background image

Sentry ONE User Guide

Specification

Details

OS Compatibility

Windows 10, Windows 8.1, Windows 7 (SP1)
macOS v.10.9.x-10.13.x
Linux 2.6.x***

Accessibility

DataLocker Control Panel is designed to be Section 508
compliant. Users with disabilities have keyboard navigation
and screen reader support.

Warranty

2 Years Limited

Designed and assembled in the U.S.A., Sentry ONE devices do not require any software or drivers to
be installed.

* Advertised capacity is approximate. Some space is required for onboard software.
** Speed varies with host hardware, software, and usage.
*** Limited Feature Set. No online management features.

Recommended Best Practices

1. Lock the device:

• when not in use
• before unplugging it
• before the system enters sleep mode

2. Never unplug the device when the LED is lit.

3. Never share your device password.

4. Perform a computer anti-virus scan before setting up the device.

Setting Up My Device

To ensure there is ample power provided to the Sentry ONE encrypted USB drive, insert it directly
into a USB 2.0/3.0 port on a notebook or desktop. Avoid connecting it to any peripheral devices
that may feature a USB port, such as a keyboard or USB-powered hub. Initial setup of the device
must be done on a supported Windows or macOS based operating system.

Device Access (Windows Environment)

1. Plug the Sentry ONE encrypted USB drive into an available USB port on the notebook or

desktop and wait for Windows to detect it.

• Windows 7/8.1/10 users will receive a device driver notification.
• Once the new hardware detection is complete, Windows will prompt to begin the

initialization process.

2. Select the option

Unlocker.exe

inside of the Unlocker partition that can be found in File Explorer.

Please note that the partition letter will vary based on the next free drive letter. The drive letter
may change depending on what devices are connected. In the image below, the drive letter
is E:.

© Copyright DataLocker Inc.

5

Summary of Contents for Sentry ONE Managed

Page 1: ...Sentry ONE User Guide version 6 1 DataLocker Inc April 2018 Sentry ONE Standard and Managed 1...

Page 2: ...About My Device 12 Editing The Applications List 13 Resetting My Device 13 Using My Device Managed Only Features 14 Accessing My Device If I Forget My Password 14 Scanning My Device For Malware 14 Re...

Page 3: ...latory requirements Hardware Encryption The Cryptochip in your device protects your data with the same level of protection as highly classified government information This security technology feature...

Page 4: ...el Specification Details Capacity 4GB 8GB 16GB 32GB 64GB 128GB Speed USB 3 0 4GB 80MB s read 12MB s write 8GB 16GB 165MB s read 22MB s write 32GB 250MB s read 40MB s write 64GB 128GB 250MB s read 85MB...

Page 5: ...etting up the device Setting Up My Device To ensure there is ample power provided to the Sentry ONE encrypted USB drive insert it directly into a USB 2 0 3 0 port on a notebook or desktop Avoid connec...

Page 6: ...Ironkey EMS or SafeConsole Administrator Ironkey EMS and SafeConsole require a device license for activation License sold separately For information on how to initialize a Sentry ONE Managed see Sett...

Page 7: ...e from your System Administrator start the DataLocker Control Panel and click Settings Gear Icon See the DataLocker Control Panel for more information 2 In the left sidebar click Tools then click Mana...

Page 8: ...Continue The requirements of this password will depend on the policy selected by your administrator 3 Choose a Secure Volume File System see Formatting My Device and click Continue 4 The device will n...

Page 9: ...wing To open a file double click the file on the PRIVATE USB drive To save a file drag the file from your computer to the PRIVATE USB drive Hint You can also access your files by right clicking the Da...

Page 10: ...ng to force the device to lock doing so can result in loss of data to any open and unsaved files If your files have become corrupt from a forced lock procedure or from unplugging the device before loc...

Page 11: ...rder This helps protect against screen loggers Note When you click a key in the Virtual Keyboard all of the keys briefly go blank This feature prevents screen loggers from capturing what you clicked T...

Page 12: ...sidebar 3 Under Device Health select the file format and click Reformat Secure Volume Finding Information About My Device Use the Capacity Meter located at the bottom right of the DataLocker Control...

Page 13: ...s Right click the application or file and choose the action from the menu To sort or change the way icons appear in the list Right click anywhere in the Application list and choose Large Icons List Ti...

Page 14: ...ds provided then click Change Password Scanning My Device For Malware If enabled by your System Administrator the Malware Scanner is a self cleaning technology that detects and removes malware on your...

Page 15: ...tor you may have restricted device access outside of the Trusted Zone or when offline Your device may also be set to automatically unlock on trusted computers To remove a trusted account simply highli...

Page 16: ...mount external SCSI and USB devices Some distributions do not mount automatically and require the following command to be run mount dev name of the device media mounted device name The name of the mou...

Page 17: ...2 this device must accept any interference received including interference that may cause undesired operation This equipment has been tested and found to comply with the limits for a Class B digital...

Reviews: