Getting started

Enterprise Shield adds a powerful layer of security and compliance controls on top of Lucid’s secure platform. If you’ve just purchased Enterprise Shield and want to get up and running quickly, here are some easy wins to start protecting your account today.

Step 1: Appoint a Shield admin

Assign someone as your Shield admin: This person will have access to all Enterprise Shield settings and features. This role will own security setup, ongoing monitoring, and enforcement. This role will provide access to all documents on the account and is typically assigned to senior members of security or legal teams.

Step 2: Get value today through these security features

Start by turning on these quick features that add immediate security and content protection with minimal impact to your users.

  • Content inspection: Enable content inspection to automatically scan all documents for sensitive data. This inspection runs silently in the background without disrupting users. We recommend customizing your policy to scan for the sensitive categories and infotypes that matter most to your account. For example, turn off “person name” in the PII sensitive category if you want to limit the number of results in the first scan. You can always turn that infotype back on should you want to review, and the results will be immediate. 
  • Discovery search: Quickly search and review all documents on your account. Take actions, such as changing the classification level or revoking external shares, on individual documents or documents in bulk. 
  • Idle session time-out and max session time-out: Configure session timeouts to automatically log out inactive users and reduce exposure risks by limiting the length of active sessions.
  • Key Management Service (KMS): Turn on KMS to add an extra layer of encryption to your data.
  • IP allow list: Restrict access to your account by allowing only approved IP address ranges.

Step 3: Accelerate value tomorrow

Once the fast controls are enabled, line up resources and prepare to implement these important features for stronger governance.

  • Require classifications: Bolster compliance by enforcing classification for all documents.
  • Block personal accounts: Allow only users from your approved Lucid account(s) to access Lucid products from within your corporate network, blocking all personal or unmanaged accounts.
  • Accessing external documents and folders: Block users on your Lucid account from accessing documents and folders owned by external users, or specify which domains and users they are allowed to access content from.

Step 4: Customize your setup for future value

Tailor Enterprise Shield features to your organization’s specific needs.

  • Customize classifications: If your account has known data classifications (e.g., confidential, internal), set these up now to help control access and sharing of Lucid documents.
  • Set up classification controls and auto-classification: To manage sensitive content, set up classification controls and enable auto-classification. Based on classification levels, you can restrict actions like sharing or printing and link content inspection results to those levels. For example, automatically classify a document as “Private” if GDPR data is detected.
  • Organizational group sharing settings: Customize advanced sharing settings at the organizational group level.
  • Document retention: Set up an automated policy to delete documents based on specified criteria.

Bonus tips for compliance and governance

Use these features as needed to prepare your organization for regulatory compliance.

  • Audit logs: Enable and review detailed logs of user activity to assist with security monitoring and compliance investigations. We recommend pulling audit logs into your SIEM using our SIEM connection script.
  • Legal hold APIs: Protect critical documents from getting deleted during legal proceedings.
  • Document management APIs: Access all document and folder details via specific endpoints.

Looking for a more comprehensive walkthrough? Schedule a one-hour implementation session with your Lucid account team to get detailed guidance on these steps and tailor the rollout to your organization.

Note: These guides are here to help you get the most out of Enterprise Shield, but are not intended to address all scenarios or compliance requirements. You’re in the best position to decide how to configure your settings to ensure they meet your specific security and privacy needs.

Additional guides

How to protect against data exfiltration

Protect sensitive documents from being accessed, copied, or shared without authorization.

Learn more

How to control and monitor document access

Manage inbound and outbound sharing with external users.

How to bolster regulatory compliance

Find and access all documents on your account, and preserve key documents relevant to litigation.

How to obtain your own encryption keys

Get more info about Lucid Key Management Service (KMS), which allows customers to manage the encryption keys securing their data.

How to automate document management and security

Build custom scripts to change document permissions in bulk, archive documents, or generate custom reports.

How to manage session duration and control access

Balance security through session time-outs and an IP allow list.

How to monitor, investigate, and respond to incidents

Take advantage of audit logs and revision history to reconstruct a timeline of events for incident management.

Collaborate more securely with Enterprise Shield

Contact sales

Get Started

  • Enterprise
  • Contact Sales
  • Pricing
PrivacyLegalCookie privacy choicesCookie policy
  • LinkedIn
  • Twitter
  • Instagram
  • Facebook
  • YouTube
  • Glassdoor
  • TikTok

© 2026 Lucid Software Inc.