Activating Encryption Methods

Activate encryption methods you would like to use to encrypt incoming and/or outgoing emails for your domain.

You have activated Email Encryption.

Activate encryption methods you would like to use to encrypt incoming and/or outgoing emails for your domain. Based on the activated encryption methods, you can later define rules for encrypting incoming and outgoing emails for your domain.

  1. Log in to the Control Panel with your administrative credentials.
  2. From the scope selection, select the domain for which you would like to activate Email Encryption.
  3. Navigate to Security Settings > Email Encryption.
  4. Select the tab Encryption Policies.
  5. Under Encryption methods, click on the encryption method you would like to activate.
    Note:

    The encryption method TLS is always activated. You cannot deactivate this encryption method.

    Figure 1: Activate encryption method

    A confirmation window appears.

  6. To confirm the activation of the encryption methods, click on Confirm.
    Figure 2: Confirm activation

    The encryption method is activated. The button of the encryption method will turn light grey.

You have activated an encryption method.

Important:

To apply the activated encryption methods to incoming and/or outgoing emails of your domain, define encryption rules (see Adding a Rule).

No rules can be defined for the encryption method EmiG. EmiG is automatically applied if you have activated the encryption method and the communication partner supports the encryption method.

Note:

If no rule applies to an email, the email is processed as follows:

  • If TLS is supported, the email is encrypted with TLS.
  • If TLS encryption is not possible, the email is sent with SMTP. If you have activated S/MIME and you have the recipient's public key, the email is additionally encrypted with S/MIME.

Based on the activated encryption methods, define rules for encrypting incoming and outgoing emails for your domain (see Adding a Rule). Additionally, in the subjects of encrypted emails, you can refer to the encryption method that was used (see Referring to Encryption Methods in the Subject).