This article details what happens to PGP software after a subscription or maintenance license expires.
A license is used within the PGP software to enable the functionality you purchased, and sets the expiration of the software. Depending on the license you have, some or all of the PGP Desktop family of applications will be active. Once you have entered the license, you must then authorize the software with PGP Corporation, either manually or online.
PGP Universal ServerPGP Universal Server enters learn mode once a subscription license expires. PGP Universal Server will decrypt emails if operating in a Gateway deployment or when processing mail. However, email passing through the PGP Universal Server will not be encrypted. Internal Users can still be created on the PGP Universal Server, but no email encryption will be performed for the users.
PGP Desktop configured installations will still be allowed to enroll and receive policy updates, however all functionality e.g., email encryption is disabled.
PGP DesktopWhole Disk Encryption: You will receive warnings that your license has expired and any disks encrypted with PGP Whole Disk Encryption will automatically decrypt after 90 days.
PGP Virtual Disk: PGP Virtual Disks are still accessible in Read-Only mode. Read-Only will allow data to be copied out of a PGP Virtual Disk, however no data can be added to the PGP Virtual Disk.
PGP NetSharePGP NetShare protected folders can be accessed however the protected files remain encrypted and when viewed will display cipher text. To view the encrypted files, manually decrypt the folders and files by using the PGP Tray icon.)
- New PGP NetShare protected folders cannot be created.
- Files moved into a protected folder are not encrypted.
- Keys cannot be added or removed from PGP NetShare protected folders.
PGP Command LineSubscription License
After a PGP Command Line subscription license expires, all functionality is immediately disabled. No Encryption/Signing or Decryption/Verifying is performed until a valid license number has been entered into the software.
Rate this Article