To view the list of devices storing encrypted information:
The workspace displays information about devices on the network storing encrypted files, and about devices encrypted at the drive level. After the information on a device is decrypted, the device is automatically removed from the list.
You can sort the information in the list of devices either in ascending or descending order in any column.
The user interface settings determine whether the Data encryption and protection folder appears in the console tree.
Page top