21.6 Encryption Solutions Reports

When endpoint encryption is activated, the transfer of files to and from the encrypted folders is monitored and recorded.

Click the plus sign next to Encryption Solutions to expand the list to display the following reports:

21.6.1 File Encryption Activity

Lists files that have had encryption applied.

21.6.2 Encryption Exceptions

Lists errors from the encryption subsystem (for example, a protected file could not be decrypted because the user did not have the right keys).