Once you have authenticated, on-the-fly decryption and encryption is enabled and your computer will continue with the normal startup process, which will look and behave exactly as before.While you are logged into your system, all applications, including email and other network software, run unaffected.