They are identified in the X1 platform, which allows you to do specific searches to collect them and run them through additional workflows to go in and maybe unencrypt them or break the passwords on them. But X1 distributed discovery is able to identify them and in the workflow collect them for additional work flow process. [Mel X1]