background image

Sentry ONE User Guide

Changing The Unlock Message

The Unlock Message is custom text that displays in the Unlocker window when you unlock the
device. This feature allows you to customize the message that displays. For example, adding
contact information will display information on how a lost drive can be returned to you. For
Managed devices, this feature may or may not be enabled by your System Administrator.

To change the Unlock Message:

1. In the DataLocker Control Panel, click

Settings

on the menu bar.

2. Click

Preferences

in the left sidebar.

3. Type the message text in the Unlock Message field. The text must fit in the space provided

(approximately 7 lines and 200 characters).

Locking The Device

Lock your device when you are not using it to prevent unwanted access to your secure files on the
drive. You can manually lock the device or you can set the device to automatically lock after a
specified period of inactivity. For Managed devices, this feature may or may not be enabled by
your System Administrator.

Caution:

By default, if a file or application is open when the device tries to auto-lock, it will not

force the application or file to close. Although you can configure the auto-lock setting to force the
device to lock, doing so can result in loss of data to any open and unsaved files.

If your files have become corrupt from a forced lock procedure or from unplugging the device
before locking, you might be able to recover the files by running CHKDSK and using data recovery
software (Windows only).

To manually lock the device:

1. Click

Lock

in the bottom left-hand corner of the DataLocker Control Panel to safely lock your

device.

• You can also use the keyboard shortcut:

CTRL + L

(Windows only), or right-click the

DataLocker Icon

in the system tray and click

Lock Device

.

Note:

Managed devices will automatically lock during use if an administrator remotely disables

the device. You will not be able to unlock the device until the System Administrator re-enables the
device.

To set a device to automatically lock:

1. Unlock your device and click

Settings

on the menu bar in the DataLocker Control Panel.

2. Click

Preferences

in the left sidebar.

3. Click the

Checkbox

for auto-locking the device and set the time-out to one of the following

time intervals: 5, 15, 30, 60, 120, or 180 minutes.

To run CHKDSK (Windows only):

1. Unlock the device.

2. Press the WINDOWS LOGO KEY + R to open the Run prompt:

3. Type CMD and press ENTER.

4. From the command prompt, type CHKDSK, the PRIVATE USB drive letter, then “/F /R”. For

example, if the PRIVATE USB drive letter is G, you would type: CHKDSK G: /F /R

© Copyright DataLocker Inc.

10

Summary of Contents for Sentry ONE Managed

Page 1: ...Sentry ONE User Guide version 6 1 DataLocker Inc April 2018 Sentry ONE Standard and Managed 1...

Page 2: ...About My Device 12 Editing The Applications List 13 Resetting My Device 13 Using My Device Managed Only Features 14 Accessing My Device If I Forget My Password 14 Scanning My Device For Malware 14 Re...

Page 3: ...latory requirements Hardware Encryption The Cryptochip in your device protects your data with the same level of protection as highly classified government information This security technology feature...

Page 4: ...el Specification Details Capacity 4GB 8GB 16GB 32GB 64GB 128GB Speed USB 3 0 4GB 80MB s read 12MB s write 8GB 16GB 165MB s read 22MB s write 32GB 250MB s read 40MB s write 64GB 128GB 250MB s read 85MB...

Page 5: ...etting up the device Setting Up My Device To ensure there is ample power provided to the Sentry ONE encrypted USB drive insert it directly into a USB 2 0 3 0 port on a notebook or desktop Avoid connec...

Page 6: ...Ironkey EMS or SafeConsole Administrator Ironkey EMS and SafeConsole require a device license for activation License sold separately For information on how to initialize a Sentry ONE Managed see Sett...

Page 7: ...e from your System Administrator start the DataLocker Control Panel and click Settings Gear Icon See the DataLocker Control Panel for more information 2 In the left sidebar click Tools then click Mana...

Page 8: ...Continue The requirements of this password will depend on the policy selected by your administrator 3 Choose a Secure Volume File System see Formatting My Device and click Continue 4 The device will n...

Page 9: ...wing To open a file double click the file on the PRIVATE USB drive To save a file drag the file from your computer to the PRIVATE USB drive Hint You can also access your files by right clicking the Da...

Page 10: ...ng to force the device to lock doing so can result in loss of data to any open and unsaved files If your files have become corrupt from a forced lock procedure or from unplugging the device before loc...

Page 11: ...rder This helps protect against screen loggers Note When you click a key in the Virtual Keyboard all of the keys briefly go blank This feature prevents screen loggers from capturing what you clicked T...

Page 12: ...sidebar 3 Under Device Health select the file format and click Reformat Secure Volume Finding Information About My Device Use the Capacity Meter located at the bottom right of the DataLocker Control...

Page 13: ...s Right click the application or file and choose the action from the menu To sort or change the way icons appear in the list Right click anywhere in the Application list and choose Large Icons List Ti...

Page 14: ...ds provided then click Change Password Scanning My Device For Malware If enabled by your System Administrator the Malware Scanner is a self cleaning technology that detects and removes malware on your...

Page 15: ...tor you may have restricted device access outside of the Trusted Zone or when offline Your device may also be set to automatically unlock on trusted computers To remove a trusted account simply highli...

Page 16: ...mount external SCSI and USB devices Some distributions do not mount automatically and require the following command to be run mount dev name of the device media mounted device name The name of the mou...

Page 17: ...2 this device must accept any interference received including interference that may cause undesired operation This equipment has been tested and found to comply with the limits for a Class B digital...

Reviews: