Application List
  • 18 Oct 2020
  • 1 Minute To Read
  • Print
  • Share
  • Dark
    Light

Application List

  • Print
  • Share
  • Dark
    Light

Administrators can use the Application List to determine which applications have rights to open protected files. Applications listed with Enabled are allowed to open protected files (files that are encrypted and belong to a Circle). This is commonly referred to as the Allowed List. Applications labeled Disabled are only allowed to move the data.

application.png

Allowed List applications will be able to decrypt portions of the file needed to perform the function of the application.

By default, the list of Allowed Applications is set to a known list of applications that have common usage.

Default Application Configuration

Warning Potential Data Loss

Application such as web browsers, file synchronization, and sharing applications, and other file transfer/messaging applications should be carefully reviewed with proper network policies and implemented with Mobile Device Management (MDM) policies in place.

For example, adding Dropbox to the Allowed List will mean that DropBox will be able to decrypt the protected file and sync the file to the Dropbox cloud. The file in the Dropbox cloud will not be protected.

For the same reason, web browsers should not be added to the Allowed List as dragging a file onto the browser may result in the file being transferred in an unprotected state.

Was This Article Helpful?