background image

Sentry ONE User Guide

A SafeConsole Connection Token will be needed. The SafeConsole Connection Token is obtained

by the System Administrator through the Quick Connect Guide, located inside of the SafeConsole
user interface.

Users without access to a Management Server, please contact sales:

sales@datalocker.com

/

(913)310-9088

1. Enter the SafeConsole Connection Token that is obtained in the steps above. Review the

license agreement, check the checkbox to accept it, and click

Activate

in the bottom

left-hand corner.

Optionally Enabled Policies

- These policies may or may not be enabled by your System

Administrator. They will appear during device registration if they have been enabled.

Confirm Ownership of the device: Enter the Windows username and password that is
associated with the login credentials of the computer the device is plugged into.

Custom Device Information: Required information about you or your device. The
required fields will vary.

Unique User Token: This token is directly associated with the end user’s account and

will be provided by the System Administrator.

Administrator Registration Approval: The System Administrator may require their ap-
proval to proceed with device registration.

2. Enter a secure Password and Confirm it. Once the password created meets the requirements

listed to the right side of the input fields, click

Continue

. The requirements of this password will

depend on the policy selected by your administrator.

3. Choose a Secure Volume File System (see

Formatting My Device

) and click

Continue

.

4. The device will now finalize the setup process and be ready for use. Access the Encrypted

Storage by clicking the

Folder Icon

in the top menu. The settings of the device can be

accessed and altered by clicking the

Gear Icon

. See the

DataLocker Control Panel

for more

information.

Setting Up A Managed Device With Ironkey EMS

The initialization process will begin by allowing the device to be ready to communicate with the
Ironkey EMS server.

An Ironkey EMS Activation Code will be needed. The Ironkey EMS Activation Code is obtained by

the System Administrator through the Ironkey EMS Console. This code can also be emailed to the
end user.

Users without access to a Management Server, please contact sales:

sales@datalocker.com

/

(913)310-9088

1. Enter the Ironkey EMS Activation Code that is obtained in the steps above. Review the license

agreement, check the checkbox to accept it, and click

Activate

in the bottom left-hand

corner.

2. Enter a secure Password and Confirm it. Once the password created meets the requirements

listed to the right side of the input fields, click

Continue

.

3. Depending on the policy created by your System Administrator, you may be required to create

an Online Account. An email will be provided to the end user with the instructions on how to
create an online account. After the account has been confirmed, click

OK

.

© Copyright DataLocker Inc.

8

Summary of Contents for Sentry ONE Managed

Page 1: ...Sentry ONE User Guide version 6 1 DataLocker Inc April 2018 Sentry ONE Standard and Managed 1...

Page 2: ...About My Device 12 Editing The Applications List 13 Resetting My Device 13 Using My Device Managed Only Features 14 Accessing My Device If I Forget My Password 14 Scanning My Device For Malware 14 Re...

Page 3: ...latory requirements Hardware Encryption The Cryptochip in your device protects your data with the same level of protection as highly classified government information This security technology feature...

Page 4: ...el Specification Details Capacity 4GB 8GB 16GB 32GB 64GB 128GB Speed USB 3 0 4GB 80MB s read 12MB s write 8GB 16GB 165MB s read 22MB s write 32GB 250MB s read 40MB s write 64GB 128GB 250MB s read 85MB...

Page 5: ...etting up the device Setting Up My Device To ensure there is ample power provided to the Sentry ONE encrypted USB drive insert it directly into a USB 2 0 3 0 port on a notebook or desktop Avoid connec...

Page 6: ...Ironkey EMS or SafeConsole Administrator Ironkey EMS and SafeConsole require a device license for activation License sold separately For information on how to initialize a Sentry ONE Managed see Sett...

Page 7: ...e from your System Administrator start the DataLocker Control Panel and click Settings Gear Icon See the DataLocker Control Panel for more information 2 In the left sidebar click Tools then click Mana...

Page 8: ...Continue The requirements of this password will depend on the policy selected by your administrator 3 Choose a Secure Volume File System see Formatting My Device and click Continue 4 The device will n...

Page 9: ...wing To open a file double click the file on the PRIVATE USB drive To save a file drag the file from your computer to the PRIVATE USB drive Hint You can also access your files by right clicking the Da...

Page 10: ...ng to force the device to lock doing so can result in loss of data to any open and unsaved files If your files have become corrupt from a forced lock procedure or from unplugging the device before loc...

Page 11: ...rder This helps protect against screen loggers Note When you click a key in the Virtual Keyboard all of the keys briefly go blank This feature prevents screen loggers from capturing what you clicked T...

Page 12: ...sidebar 3 Under Device Health select the file format and click Reformat Secure Volume Finding Information About My Device Use the Capacity Meter located at the bottom right of the DataLocker Control...

Page 13: ...s Right click the application or file and choose the action from the menu To sort or change the way icons appear in the list Right click anywhere in the Application list and choose Large Icons List Ti...

Page 14: ...ds provided then click Change Password Scanning My Device For Malware If enabled by your System Administrator the Malware Scanner is a self cleaning technology that detects and removes malware on your...

Page 15: ...tor you may have restricted device access outside of the Trusted Zone or when offline Your device may also be set to automatically unlock on trusted computers To remove a trusted account simply highli...

Page 16: ...mount external SCSI and USB devices Some distributions do not mount automatically and require the following command to be run mount dev name of the device media mounted device name The name of the mou...

Page 17: ...2 this device must accept any interference received including interference that may cause undesired operation This equipment has been tested and found to comply with the limits for a Class B digital...

Reviews: