Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

If a package has any flags, those are shown in the form of icons below the package name. These symbolize various states and properties of the package. Possible icons are:

Image Removed
Image Added

Data integrity of files in the package cannot be verified. Some or all of the files in the package are inaccessible. This most likely indicates problem with the datastore.

Image Removed
Image Added

Corrupted data integrity. At least one file in the package is corrupted (SHA256 data checksum from last check differs from the original checksum when uploaded).

Image Removed
Image Added

Mismatch between package encryption status and the current setting in Settings - Configuration - Data encryption - Encrypt new packages. The package is either encrypted or not, but the setting is the other way around.

Image Removed
Image Added

Contents of some file(s) in the package matches the configured DLP filter.

Image Removed
Image Added

Contents of some file(s) in the package is encrypted and so the file(s) cannot be checked. It can therefore be a potential threat. For details see settings concerning encrypted content detection.

Image Removed
Image Added

Some file in the package is too large to be checked by at least one detection engine. For more see detection settings.

Image Removed
Image Added

The package is public. Public package can be downloaded by anyone who has the link, even when not logged in. If this flag is not shown, the package is either private or internal. For details see Send a package as a logged-in user.

Image Removed
Image Added

The package is password protected. To access it, the user must enter the correct password, otherwise the access is denied. Administrator can access the package regardless of the password, if he has the appropriate administrator’s permission, see Administrator permissions.

Image Removed
Image Added

The package was released from quarantine. The flag signifies, that the package was quarantined and that the administrator released it from the quarantine, so users can download it.

Image Removed
Image Added

The package was created by forwarding another package.

Image Removed
Image Added

Persistent package. This package will not automatically expire and therefore transfer to other states (deleted, archived, shredded).

Three lines icon, symbolizing a context menu with available actions for each package, is shown on the right side of each row. Available actions in the menu can differ, based on the specific view and the package state and type. In this view the following actions may be available:

Image Removed
Make package public. Public package can be accessed by anyone, who has the unique link, even if not logged in. For details
Image Added

Move the package and all its files to the quarantine. A package in the quarantine cannot be downloaded by users.

Image RemovedImage Removed
Image Added

Change the accessibility. The administrator can change the accessibility of a package to any of available states: public, internal, private. For details about accessibility see Send a package as a logged-in user.

Image Removed

Delete. The package is moved to deleted folder (into trash). Users do not see deleted packages and cannot download them. Administrators can see deleted packages (in trash) and can restore them, if needed. See package workflow.

Image Added

Set package as persistent. Cancels the automatic expiration of the package, so the package stays in this state permanently, until the administrator manually changes that.

Image Removed
Image Added

Unset package persistence. Restores the automatic expiration of the package again, see the related action above.

Image Added

Resend notification. Resends the email notifications about the package/request to its recipients.

Image Added

Encrypt. Encrypts the package files (using the server key).

Image Added

Decrypt. Decrypts the package files, if encrypted by the server key. Packages encrypted by user’s password cannot be decrypted, because the key is not known.

Image Added

Recheck. Runs the checks by detection engines as configured in Detection settings again. Useful for example for verifying whether new anti-virus signatures find out new malware, etc. Not available for encrypted packages.

Image Added

Run a package integrity check. Recalculates the SHA256 checksums of the package files and checks for data integrity corruption.

Image Added

Delete. The package is moved to deleted folder (into trash). Users do not see deleted packages and cannot download them. Administrators can see deleted packages (in trash) and can restore them, if needed. See package workflow.

On the left side of each row a checkbox for selecting multiple packages from the list is available. For such selected packages a bulk action can be performed by clicking the “Bulk actions” button located above the table with the package list. From the actions available for an individual package only some can be performed as a bulk action.