DataLocker Sentry K300 Managed User Manual

Encrypted flash drive
Hide thumbs Also See for Sentry K300 Managed:

Advertisement

Sentry K300 Managed User Guide
DataLocker Inc.
March, 2019
Sentry K300 Managed - User Guide
1

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Sentry K300 Managed and is the answer not in the manual?

Questions and answers

Summary of Contents for DataLocker Sentry K300 Managed

  • Page 1 Sentry K300 Managed User Guide DataLocker Inc. March, 2019 Sentry K300 Managed - User Guide...
  • Page 2: Table Of Contents

    DataLocker Control Panel ........
  • Page 3: At A Glance

    1.08 or lower, please use the links below or contact your system administrator to update your device. Because DataLocker is constantly updating its products, the images and text in this manual may vary slightly from the images and text displayed by your Sentry K300. These changes are minor and should not adversely affect the ease of setup.
  • Page 4: Best Practices

    101mm (L) x 22mm (W) x 13mm (H) Weight 30.4g Water Resistant*** IP57 Operating System Compatibility Windows Operating Temperature 0°C - 45°C Storage Temperature -20°C - 60°C Long Term Storage Temperature -20°C - 40°C (More than 1 week) © 2019 DataLocker Inc. All rights reserved.
  • Page 5: Setup

    Auto Lock timeout and Minimum Password length are being defined. Button will function as Up on the Selection and Menu screens. One/Down: Button will function as a one (1) when the password is being entered or © 2019 DataLocker Inc. All rights reserved.
  • Page 6: Unlocking Your Device

    Screen Selection After unlocking your Sentry K300 you will be presented with the following selections. • Connect: The device will connect in normal read/write mode after plugging it into a compati- ble system. © 2019 DataLocker Inc. All rights reserved.
  • Page 7: Changing Device Password

    Windows Explorer or other applications that can save to a removable drive. 1. Unlock your Sentry K300 using the keypad and connect it to your Windows workstation. For more information, see Unlocking Your Device. © 2019 DataLocker Inc. All rights reserved.
  • Page 8: Registering To Safeconsole

    Activate in the bottom left-hand corner. • Optionally Enabled Policies - These policies may or may not be enabled by your System Administrator. They will appear during device registration if they have been enabled. © 2019 DataLocker Inc. All rights reserved.
  • Page 9: Safeconsole Mode

    4. Click the Unlock button shown on the DataLocker Control Panel. 5. The Secure Volume will be mounted to a separate drive letter on your workstation. The Secure Volume can also be accessed by clicking the Folder Icon in the DataLocker Control Panel. © 2019 DataLocker Inc. All rights reserved.
  • Page 10: Datalocker Control Panel

    (Windows only). To manually lock the device: 1. Click Lock in the bottom left-hand corner of the DataLocker Control Panel to safely lock your device. • You can also use the keyboard shortcut: CTRL + L (Windows only), or right-click the DataLocker Icon in the system tray and click Lock Device.
  • Page 11: Features

    Note: The Request automatically checkbox can optionally be enabled by your SafeConsole Administrator. If available, the control panel will automatically try to request more Standalone logins after unlocking on a Windows workstation when checked. © 2019 DataLocker Inc. All rights reserved.
  • Page 12: Password Reset

    On next unlock of the Sentry K300, select Standalone using the keypad to unlock in Standalone Mode. When in Standalone mode, the Unlocker partition will not be mounted to the host computer and the DataLocker Control Panel will not need to be executed. 1. Unlock the device. See Unlocking Your Device for more information.
  • Page 13: Unlocking In Read-Only Mode

    Managed devices can be forced to unlock in a read-only state by an administrator. When working in this mode, the DataLocker Control Panel will display the text Read-Only Mode. In this mode, you cannot perform any operations that involve modifying files on the device. For example, you cannot reformat the device, restore applications or edit the Applications List, or edit files on the drive.
  • Page 14: Device Information

    More information can be obtained after logging into the device and launching the unlocker.exe application. Use the Capacity Meter, located at the bottom right of the DataLocker Control Panel, to see how much storage space is still available on your device. The green bar graph represents how full the device is.
  • Page 15: Scanning My Device For Malware

    1. Unlock your device. The DataLocker Control Panel will appear with the Applications List selected by default. 2. If the DataLocker Control Panel is already open, click Applications on the menu bar to view the Applications List. Do one of the following: •...
  • Page 16: Boot Mode

    Sentry K300 Managed User Guide Trusting the account: 1. Unlock your device and click Settings in the DataLocker Control Panel. 2. Click Zone Builder on the left sidebar. 3. Click Trust This Account. Your account will now show up in the Trusted Accounts box.
  • Page 17: Inactivity Mode

    SafeConsole. Both timers will apply. • Zeroize: Zeroize is disabled in after registering to SafeConsole. Formatting The Sentry K300 Selecting The Correct File System Your device is formatted as NTFS from the factory. © 2019 DataLocker Inc. All rights reserved.
  • Page 18: Reformat Using Datalocker Control Panel

    Reformat Using DataLocker Control Panel To reformat a device: 1. Unlock your device and click Settings on the menu bar of the DataLocker Control Panel. 2. Click Tools on the left sidebar. 3. Under Device Health, select the file format and click Reformat Secure Volume.
  • Page 19 The information provided herein is subject to change without notice. The information contained in this document represents the current view of DataLocker on the issue discussed as of the date of publication. DataLocker cannot guarantee the accuracy of any information presented after the date of publication.

Table of Contents