Enterprise Shield guides
Learn from Lucid’s security-first approach on how to set up your Enterprise Shield add-on for success and enhanced protection.


Getting started
If you’ve just purchased Enterprise Shield, learn some essential first steps to protecting your account.

How to protect against data exfiltration
Protect sensitive documents from being accessed, copied, or shared without authorization.

How to control and monitor document access
Manage inbound and outbound sharing with external users.

How to bolster regulatory compliance
Find and access all documents on your account, and preserve key documents relevant to litigation.

How to obtain your own encryption keys
Get more info about Lucid Key Management Service (KMS), which allows customers to manage the encryption keys securing their data.

How to automate document management and security
Build custom scripts to change document permissions in bulk, archive documents, or generate custom reports.

How to manage session duration and control access
Balance security through session time-outs and an IP allow list.

How to monitor, investigate, and respond to incidents
Take advantage of audit logs and revision history to reconstruct a timeline of events for incident management.