When data is stored by Phoenix, its primary tier security structure remains intact. Permissions, access control lists, and other security settings are not only fully preserved, they are also utilized. Search operations display only data that the operating user is authorized to access. Users do not have access to and do not see data that they did not have permissions to access on while it was on the primary tier.
Phoenix also preserves operating-system specific attributes, such as Windows streams and Mac resource forks. Should a file be retrieved to an operating system that is different from where it originated, Phoenix restores all the file attributes that are supported by the destination OS.