Users or Disable Users based on your needs.

View History

Click View History at the top-right corner to view a complete log of previous key rotations, changes, and key-related events.

Events Reports

The Events Reports section provides a summary of all protection-related actions performed by users. This helps you understand user behaviour, identify high-volume activity, and detect unusual patterns.

To view events reports:

  1. Go to PROTECT > Events Reports.

  2. Select a date range to filter user activity within a specific period. You’ll see a list of users with the following details:

Column
Description

Username

Name of the user performing the actions.

Add Protection

Number of times the user applied protection to a file.

Remove Protection

Number of times the user removed protection from files.

Change Protection

Number of times the user changed protection of files.

Add Expiry

Number of times the user added an expiry date.

Restrict Circulation

Number of times the user restricted file circulation.

Share with HTML

Number of times the user created a securel HTML.

Share with MIP

Number of times the user shared files using Microsoft Information Protection.

Share with ZIP

Number of times the user created password-protected ZIP packages.

Access

Number of times the user accessed protected files.

Save As

Number of times the user saved protected files as new copies.

  1. Click any record to view further details, such as the name of the protected file, file path, location of users who accessed protected files, classification of the file, justification message, and timestamp of the action performed.

Files Reports

The Files Reports section provides a detailed audit trail of all file-related activities within PROTECT. This report helps you track which files were accessed, modified, or interacted with, and by whom.

To view files reports:

  1. Go to PROTECT > Files Reports.

  2. Select a date range to filter file activities within a specific period. You’ll see a list of users with the following details:

Column
Description

File Name

Name of the file that was accessed or modified.

File Path

Location of the file on the device or network.

No. of Activities

Total number of actions performed on the file.

Last Activity From

The user who last performed an action on the file.

Last Activity

Type of the last action (e.g., add protection, remove protection).

Last Activity Time

Timestamp of the last action.

Expiry At

Expiry date applied to the file.

PC Name

Name of the computer where the activity occurred.

Classification Label

Classification applied to the file (e.g., Restricted, Internal).

  1. Click on any file to view further details such as the action performed on the file, the user who performed the action, the justification message, and the timestamp of the action performed.

Decrypt Files Reports

The Decrypt File Report section displays details of file decryption activities performed on devices.

You can filter and refine the report using the following options:

  • From / To: Select a date range to view decryption activities within a specific period.

  • Status: Filter results based on the decryption status.

  • Search: Search for specific records using keywords such as file path, PC name, or user.

The report table includes the following information:

  • File Path: Location of the decrypted file.

  • Date: Date when the decryption activity occurred.

  • PC Name: Name of the device on which the file was decrypted.

  • User: The specific user account on the device for which the file was decrypted.

  • Status: Outcome of the decryption action.

Agent Log Files

The Agent Log Files section displays PROTECT agent log files collected from devices.

You can refine the results using the following options:

  • From / To: Select a date range to view log files generated within a specific period.

  • Search: Search for specific log entries using keywords such as file path, PC name, user, or log type.

The table includes the following information:

  • File Path: Location of the log file on the device.

  • Date: Date when the log was generated or uploaded.

  • PC Name: Name of the device from which the log was collected.

  • User: The specific user account on the device associated with the log entry.

  • Log Type: Type or category of the log.

  • Action: Available actions for the log file, such as downloading.

Invite Users

The Invite Users section lets you invite external users to use GuardWare PROTECT by sending them an invitation email. Invited users can access encrypted files according to assigned permissions and security groups.

To invite an external user:

  1. Go to PROTECT > Invite Users.

  2. In Email, enter the email address of the external user you want to invite.

  3. In Redirect URL, leave the default value as it is. This is the URL the user will be redirected to after accepting the invitation.

  4. For Subject and Message, you can keep the default text or customise them as needed.

  5. Click Send Invitation.

The external user receives a link to accept the invitation, details about GuardWare PROTECT, and how to get started. The user will be added to the Azure User list once they accept the invitation.

Azure Users

The Azure Users section lists all Azure AD users and external users in your organisation and shows whether each user is allowed to use GuardWare PROTECT.

To view Azure users:

  1. Go to PROTECT > Azure Users.

  1. Use the following filters to refine results:

  • Is External Filter internal vs. external guest users.

  • Is Protect User Filter users who have PROTECT enabled or disabled.

  • Search Search by name, email, or UPN.

User Table Details

Name
Display name of the Azure AD user.

UPN

Azure User Principal Name.

Mail

Primary email address.

Is External

Shows if the user is an external/guest account.

Is Protect User

Shows if PROTECT is enabled for the user.

Sync AD Users

The Sync AD Users button updates user and group information from Active Directory (AD) or Azure Active Directory. When you select this option, PROTECT connects to your directory service and retrieves the latest data, including new users, removed accounts, and updated group memberships.

This ensures that the Management Console always reflects the current status of your organisation’s users and helps apply security policies to the right people.

Update Settings Version

The Update Settings Version button prompts PROTECT clients to automatically pull the newest configuration and push the latest settings to all connected devices.

This is useful when you have made changes to policies or settings and want them to take effect immediately in client devices, without waiting for the next automatic update.

PROTECT Devices

The PROTECT Devices section displays all devices running the GuardWare PROTECT Client within your organisation.

To view PROTECT devices:

  1. Go to PROTECT > Protect Devices.

  2. Use the following filters to refine results:

  • From / To: Filter devices by the date they were added.

  • Last Handshake: See when each device last communicated with the server.

  • Search: Search by PC name, IP, MAC, or user.

Device Table Details

PC NAME
Name of the device running PROTECT.

USERS

Number of active PROTECT users on the device. Click any record to view user details like username, UPN, last online and login timestamp, and first login timestamp. For details on more actions, see Users Details.

PC IP

IP address of the device.

VERSION

Version of the installed PROTECT Client.

LOCATION

Location tag (e.g., Nepal, AU).

CREATED DATE

When the device first registered with PROTECT.

COMMAND

The last command executed on this device.

LAST HANDSHAKE

Last time PROTECT Client communicated with the server.

ACTIONS:

1. Enable/Disable Agent

Use the Enable/Disable Agent toggle to turn PROTECT on or off for a device. When the agent is disabled, all users on that device lose access to PROTECT features and all protected files.

2. Send Command

Use this option to send a command to the selected device’s PROTECT client.

  1. Uninstall: Select Uninstall to remove PROTECT from the device. Before uninstalling, make sure you decrypt all protected files first if you want the users on the device to access the files later. If PROTECT is uninstalled without decrypting the protected files, users will no longer be able to access those files. To learn how to decrypt the files, see Decrypt Files.

  2. Refresh Icons: On a device where PROTECT is installed, if new applications (for example, AutoCAD or Microsoft Word) are installed, protected files associated with those applications may not display icon overlays immediately. Select Refresh Icons to display the icon overlays.

User Details

In PROTECT Devices, click any record in the USERS column to view user details like username, email address, last online, login timestamp, and first login timestamp. You can also perform the following actions:

1. Enable/Disable User

Use the User Enabled/Disabled toggle to turn PROTECT on or off for the user in the device. When the user is disabled, they lose access to PROTECT features and all protected files.

You can also perform this action from the Security Groups section.

2. Enable/Disable Log

Use the Log Enabled/Disabled toggle to turn log collection on or off on the device. When enabled, all PROTECT-related activities are logged on the client. You can send the logs to the server via the Upload Logs command and view the log files in the Agent Log Files section.

You can also perform this action from the Security Groups section.

3. Enable/Disable Force Encrypt

Use the Force Encrypt Enabled/Disabled toggle to automatically encrypt files when the user accesses them. The files are encrypted only when accessed or created through the application authorised by the admin. For details on authorising the application, see Applications.

For applications that generate temporary files when opening documents (such as Microsoft Word or Excel), encryption occurs immediately after the file is opened, edited, or created. If a file is accessed using other applications, encryption is applied when the file is edited or created.

4. Decrypt Files

Use the Decrypt Files option to remove protection from all protected files for the user. This step is especially required before uninstalling PROTECT from a device. Uninstalling PROTECT without first removing protection from your protected files will make them inaccessible afterwards.

You can view the report in the Decrypt Files Reports section.

You can also perform this action from the Security Groups section.

5. Send Command

  1. Upload Logs: Select Upload Logs to send PROTECT-related data from the client to the server. You can choose the type of data to upload:

    1. Logs: Uploads PROTECT activity and event log files.

    2. Databases: Uploads the PROTECT database files for analysis or troubleshooting. Once uploaded, you can view the log/database files in the Agent Log Files section.

Office Add-in

The Office Add-in section allows you to configure how Microsoft Office applications (Word, Excel, PowerPoint) behave when working with PROTECT-encrypted files. These settings help enforce classification, control sharing behaviour, and ensure files remain protected while being edited.

To configure Office Add-in:

  1. Go to PROTECT > Office Add-in.

  2. Configure the following:

Display Classifications

Enable this if you want Office apps to show Office’s built-in classification labels (such as Public, Internal, or Confidential) inside Office documents.

Force Classifications

Enable this if you require users to choose a classification before saving a file.

Watermark

Select in which part of the Office document (header, body, footer) to apply a watermark to visually reinforce sensitivity. Example: body (adds watermark text in the body of the document).

Watermark Align

Select where to place the watermark (centre, left, right).

Disable Auto Save

Enable this if you want to restrict Office from automatically saving changes to encrypted documents.

Disable Connected Services

Enable this to disable cloud services such as OneDrive, SharePoint sync, and other cloud services in Office to prevent unintentional upload of sensitive files.

Disable Share

Enable this to prevent users from sharing files using Office’s Share button. Users must share files using approved PROTECT sharing options instead.

Blocked Printers

Select the virtual or software-based printers that PROTECT should block. When selected, users will be blocked from printing protected files using these printer types, including options such as OneNote, XPS, Print to PDF, generic PDF printers, and third-party tools like Foxit, doPDF, Nitro, or Bluebeam. This helps stop users from creating unprotected copies of sensitive files through virtual printing.

  1. Click Submit.

Last updated