This guide helps you quickly get started with Ping32’s document encryption client, enabling you to master its key encryption functions with ease.
By following these steps, you can avoid operational errors, improve data handling efficiency, and ensure your organization’s information assets are fully protected.
Once the Ping32 client is correctly installed, encryption authorization is added, and the encryption service is running, administrators can deploy encryption and decryption policies via the Ping32 console.
Client users can then perform document encryption and decryption based on the received policies.
Transparent File Encryption
When administrators issue a transparent encryption policy, any file created via trusted applications will be automatically encrypted after editing and saving.
This provides end-to-end protection across the entire file lifecycle — from creation to disposal.
For example:
When a user creates a document using an authorized software such as WPS Office, edits it, and saves changes, the file will be automatically encrypted and display an encryption icon.
When the approval-based decryption policy is enabled, users who wish to decrypt a file must submit a decryption request.
Only after the request is approved by the designated approver will the file be decrypted.
Users can enter the decryption request screen through any of the following three methods:
Right-click the encrypted file → Document Security → Request Decryption
Right-click the Ping32 tray icon → Start Approval → Apply for Decryption
Open the Approval Center → Create New Approval → Select File Decryption
If administrators issue a direct decryption policy, users can decrypt or encrypt files locally without approval.
While this provides flexibility, it carries significant risk, as it may lead to uncontrolled decryption and potential data leaks.
If a client user receives an encrypted document from another security domain or one with a higher classification level, they cannot open the file directly.
When administrators enable the security attribute adjustment policy, users can submit a request to modify a file’s attributes.
After approval, they can view the document normally.
When the email approval decryption policy is issued, users who need to send encrypted files via email must submit a decryption request before sending.
Once approved, the user can send the email successfully.
Before sending encrypted files via email, configure your outgoing email account:
Right-click the Ping32 tray icon → Document Encryption → Email Configuration
Enter your email address, password, and SMTP server information
Click Save or Confirm to complete setup
Note: Email configuration only needs to be completed once.
When the file external approval policy is enabled, users must submit a file distribution request to send files externally.
Only after approval can they generate a distribution file or external package to share securely.
Creating a File Distribution Request
Create a new file distribution approval.
Fill in the title and description to explain the purpose of the request.
Add one or more files to be shared.
Configure file distribution properties, including:
Password verification
Network validation
Binding to a specific device
Expiry date or access duration
Maximum open count
Restrictions on printing, screenshots, or copying
Adding watermarks
Click Submit to send the request for administrator approval.
If the administrator enables direct file distribution, users can create distribution packages without approval.
Users can access this feature through any of the following:
Right-click file → Document Security → Create File Distribution Package
Right-click Ping32 tray icon → Document Security Management → Create File Distribution Package
In the File Distribution interface, users can select files, define attributes, and choose to generate a distribution package or a shared file with customized access controls.
When administrators enable the offline access policy, users can open encrypted documents for a limited time while disconnected from the corporate network.
Once the time expires, files become inaccessible.
If administrators allow offline extension requests, users can submit either online or offline time extension applications.
Online Extension Request
Submit a time extension request before traveling.
During the trip, if access expires, the user can import the extension code to continue accessing encrypted files without interruption.
Offline Extension Request
When offline, users can generate an application code through the Ping32 client.
This code can be sent to the administrator via a third-party tool for review and approval.
After obtaining an extension code (either from an online or offline request), users can import it to extend offline access:
Right-click the Ping32 tray icon → Offline Extension
In the Offline Extension window, import the saved code
Once imported successfully, the user regains access to encrypted files while offline
Ping32 provides a comprehensive approval history, allowing users to review all submitted requests within the Approval Center, including:
File Decryption
Security Attribute Adjustment
Email Decryption
File Distribution
Offline Time Extension
This visibility ensures that all user actions are recorded, traceable, and auditable.
When the encrypted file scanning policy is deployed, users can scan their local drives or specific paths to locate all encrypted documents.
Right-click the Ping32 tray icon → Document Encryption → Scan Encrypted Files
Choose one of two scan modes:
Full Disk Scan: Scans the entire hard drive and lists all encrypted files.
Advanced Scan: Allows you to specify custom paths, file types, and filters for targeted searches.
This feature helps users quickly identify encrypted files and manage them efficiently across various business scenarios.