background image

Sentry ONE User Guide

Restoring On-Board Applications

You can restore on-board applications installed by Ironkey EMS if they are ever erased or become

corrupt (Windows only).

1. Unlock your device and click

Settings

on the menu bar of the DataLocker Control Panel.

2. Click

Tools

in the left sidebar. Under Device Health, click

Restore Onboard Apps

.

Using ZoneBuilder In SafeConsole

If enabled by your System Administrator, ZoneBuilder is a SafeConsole tool used to create a Trusted
Zone of computers. It can be used to restrict device access to computers within the Trusted Zone
and, if enabled, can automatically unlock your device, which eliminates the need to enter your
password.

If your administrator chooses to enable this policy, you may be required to trust the account.

Trusting the account:

1. Unlock your device and click

Settings

in the DataLocker Control Panel.

2. Click

Zone Builder

on the left sidebar.

3. Click

Trust This Account

. Your account will now show up in the Trusted Accounts box.

Your account is now in the Trusted Zone of computers. Depending on the policy set by your System
Administrator, you may have restricted device access outside of the Trusted Zone or when offline.
Your device may also be set to automatically unlock on trusted computers.

To remove a trusted account, simply highlight the account you wish to remove and click

Remove

.

Using My Device On Linux

You can use your device on several distributions of Linux. There are two executables in the linux

folder, Unlocker_32.exe and Unlocker_64.exe. For this guide, replace Unlocker_xx.exe with the
executable that is compatible with your system.

The device must be previously set up using a Windows or macOS operating system. See

Setting Up

My Device

for more information. Some Managed device policies, set by the System Administrator,

may restrict usage of the device to systems only running Windows or macOS operating systems.

Using The Unlocker

Use the Unlocker_xx.exe for Linux to access your files. Depending on your Linux distribution, you may
need root privileges to use the program Unlocker_xx.exe found in the Linux folder of the mounted
public volume. By default, most Linux distributions will append the execute bit to .exe files on a fat32
partition. Otherwise the execute bit must be manually set before running by using the following
commands.

• chmod +x Unlocker_32.exe
• chmod +x Unlocker_64.exe

© Copyright DataLocker Inc.

15

Summary of Contents for Sentry ONE Managed

Page 1: ...Sentry ONE User Guide version 6 1 DataLocker Inc April 2018 Sentry ONE Standard and Managed 1...

Page 2: ...About My Device 12 Editing The Applications List 13 Resetting My Device 13 Using My Device Managed Only Features 14 Accessing My Device If I Forget My Password 14 Scanning My Device For Malware 14 Re...

Page 3: ...latory requirements Hardware Encryption The Cryptochip in your device protects your data with the same level of protection as highly classified government information This security technology feature...

Page 4: ...el Specification Details Capacity 4GB 8GB 16GB 32GB 64GB 128GB Speed USB 3 0 4GB 80MB s read 12MB s write 8GB 16GB 165MB s read 22MB s write 32GB 250MB s read 40MB s write 64GB 128GB 250MB s read 85MB...

Page 5: ...etting up the device Setting Up My Device To ensure there is ample power provided to the Sentry ONE encrypted USB drive insert it directly into a USB 2 0 3 0 port on a notebook or desktop Avoid connec...

Page 6: ...Ironkey EMS or SafeConsole Administrator Ironkey EMS and SafeConsole require a device license for activation License sold separately For information on how to initialize a Sentry ONE Managed see Sett...

Page 7: ...e from your System Administrator start the DataLocker Control Panel and click Settings Gear Icon See the DataLocker Control Panel for more information 2 In the left sidebar click Tools then click Mana...

Page 8: ...Continue The requirements of this password will depend on the policy selected by your administrator 3 Choose a Secure Volume File System see Formatting My Device and click Continue 4 The device will n...

Page 9: ...wing To open a file double click the file on the PRIVATE USB drive To save a file drag the file from your computer to the PRIVATE USB drive Hint You can also access your files by right clicking the Da...

Page 10: ...ng to force the device to lock doing so can result in loss of data to any open and unsaved files If your files have become corrupt from a forced lock procedure or from unplugging the device before loc...

Page 11: ...rder This helps protect against screen loggers Note When you click a key in the Virtual Keyboard all of the keys briefly go blank This feature prevents screen loggers from capturing what you clicked T...

Page 12: ...sidebar 3 Under Device Health select the file format and click Reformat Secure Volume Finding Information About My Device Use the Capacity Meter located at the bottom right of the DataLocker Control...

Page 13: ...s Right click the application or file and choose the action from the menu To sort or change the way icons appear in the list Right click anywhere in the Application list and choose Large Icons List Ti...

Page 14: ...ds provided then click Change Password Scanning My Device For Malware If enabled by your System Administrator the Malware Scanner is a self cleaning technology that detects and removes malware on your...

Page 15: ...tor you may have restricted device access outside of the Trusted Zone or when offline Your device may also be set to automatically unlock on trusted computers To remove a trusted account simply highli...

Page 16: ...mount external SCSI and USB devices Some distributions do not mount automatically and require the following command to be run mount dev name of the device media mounted device name The name of the mou...

Page 17: ...2 this device must accept any interference received including interference that may cause undesired operation This equipment has been tested and found to comply with the limits for a Class B digital...

Reviews: