Follow these steps to decrypt an MEO file.
For the IT Professional - Encrypt Files for Recipient (Lean Method)
When it comes to encrypting file(s) and having a recipient open the file successfully isn't always as transparent as it could be. The mention of "I am sending you an encrypted file" generally raises the eyebrows of any novice and even IT Pros! However, the following tool from NCH Software named "MEO Encryption" http://www.nchsoftware.com/encrypt has proven to me a real winner for the ease of use. The benefit of this application is that the recipient of the file(s) does not need to install ANY software, they just need to provide the correct password which you create and provide them via another communication. The software provides Blowfish and DES encryption which isn't the strongest algorithms for today for long term storage, however the key is long enough to feel very secure for a file transfer. There are many worse encryption strategies, better to be somewhat secure than not at all!
Install the software and use the following methods for guidance.
For the Recipient - Decrypt MEO File
Microsoft on Tuesday announced the general availability of its phone sign-in for customers with Microsoft accounts -- a system that could be the beginning of the end for passwords.
This is a screenshot of the accounts section from within my iPhone application.
Its been best practice to disable SMBv1-x since 2003, however doing so will compromise your ability to use file shares, etc. The following process will Disable what is commonly called SMB or NetBios and secure your client while still maintinaing file services.
Do not use the GPO Computer Configuration > Policies > Windows ettings > Security Settings > Windows Firewall with dvanced Security > Global Settings and the inbound/outbound preconfigured rule "File and Print Sharing (......)". This setting will open the following ports:
Instead create a rule for just 445 to the file server inbound/outbound. This will limit the SMB footprint and without the Spooler, NB-Datagram, NB-Name, NS-Session, and SMB combination, you can limit the security threat significantly. Also unless you have a need for NetBT (like legacy clients on the domain) you might want to think about disabling NetBT:
You can do this via GPO using a syntax startup approach - http://coryretherford.com/Lists/Posts/Post.aspx?ID=365
Attached are the Group Policy Settings Reference policy settings for computer and user configurations that are included in the Administrative template files (.admx and .adml). This spreadsheet helps identifying policy settings when using the Group Policy Management Console (GPMC) to edit Group Policy Objects (GPOs).
Create script file and push script through logon script.
You will have two options for setup; Automatic and Manual.
If you have been provided a Symantec Mobile Encryption configuration file, slect this option. If not proceed with the manual setup.
Symantec Mobile Encryption for iOSCreate Symantec Mobile iOS configuration file - You can use the same configuration file created for the iOS device can be used for various Adndroid devices and Operating Systems.
The following includes the steps to create your TLS Deep Security Management website console an authentication certificate in a Windows environment.
Running the following installation requires command-line access to the Symantec Encryption Management Server (SEMS) using its user interface or via SSH - www.symantec.com/docs/TECH171773
Power on the server and push Page Up or Down immediately to force the Linux book menu options.
Note* For you non-linux Users Linux is case sensitive so make sure to maintain the upper/lower case. You will get an Error if you miss the case sensitivity.
Here are some useful commands - https://support.symantec.com/en_US/article.TECH149336.html