The Decrypt action is used to decrypt one or more files. It supports passphrases or public/private key encryption. PGP is also supported provided it is installed on the system.
From the Task Builder Available Actions pane, open the Cryptography folder and double-click the Decrypt action or drag it into the Steps pane.
In the Source box,
click the Open Folder button and
navigate to the file to be decrypted.
To specify more than one source file
Select one file in the source folder and click Open.
Use a wildcard character, asterisk (*) or question mark (?), to replace text in the file name. For example, use *.DOC to include all files in the selected folder with a .DOC extension.
Use the Options and Attributes tabs (see below) to enter specific file selection properties.
In the Destination
box, click the Open Folder
button , navigate to the destination folder, enter a file name, and
click Save. If you want the decrypted
files to replace the source files, make the entry match the Source
entry, and select Overwrite if exists
in the Options tab (see below). You can include additional subfolders in the path.
Folders that do not exist will be created at runtime provided the logged-on
user has the rights to do so.
For multiple files
Use a wildcard character, asterisk (*) or question mark (?), to replace text in the file name. For example, C:\DestinationFolder\*Encrypted.DOC.
In the Type box, select the type of encryption: Passphrase, Public/Private Key, PGP Passphrase, PGP Public/Private Key. (PGP can only be used if it is already installed on your system.)
Enter or select the applicable properties.
Algorithm: For passphrase encryption, select the algorithm used.
Passphrase: Enter the passphrase used to encrypt the files.
Key file: Click the Open Folder button , navigate to the private key file, and click Open.
To enter file selection properties for multiple files
Click the Options tab and select or clear the check boxes according to the following guidelines:
Include subfolders: includes the subfolders of the selected source folder. If this is not selected, the files stored directly in the selected source folder are decrypted and the subfolders are ignored.
Preserve folder structure: maintains the folder structure for the subfolders as it exists in the source location. If this is not selected, files from the subfolders are placed directly into the destination folder.
Overwrite if exist: overwrites any existing files in the destination location that have the same names as the specified destination files. If this is not selected, files that already exist are skipped.
Only if newer: overwrites files only if the source file is newer than the destination file.
Only if exists in destination: decrypts only files that already exist in the destination location. All other files in the selected source folder are ignored.
Overwrite read-only files: overwrites files that are marked read-only. If this is not selected read-only files are skipped.
Overwrite hidden files: overwrites files marked hidden. If this is not selected, hidden files are skipped.
Turn archive attribute off: turns off the Windows archive attribute in the source files. This indicates to many backup programs that the file has already been backed up.
In the Exclude mask box, enter the names of
any files or folders within the selected source folder that you want to
exclude from the action. You can use asterisk (*) and question mark (?)
as wildcard characters. Separate multiple entries with a pipe symbol (|).
Select the Regular expression check box, to use a regular expression in the Exclude mask box.
To exclude files from the action based on date, select the Only if newer than or Only if older than check boxes. Then use the date and time boxes to select the desired date and time. You can also click the Custom button and select a limiter such as Last 24 hours, or you can select Expression and enter an expression.
To limit the action according to file attributes, click the Attributes tab and then select On or Off for any attributes that you want used as criteria in the file selection. The default is Doesn't matter, which means the attribute will be ignored. The attributes to select from are: Read-only, Archive, System, Hidden, Compression, and Encrypted.
If you want to use a custom description, click the Description tab, select Use custom step description, and type the description. This description will display in the Steps pane in place of the default description.
To set error handling, refer to Step Error Handling.
Click OK when finished.
Adding Task Steps