After installing all 3 files for Symantec Endpoint Encryption, your computer will restart automatically. Please log in as usual; there may be a slower response time as SEE is running a full encryption of the computer's hard drive for the first time.
This initial encryption may take several hours or more depending on the computer's hard drive size, processor speed, and amount of memory. During this time it is OK to work on the computer, however you must not install any other programs or run software updates that require you to restart the computer. The computer may run more slowly while the initial encryption is being performed, but will return to normal speed afterwards.
When the initial encryption is complete, verify the status of encryption using the instructions below.
Select the Windows logo (Start button) in the lower left corner of the main computer screen.
Select All Programs from the list that appears.
Find the Symantec Endpoint Encryption folder - you may need to scroll up or down in the program list. Click on the folder to open it, then select the Symantec Endpoint Encryption Client within the folder.
The Symantec Endpoint Encryption User Client will open. If prompted for Registered User Login, type in the password used to login to the computer itself - typically your MC Domain Account.
Select the Encryption link under the Full Disk heading near the center of the window. SEE displays the status of encryption in the pane to the right under Status.
If encryption is still being performed, the Status will list the percentage that it has completed.
If completed, the Status will read Encrypted.
Click on the red X icon in the upper right corner of the Symantec Endpoint Encryption window to close.
After this initial encryption by Symantec Endpoint Encryption has finished, your computer will be using full disk encryption.
Encryption will continue to happen automatically in the background as you create, modify and save files on the computer.
The files on your computer can only be viewed (decrypted) with the valid computer login. If you need to share an encrypted file with others please see links to the left for instructions on sharing files and email attachments.