- 26 Mar 2021
- 2 Minutes to read
- Updated on 26 Mar 2021
- 2 Minutes to read
Secure Process (formerly know as Magyc or Magic Process)
SecureCircle’s Secure Process feature is designed to automate protection of files created and handled by applications (or processes) that you choose which have been seen by the server. Once you choose your application (or process), you can determine the Circle you want files to be associated with this rule, and the extensions associated with this rule. Additionally, you can swap between protecting those extensions, or ignoring them. Let’s walk through the steps to configure it.
By default, there are no Secure Processes created.
A new Secure Process can only be linked to a single group of products. This means when you select Application.exe, you are also selecting the group of products linked to it, also known as “child processes”. Once the Secure Process is created, you will need to delete the Secure Process rule set to use the same application set in any future Secure Process.
- Navigate to Secure Process on the left side menu.
- Click the Create Select Process button to bring up a configuration window. You will see four configuration boxes.
- The first option is Product Group. Selecting an application from this drop down menu will add it and attempt to link all known child processes attached to this application. If you do not see the one you want from the list, you can use the “Search by Keywords” option at the top.
Each Secure Process is limited to one Circle. This Circle determines which set of protection policies apply to files protected under this rule.
- From the second option, use the drop down menu to find your Circle. Like the first option, if you do not see the one you want from the list, you can use the “Search by Keywords” option at the top.
The third option, Mode, is a selection of two settings that will impact the fourth option. Either Protected Extensions, or Ignored Extensions. This setting will allow you to choose what extensions will result in protected files with the least amount of extensions typed in manually.
- Protected Extensions: Extensions listed below will result in protected files when encountered by Secure Process.
- Ignored Extensions: Extensions listed below will be ignored, and all other extensions handled by the Secure Process will result in protected files.
This fourth option is where you type in the Extensions you wish to protect or ignore, based on your Mode of choice. When entering extensions into this list, it is important to note that you do not include the “.” with extension names (for example .txt).
- Adding in multiple extensions should follow this format;
txt, docx, rtf, xlsx
If you would like to add files that do not have extensions, you can simply add the “.” symbol in place of an extension such as in this format;
txt, docx, ., xlsx
Finally, if you would like to add ALL extensions to this list, you can do so by simply adding the following;
Adding * all extensions can have some unexpected results, as some programs create temporary files while operating. If possible, we advise using a custom list of extensions when able.