You are on page 1of 12

Cryptzone Secured eMail Reader Manual

Last modified 3rd of May 2012

Contents
1. Introduction .................................................................................... 3
1.1 1.2 Necessary system requirements ............................................................................... 3 Additional support ...................................................................................................... 3

2. Cryptzone FAQ............................................................................... 3 3. Secured eMail ................................................................................ 4


3.1 3.2 How to receive a secured email .............................................................................. 4 How to manage your secured contacts and view shared secrets .................... 4

4. Install the Secured eMail Reader ................................................ 5


4.1 4.2 4.3 4.4 4.5 4.6 4.7 4.8 SEP Client Choose Setup Language ..................................................................... 5 SEP Client InstallShield Wizard: Welcome message ............................................ 5 SEP Client InstallShield Wizard: License Agreement ........................................... 6 SEP Client Installation mode ................................................................................... 6 SEP Client InstallShield Wizard: Setup Type .......................................................... 7 SEP Client InstallShield Wizard: Ready to Install the Program ............................ 7 SEP Client InstallShield Wizard: InstallShield Wizard Completed ....................... 8 SEP Client desktop icon ............................................................................................. 8

5. License Registration ....................................................................... 9 6. Appendix - System Requirements for Secured eMail Reader12

1.

Introduction

2.

Cryptzone FAQ

This document is the Cryptzone Secured eMail reader manual. The Secured eMail reader is also called SEP (Simple Encryption Platform) Client in this document.

To access Cryptzone FAQ please go to http://tech.cryptzone.com/

1.1 Necessary system requirements


All necessary software and system requirements for the installation process of the SEP Client are located in the Appendix section of this document.

1.2 Additional support


If you need additional support for any Cryptzone application, please contact Cryptzone support at; Phone Europe: +46 (0) 31 773 86 93 Phone (UK): +44 800 680 0657 Phone USA/Canada: +1 212 381 2986 Web: www.cryptzone.com/support Email: sep-support@cryptzone.com

3.

Secured eMail

Secured eMail is software that enables you to send emails and attachments securely to any recipient. With the Secured eMail Reader you are able to read secured eMails. To be able to send Secured eMails you will need a valid license and a SEP Client installed.

3.1 How to receive a secured email


1. 2. 3. 4. Double click on the secured email that you have received. If the email is sent from an internal sender, the email will open automatically. Otherwise, proceed to step 3. Enter the shared secret previously communicated to you by the sender. The secured email will open automatically.

3.2 How to manage your secured contacts and view


shared secrets
1. 2. From the Start menu navigate to: All Programs Cryptzone SEP Client SEP Client Settings. The SEP Settings windows will appear. Go to the tab Application Settings Secured eMail Secured Contacts.

Delete contact To delete a secured contact select it and then press the Delete button. View shared secret - To view the shared secret of a contact simply double click the contact.

4.

Install the Secured eMail Reader


4.2 SEP Client InstallShield Wizard: Welcome message

The Secured eMail is also called SEP (Simple Encryption Platform) Client To start the installation double click the setup file SEP Client.exe.

4.1 SEP Client Choose Setup Language

Choose the language for the SEP Client

Read through the Welcome message click Next.

4.3 SEP Client InstallShield Wizard: License Agreement

4.4 SEP Client Installation mode

Choose if you want to install for current users or all users Read through the License agreement. You have to choose I accept the license agreement to enable the Next button. Click Next.

4.5 SEP Client InstallShield Wizard: Setup Type

4.6 SEP Client InstallShield Wizard: Ready to Install the


Program

Choose Complete or Custom type and click Next. If you choose Custom, be sure that you do not exclude the Microsoft O utlook Add-On.

Read through the install message click Install.

4.7 SEP Client InstallShield Wizard: InstallShield Wizard


Completed

4.8 SEP Client desktop icon


When the SEP Client is installed properly a SEP Monitor icon should appear automatically in the system tray. If not, the SEP Client can be reopened through the Start menu.

Click Finish to end the install wizard. If you have a license key, make sure the box Activate the installation now is checked.

5.

License Registration

To activate your product you need to input a license key to the SEP Client Settings. To open SEP Client Settings go to bottom left corner of the computer and Press the Start button - All Programs - Cryptzone SEP Client and choose SEP Client Settings.

Enter your license key together with your name, company and email address in the fields and press Save.

Once in the SEP Client Settings go to the tab Application Settings -> License Information.

This window will pop up, press Yes to register your license (Internet Connection is required)

Your license is now activated.

Verify that your license information is correct and press Register.

In the field for License details you can see which products your current license is valid for. The field License Key has been changed. This is done so that no one can see your original license key.

The SEP Client is now ready to be used.

6. Appendix - System Requirements for Secured eMail Reader


System Components SEP Client Hardware Minimum Requirements

Supported Operating Systems

General Requirements

- Computer/Processor with Pentium 1.5 GHz or higher processor - Memory, 512 MB of RAM

- Windows 2000 - Windows XP - Windows Vista

- Internet connection - Microsoft Internet Explorer 6 or higher - Outlook 2000, 2003, 2007, 2010

- Hard Disk with 50 MB of available hard disk space - Windows 7 - Windows Server 2008

You might also like