Active Directory-based single Circle for Accelerated Deployment
  • 27 Aug 2021
  • 1 Minute to read
  • Dark
  • PDF

Active Directory-based single Circle for Accelerated Deployment

  • Dark
  • PDF

Rolling out a data protection strategy can seem daunting, but SecureCircle's transparent data protection allows for an accelerated deployment that instantly protects end users transparently, providing many security benefits quickly and allowing for more granular tuning later. This guide describes how to achieve this by implementing an Active Directory-based Single-Circle Protection Strategy.


  1. SecureCircle Server is deployed and accessible to the administrator. If using the SecureCircle SaaS, this is already complete once you obtain your SecureCircle endpoint URL and admin credentials. If doing a non-SaaS deployment, the following articles will assist in satisfying this prerequisite:
  • SecureCircle Server Components. FAQ articles: Identity and Access Management Considerations, Key Management
  • Deploy SecureCircle server on-premises, Quick Start Section.
  1. The SecureCircle Server has network access to an Active Directory service to which it may make LDAP queries.

For SaaS, see Optional External Component Integration with SecureCircle SaaS.


  1. If not already done, change the initial user's password from the default password. See Changing an Administrative User's Password for instructions on how to do this. Consider creating individual administrative users for every administrator in your organization (see Creating Administrative Users).
  2. Create the SecureCircle Directory Services Integration (see Creating a Directory Service. Follow Active Directory/LDAP Integration Best Practices, especially "Delegate Group Object Read Access to a Restricted User for Integration Authentication").
  3. Create a new Directory Policy.
  4. Manage the new Directory Policy.
  5. Select Import Groups, filter for Domain Users, then select Domain Users and click Import.
  6. When you click Import, you will be prompted to search or select from a drop down menu which User Role the groups will default to using.
  7. Create a new Circle, selecting the new Directory Policy during creation.
  8. Navigate to Access Data->Devices in the main menu bar. Click Download Application to download the Directory Devices-based Agent. Then place the agent on a fileserver available for provisioning software on Domain Computers on startup.
  9. Follow the steps in Group Policy: Install and Configure to deploy the SecureCircle Agent and designate user folders as protected folders.

Was this article helpful?