Skip to main content

Determining Which Ciphers Are Being Used

There are multiple ways to determine which ciphers are in effect for each of your users' connections.

Web Interface

Using the web interface, administrators can view a user's account to review the ciphers in the Connections tab. You can compare this list with the Default Secure Ciphers for each protocol.

CLI Application

You can use the Files.com Command Line App (CLI) to generate a CSV report of your users that are connecting with insecure ciphers.

Get Instant Access to Files.com

The button below will take you to our Free Trial signup page. Click on the white "Start My Free Trial" button, then fill out the short form on the next page. Your account will be activated instantly. You can dive in and start yourself or let us help. The choice is yours.