- Updated On 18 Oct 2020
- 1 Minute To Read
Administrators can use the Application List to determine which applications have rights to open protected files. Applications listed with Enabled are allowed to open protected files (files that are encrypted and belong to a Circle). This is commonly referred to as the Allowed List. Applications labeled Disabled are only allowed to move the data.
Allowed List applications will be able to decrypt portions of the file needed to perform the function of the application.
By default, the list of Allowed Applications is set to a known list of applications that have common usage.
Default Application Configuration
Application such as web browsers, file synchronization, and sharing applications, and other file transfer/messaging applications should be carefully reviewed with proper network policies and implemented with Mobile Device Management (MDM) policies in place.
For example, adding Dropbox to the Allowed List will mean that DropBox will be able to decrypt the protected file and sync the file to the Dropbox cloud. The file in the Dropbox cloud will not be protected.
For the same reason, web browsers should not be added to the Allowed List as dragging a file onto the browser may result in the file being transferred in an unprotected state.