Users Guide

Identify those in your access group.........................................................................................................................63
Use a transitional period to process shared les....................................................................................................63
Collaborate on newly created les after the transitional period........................................................................... 64
Enterprise Does Not Yet Have Data Guardian and Force-Protected Mode............................................................. 64
Identify those in your access group.........................................................................................................................64
Use a transitional period to process shared les....................................................................................................64
Collaborate on newly created les after the transitional period...........................................................................65
Change the Owner of an Encrypted File...................................................................................................................... 65
Revoke Access to a Key..................................................................................................................................................65
Pre-share Protected Files on Windows.........................................................................................................................65
Pre-share Protected Files on Mac................................................................................................................................. 66
Pre-share Protected Files on iOS or Android............................................................................................................... 66
Pre-share Protected Files on the Web Portal...............................................................................................................67
Pre-share Protected Files as an External User.............................................................................................................67
Modify who has access to protected emails................................................................................................................ 68
10 Frequently Asked Questions.......................................................................................................................69
Miscellaneous FAQs.........................................................................................................................................................69
Oce Documents and Protected-Mode FAQs............................................................................................................69
6 Data Guardian User Guide v2.8
Contents