
FIPS 140-2 level 3 Certified
Encrypted USB Flash Drive
TABLE OF CONTENTS
- At A Glance
- Getting Started
- K350 features and configurations
- SilentKill Code
- Registering Your K350 to SafeConsole
- Using a SafeConsole Managed Device
- Formatting Your K350
- Linux Compatibility and Configuration
- Product Specifications
- Notices
At A Glance
Introduction
Congratulations on your purchase of the DataLocker Sentry K350 hardware encrypted USB flash drive.
Although the K350 designed with user friendliness at its core, it is recommended that you review this guide to ensure that you become fully acquainted with your K350 and make the most of all of its features.
General operation of the encryption
Your K350 utilizes a hardware encryption engine to encrypt and decrypt data that you store on the device. When your device powered on, you will authenticate with the onboard system using your password to enable the encryption and then plug into the host and use your data. When you lock, power off or disconnect your device, the data is stored in an encrypted state.
Updating Your Device
Updated software and documentation are freely available for download at our website:
Latest device updates - http://datalocker.com/device-updates
Documentation and support - https://support.datalocker.com
About the K350
The K350 is a password protected, FIPS 140-2 Level 3 certified, encrypted USB drive featuring a screen that streamlines setup and operation. If the K350 is centrally managed, additional layers of organizational control strengthen the portable storage security posture further. Meet the strictest requirements and work with ease anywhere there is USB mass storage. The K350 is the slim and strong addition to DataLocker’s complete portfolio of securely managed solutions, plus it’s backed by a limited 3-year warranty.
Getting Started
1. Press the power button for 3 seconds
2. Create and confirm your password, follow the screen instructions
Press quickly on the number button to navigate all characters available on the button. Pick a proper password Note: Linear and repetitive passwords are not supported and passwords must contain a
MINIMUM of 8 characters. It is recommended that you use a combination of letters, numbers and special characters for your password.
Some examples of invalid passwords are:
‘78901234’, ‘43210987’, ’12345678’, ‘1111111’
3. Connect and start working
Select MENU to access all settings, such as enabling a user login. A white background with black text on a selection denotes the current selection.
To start working with your data in a regular way confirm CONNECT selection and plug the drive into the host USB port as shown on the screen.
The encryption is automatic. The K350 locks when it is unplugged from the host.
General Usage Best Practices - Password, Battery, IP67
Use a strong password, keep it to yourself and be sure to remember it. Remote password resets can be enabled if the device is managed by SafeConsole. If the device is not managed, but there is both a Admin and User role active, the Admin can assist the User to reset their password (while retaining the stored data).
Only connect the K350 to USB ports. The K350 draws the correct amount of current (50mA) from the USB port to charge the integrated Lithium-Ion battery even while in use. If the battery within the device is low, charge it by plugging it into a USB port for 30 minutes before using the drive. If the device is left unused for several months the battery will drain slowly. K350 can also be unlocked using solely the power from the USB-port, should there be an unlikely, unexpected, battery issue.
The K350 is IP67-rated but must be completely dry before connecting to a computer.
K350 features and configurations
Connect Selection Menu
After unlock the Connect Selection Menu is displayed.
READ-ONLY - Connect the device storage as read-only to the host.
BOOT MODE - Boot an installed operating system from the device storage.
MENU - Access the Configration Menu
When the device is managed by SafeConsole the following two options may appear.
SAFECONSOLE - See the section Unlocking in SafeConsole Mode
STANDALONE - If the SafeConsole administrator allows it, the user can utilize Standalone Logins temporarily when unlocking on systems that do not allow the management system control.
Accessing the Configuration Menu
In the Connect Selection you will select and confirm MENU to get to the Configuration Menu.
Login Role Selection
The contents of the Configuration Menu will depend on the role of the current login, the following roles may be available:
ADMIN - The role allows full configuration control on the device, see Configuration Menu Overview.
USER - The User menu is available after creating a user in the administrator menu.
In the example below part of the Admin Configuration Menu options are displayed.
Configuration Menu Overview
Change Password
Available for Login USER/ADMIN
This option allows the to change the current password.
From the configuration menu, select and confirm Change Password.
Enter the new Password and confirm with the Enter-button.
Re-enter the password, confirm with the Enter-button.
Upon successful completion, the device goes back to the configuration menu.
Set User
Available for ADMIN
This allows the administrator to either Enable or Disable a user role. When a user is created your K350 will show a login selection screen upon the next power up. If User is selected upon login, your K350 will force the user to create a user unlock password. The user will use this password to unlock the device. The K350 user has a limited feature set compared to the administrator, see Configuration Menu Overview.
NOTE: The User profile is not available if SafeConsole is enabled for your K350.
Step-by-step Process to Set User
From the configuration menu, select and confirm Set User.
Select Enable and confirm with the Enter-button. In the example disable is selected.
Confirm with the Enter-button. Upon successful completion, the device goes back to the configuration menu.
Step by step process for USER configuration
Power on K350.
Confirm login User (the default selection when the Set User is enabled) with the Enter-button when prompted to select login mode.
Press Enter-button to proceed from the “Please create your password” screen.
Enter the new Password and confirm with the Enter-button.
Re-enter the password to confirm with the Enter-button.
Select and confirm Connect.
Access User data as an Admin
Power on.
Select Admin role, confirm selection with Enter, unlock with the admin password.
Connect. User data is accessible on the private partition.
Assist a user that forgot their password
The scalable method for remote password resets with an audit trail is available when managing K350 with SafeConsole. If the K350 is not centrally managed and a User role is activated, the following procedure can be used.
User forgets password.
Power off/on. Select Admin role, unlock with admin password.
Enter Configuration Menu and select Set User, select and confirm Disable. Power off/on.
Select Admin role, unlock again with Admin password.
Enter Configuration Menu and select Set User, select and confirm Enable. Power off/on.
Select User role, enter and confirm the new User password. Connect to confirm and access your data.
SafeConsole
Available for ADMIN
This option enables SafeConsole management for your K350. SafeConsole is a central management console used to optionally manage K350 devices. Managed K350s require a Connection Token upon initialization. The SafeConsole Connection Token is obtained by the System administrator through the Quick Connect Guide, located inside of the SafeConsole user interface. SafeConsole requires a device license for activation. License sold separately.
Users without access to a Management Server, please contact sales: sales@datalocker.com SafeConsole offers several key features including audit logging, anti-malware services (license sold separately), remote password reset, and more!
Enabling SafeConsole
From the configration menu, Select SafeConsole, confirm with Enter.
Select Enable, confirm with Enter. The device goes back to the configuration menu.
Power off/on.
See Registering your K350 to SafeConsole to complete registration.
Self Destruct
Available for ADMIN
The self destruct action helps prevent brute force attacks by triggering when an individual inputs an incorrect password too many times.
This feature allows the administrator to set a threshold of incorrect password attempts for the K350 before the Self Destruct occurs. The administrator can also configure the self destruct to destroy the data, encryption keys, and settings OR destroy the device (and data) when the defined number of allowed password attempts is reached. The default number of allowed password attempts is 10 and can be increased up to 50 but not lower than 10. When enabling the feature, there are two types of self destruct options to select. Please refer to the below table for more details.
NOTE: Incorrect password attempts from both users and administrators are calculated cumulatively towards the incorrect password attempts self destruct counter. The counter will reset upon correct password attempt.
A. Destroy Device - Your device is killed completely and all device data, encryption keys, passwords are destroyed and cannot be recovered. The device CANNOT be initialized again, the destruction is permanent.
B. Destroy Data (default selection) - Your device is wiped completely and all device data, encryption keys, passwords are destroyed and cannot be recovered. The device needs to go through the initialization process again.
In the Configuration menu select Self Destruct, confirm with Enter.
Select CHANGE or CANCEL to change the maximum allowed incorrect password entries, the default is 10.
Confirm with Enter.
Enter the number of attempts you want, between 10-50. Confirm with Enter.
Select the destruction target, DATA or DEVICE, confirm with Enter.
The device goes back to the Configuration Menu after confirmation.
Brute-Force Self-Destruct Sequence
The message “Incorrect Password”, along with the current incorrect password count, will scroll across the screen each time an incorrect password attempt is made. Press Enter to display device information or press any other button to return to the password entry screen.
After each 5 consecutive incorrect password attempts, the device will power off. Pressing the Power button will allow the user to continue entering passwords.
Provided a limit of attempts that is set to 10, after 7 and 8 consecutive incorrect password attempts, the message “Brute Force detected! All data will be deleted.” will scroll across the screen. After the 9th attempt, the message “Self Destruct will begin with next failed login” will scroll across the screen.
Once the 10th consecutive incorrect password attempt has been made, the device will display “Hack detected. All data has been deleted.” The device will then power off by pressing any button. At this stage either the data and/or device has been destructed. If the data is the target you must now follow the getting started process as shown in the Getting Started and the formatting your K350 section of this manual.
Zeroize Drive
Available for ADMIN
This feature allows the administrator to zeroize the drive. Performing this action deletes all the data, removes the user and administrator passwords. The Data Encryption Key (DEK) will also be wiped and regenerated.
Zeroize will remove the configuration set by the administrator.
How to Zeroize your K350
In the Configuration menu select Zeroize Drive, confirm with Enter. When your device asks for “Zeroize Drive” select Yes, confirm with Enter. Selecting No will cancel the Zeroize process.
select Yes, confirm with Enter. Selecting No will cancel the Zeroize process.
When your K350 shows the “Confirm Delete all drive data?” prompt, select Yes, confirm with Enter. Selecting Cancel will cancel the Zeroize process.
Upon successfully completing the Zeroize process, you will see “Please initialize and reformat the drive”, confirm with Enter to continue.
You must now follow the getting started process as shown in the Getting Started and the formatting your K350 section of this manual.
Strong Password
Available for ADMIN
This feature allows the device administrator to enable the password requirement to be stronger than the default for both ADMIN and USER. When enabled the passwords must have at least one letter, one number and one special character.
In the Configuration Menu select/confirm Strong Password.
Select Enable or Disable, confirm with Enter. The device goes back to the Configuration Menu after the confirmation.
Password Length
The device administrator can use this feature to set the minimum required password length. It can be set between the minimum of 8 to a maximum of 64. Tapping Default will reset the counter to “8”.
In the Configuration Menu select/confirm Password Length.
Select Change or Cancel, confirm with Enter.
Enter the new minimum password length number, between 8 and 64. Confirm with Enter, the device goes back to the Configuration menu after the confirmation.
Auto-Lock Time
Available for ADMIN/USER
This feature is disabled by default but can be enabled by the administrator and the user. Auto-lock will disconnect the drive once it is idle (i.e. zero activity) for the configured amount of time. The amount of idle time required to time out the device is configurable from 10 to 720 minutes.
To enable auto-lock, follow these steps:
Select Auto-Lock Time from the configuration menu, confirm with Enter-button.
Confirm Enable-selection with Enter-button
Enter the desired number of minutes the device can remain unlocked and idle, confirm with Enter-button. The device goes back to the Configuration menu after the confirmation.
Read-Only Mode
Available for ADMIN
Administrators can select the Read-Only Mode to globally enforce the K350 to always unlock in read-only mode. Enabling this option will also enforce read-only access for the User profile (if the user profile is enabled). Once the Read-Only Mode is enabled, data can only be read from the K350 and no data can be written or modified.
To enable Read-Only Mode, follow these steps:
Select Read-Only Mode feature from the configuration menu, confirm with Enter.
Confirm Enable-selection with Enter-button. The device goes back to the Configuration menu after the confirmation.
The administrator and the user can each set Read-Only Mode for a single login by selecting/confirming Read-Only Mode in the Connect Selection Menu after entering their password. The Read-Only Mode in the Configuration Menu will enforce this functionality for every login.
SilentKill Code
Available for ADMIN
A SilentKill code can be set up by the K350 administrator. This code can be entered during the login process instead of the password. When this code is entered, the device will follow the configured Self Destruct process. A brief description of each Self Destruct process can be found below. Please review the Self Destruct portion of this guide for more information.
If Destroy Data is configured, the encryption keys, password(s), and any data on the device is deleted. The SilentKill code then becomes the K350 administrator password.
The device must be reformatted after this process is completed.
If Destroy Device is configured, your K350 will be rendered inoperable after the SilentKill code is used during login.
Generating a SilentKill Cod
Enter the administrator password and navigate to the Configuration menu. See Accessing the Configuration Menu
Select the Change Password option and press the Enter-Button for 5 seconds and then release.
NOTE: Upon release, the device will display a message.
“SILENT KILL CODE THIS CODE IS USED TO IMMEDIATELY INITIATE THE SELF DESTRUCT PROCESS”.
Press the Enter-Button.
Set a Silent Kill Code by entering a desired password.
Confirm the code by re-entering the password.
The device returns to the configuration menu upon completion.
Registering Your K350 to SafeConsole
Before registering your drive to SafeConsole, make sure SafeConsole is enabled on your K350. For more information, see Enabling SafeConsole. The registration process will begin by allowing the device to communicate with the SafeConsole server. The steps needed to register a K350 to SafeConsole will depend on the policies that your SafeConsole administrator is enforcing. Not all options will be shown.
A SafeConsole Connection Token will be needed. The SafeConsole Connection Token is obtained by the SafeConsole administrator through the Quick Connect Guide and is usually sent via email.
Users without access to a Management Server, please contact sales:
sales@datalocker.com / +1(913)310-9088
Power on and unlock. Select Connect. Your K350 will show a “Waiting…” prompt.
On your computer, double-click the “Unlocker” CD drive under “Devices and Drives”. This partition only exists if you have allowed SafeConsole to be enabled.
Upon launch, the “Device Setup” page should appear.
Enter the SafeConsole Connection Token provided by your SafeConsole administrator and confirm the EULA. Click Activate.
Your device will connect to the SafeConsole server.
Optionally Enabled Policies - These policies may or may not be enabled by your SafeConsole administrator. They will appear during device registration if they have been enabled.
Confirm Ownership of the device: Enter the Windows username and password that is associated with the login credentials of the computer the device is plugged into.
Custom Device Information: Required information about you or your device. The required fields will vary.
Unique User Token: This token is directly associated with the end user’s account and will be provided by the SafeConsole administrator usually via email.
Administrator Registration Approval: The SafeConsole administrator may require their approval to proceed with device registration.
Select your desired file system from the “Format” prompt. Click Continue. See Selecting the Correct File System.
After formatting, your device will show the “Control Panel”. See Using a SafeConsole Managed Device for more information.
The “Unlocker” client will generate a Password Recovery Code after your next device unlock. It is recommended that your device be disconnected and reconnected to ensure your Password Recovery Code is saved to the SafeConsole.
Using a SafeConsole Managed Device
Unlocking in SafeConsole Mode
Once the K350 is registered to SafeConsole, the Secure Volume can be accessed by following the steps below:
Log into your K350. Your K350 will show a “Waiting…” prompt.
Select the option Unlocker.exe inside of the Unlocker partition that can be found in File Explorer.
Click the Unlock button shown on the DataLocker Control Panel.
The Secure Volume will be mounted to a separate drive letter on your workstation. The Secure Volume can also be accessed by clicking the Folder Icon in the DataLocker Control Panel.
Locking Your Managed K350
Lock your device when you are not using it to prevent unwanted access to your secure files on the drive. You can manually lock the device or you can set the device to automatically lock after a specified period of inactivity.
If a file or application is open when the device tries to auto-lock, it will not force the application or file to close.
Manually Locking your K350
Click Lock in the bottom left-hand corner of the DataLocker Control Panel to safely lock your device. You can also use the keyboard shortcut: CTRL + L (Windows only), or right click the DataLocker Icon in the system tray and click Lock Device.
Unplug K350.
Managed devices will automatically lock during use if an administrator remotely disables the device. You will not be able to unlock the device until the SafeConsole administrator re-enables the device.
Setting your K350 to Automatically Lock
You can configure the device to automatically lock using the K350 onboard menu (See Auto-Lock Time) or by using the Control Panel. If enforced by your SafeConsole administrator, you may be unable to modify this feature. Follow the below steps to configure this automatic lock using the Control Panel.
Changing this setting in the Control Panel will be reflected on the K350 onboard menu and vice versa.
Unlock your device and click Settings on the menu bar in the DataLocker Control Panel.
Click Preferences in the left sidebar.
Click the Checkbox for auto-locking the device and set the time-out to one of the following time intervals: 5, 15, 30, 60, 120, or 180 minutes.
Standalone Logins
Requesting Standalone Logins
Standalone mode allows the Secure Volume of the K350 to be accessed by any computer that has support for removable storage without running the Windows Unlocker application. Standalone mode is controlled by a policy that is set by your SafeConsole administrator. If this mode is not available, please contact them to enable this feature. SafeConsole administrators will define the maximum allowed times your K350 can be unlocked in Standalone mode before the device needs to be returned to a Windows computer to check-in.
To request Standalone logins, perform the following steps on a workstation that has a valid connection to the SafeConsole server:
Unlock K350 and select Connect, confirm with Enter-button. Your K350 will show a “Waiting…” prompt.
Select the option Unlocker.exe inside of the Unlocker partition that can be found in File Explorer.
Click the Unlock button shown on the DataLocker Control Panel.
On the K350 Control Panel, click the -icon to open up settings.
Select the Standalone tab.
Select the reason for the request or enter a custom reason. This information will be sent to the SafeConsole administrator.
Click the Request button. You will receive the maximum number allowed.
The Request automatically checkbox can optionally be enabled by your SafeConsole administrator. When checked, the Control Panel will automatically request the maximum allowed Standalone logins after unlocking on a Windows workstation with a valid connection to SafeConsole.
Using Standalone Logins
On the next unlock of your K350, you can select Standalone after you input your password to unlock in Standalone mode. When in Standalone mode, the Unlocker partition will not be mounted to the host computer and the DataLocker Control Panel will not need to be executed.
Power on.
Select Standalone at the “Login Mode” prompt, confirm with Enter-button.
Confirm with Enter-button when you are prompted with the number of remaining Standalone logins.
Select Connect, confirm with Enter-button to utilize the secure partition.
This will decrease the Currently Available count of Standalone logins by one.
To continue to use your K350 in the normal SafeConsole mode, select SafeConsole in step 2.
The Currently Available number of Standalone logins will be reset to zero if a SafeConsole administrator remotely disables or factory resets your K350. Currently available will also be set back to zero after a password reset or when the device is blocked by GeoFence.
Password Reset
If your K350 cannot be unlocked due to a forgotten password, a recovery password can be sent by your SafeConsole administrator.
Power on K350 and input the recovery password.
Once the password is entered, the K350 will prompt to change the password.
The password should be changed to something secure. For more information see Getting Started
Each password recovery code can only be used once. Your K350 must be unlocked in SafeConsole Mode with a valid connection to SafeConsole before a new password recovery code can be generated. Failure to do so could cause loss of access to the device and the data on it if the password is forgotten again.
Unlocking In Read-Only Mode
You can unlock your device in a read-only state so that files cannot be altered on your secure drive. For example, when using an untrusted or unknown computer, unlocking your device in Read-Only Mode will prevent any malware on that computer from infecting your device or modifying your files. Managed devices can be forced to unlock in a read-only state by an administrator.
When working in this mode, the DataLocker Control Panel will display the text Read-Only Mode. In this mode, you cannot perform any operations that involve modifying files on the device. For example, you cannot reformat the device, restore applications or edit the Applications List, or edit files on the drive.
To unlock your device in Read-Only Mode through the Control Panel:
Unlock K350 and select Connect, confirm with Enter-button. Run the Unlocker.exe.
Check the Read-Only Checkbox below the Unlock button.
Click Unlock. The DataLocker Control Panel will appear with the text Read-Only Mode at the bottom.
To unlock the device in Read-Only Mode from the device:
Unlock K350.
In the connection selection menu select/confirm READ-ONLY MODE.
Unlocking in “Read-Only Mode” from the connection menu also works in Standalone mode.
Changing the Unlock Message
The Unlock Message is custom text that displays in the Control Panel when you unlock the device. This feature allows you to customize the message that displays. For example, adding classification labels can help identify which documents can be saved to the device due to company policy. Your SafeConsole administrator can set a pre-defined message or prevent the K350 user from changing this message.
To change the Unlock Message:
In the DataLocker Control Panel, click Settings on the menu bar.
Click Preferences in the left sidebar.
Type the message text in the Unlock Message field. The text must fit in the space provided (approximately 7 lines and 200 characters).
Scanning your Device for Malware
If enabled by your SafeConsole administrator, the Malware Scanner is a self-cleaning technology that detects and quarantines malware on your device. Powered by the McAfee® anti-virus and anti-malware signature database, and constantly updated to combat the latest malware threats, the scanner first checks for the latest updates, scans your device, then reports and cleans any malware that is found.
Your system administrator may require the anti-malware definition to be updated before the device can be unlocked. In this event, the full anti-malware definition will need to be downloaded to a temporary folder on the local computer before the password can be entered. This can increase the time it takes to unlock the device based on the host computer’s networking connection and the size of malware updates needed.
Some things to know about scanning your device:
The scanner runs automatically when you unlock your device.
It scans all onboard files (compressed and uncompressed).
It will report and delete any detected malware.
(Optional) If your SafeConsole has enabled quarantine, it may quarantine any malware it finds. See Restoring or Deleting a Quarantined File for more information.
The scanner will automatically update itself before each scan to protect you from the latest malware threats.
An update requires an internet connection. Ensure a minimum of 135 MB of free space on the device to accommodate the downloaded malware signature files.
Your first update may take a long time to download, depending on your internet connection.
The date of the last update is displayed in the Control Panel.
If the scanner becomes too far out of date, it will need to download a large file to bring it back up-to-date.
Restoring or Deleting a Quarantined File
If your SafeConsole administrator has enabled quarantine, you will have the option of restoring or deleting detected malware. This process helps when McAfee® detects a valid document as malware.
NOTE: Depending on the size of infected files, quarantine may not be available. If the file cannot be quarantined it will be deleted and will not be able to be restored using the following process.
If a file is detected as infected a warning dialog will be shown with the option to lock the drive at that time. Quarantined files remain on the device in an encrypted state to prevent further execution.
To view quarantined files:
Unlock your device and click Settings in the DataLocker Control Panel.
Click Quarantine on the left sidebar.
Selecting a file from the list will display additional details including, Threat Name, Threat Type, anti-malware definition version, and the date of quarantine. After the file is selected files can either be Restored or Deleted.
Restored files will be exempt from automatic scanning while the device is currently unlocked. The file will be scanned during the next unlock or if a manual scan is selected from the Anti-Malware tab. If the anti-malware definitions still determine that the file is infected it will quarantine the file once again.
Deleted files will be permanently deleted.
Using ZoneBuilder
If enabled by your SafeConsole administrator, ZoneBuilder is a SafeConsole feature used to create a Trusted Zone of computers. It can be used to restrict device access to computers within the Trusted Zone.
If your administrator chooses to enable this policy, you may be required to trust your account within the Control Panel.
Trusting your account:
Unlock your device and click Settings in the DataLocker Control Panel.
Click Zone Builder on the left sidebar.
Click Trust This Account.
Enter the password for the device and click OK. Your account will now show up in the Trusted Accounts box.
Your account is now in the Trusted Zone of computers. Depending on the policy set by your SafeConsole administrator, you may have restricted device access outside of the Trusted Zone or when offline.
To remove a trusted account, simply highlight the account you wish to remove and click Remove.
Reformat Using DataLocker Control Panel
Important: Before you reformat the device, back up your files to a separate location.
To reformat a device:
Unlock your device and click Settings on the menu bar of the DataLocker Control Panel.
Click Tools on the left sidebar.
Under Device Health, select the file system then click the Reformat Secure Volume button.
Warning: Reformatting your K350 drive will erase all your files but will not erase your device password and settings. This should not be used as a method of securely erasing files. To securely erase your files, contact your SafeConsole administrator or use Sanitize.
Sanitize
Sanitize allows for the contents of the encrypted drive to be securely erased. This is accomplished by erasing the encryption key that the drive uses to access files on the Secure Volume while still retaining the connection to SafeConsole. This action prevents the need of registering the device back to SafeConsole like after a full device reset.
Warning: Performing this action will completely erase all data on the Secure Volume. This action is permanent.
The ability to sanitize a drive depends on the settings configured by your SafeConsole administrator. If allowed your drive can be sanitized by the following steps:
Unlock your K350 and open the device Control Panel by launching Unlocker.exe.
Right click the system tray icon for the Control Panel and select Sanitize Device.
Enter the numbers prompted in the dialog box to confirm that all data can be wiped from the drive.
The device will reset. Unplug and plug your K350 back into your workstation.
You will need to initialize your K350, see Getting Started for more information.
Log into your K350 and launch Unlocker.exe. You will be prompted to format the Secure Volume, see Reformat Using DataLocker Control Panel for more information.
Device Information
Before Unlocking
To see information about the device without logging into it, power on your K350. Before entering the password, press the Enter-button.
Device information shown:
QR Code Serial Number
Alpha-numeric Serial Number
Firmware Version
Capacity
Certification Logos
Patent Information
After Unlocking
More information can be obtained after logging into the device and launching the Unlocker.exe application.
Use the Capacity Meter, located at the bottom right of the DataLocker Control Panel, to see how much storage space is still available on your device. The green bar graph represents how full the device is. For example, the meter will be completely green when the device is full. The white text on the Capacity Meter displays how much free space remains.
For general information about your device, see the “Device Info” page.
To view device information:
Unlock your device and click Settings on the menu bar of the DataLocker Control Panel.
Click Device Info in the left sidebar.
The About This Device section includes the following details about your device:
Model Number
Hardware ID
Serial Number
Software Version
Firmware Version
Release Date
Secure Files Drive Letter
Unlocker Drive Letter
Operating System and System administrative Privileges
Management Console
NOTE: You can click one of the information buttons on the Device Info page to visit the DataLocker website or access more information about legal notices or certifications for DataLocker products.
Hint: Click Copy to copy the device information to the clipboard so that you can paste it in an email or support request.
Formatting Your K350
Selecting the Correct File System
Your device is formatted as exFAT from the factory.
The K350 can be reformatted to any file system of your choosing to accommodate a different operating system or to remove file size restrictions.
Formatting on a host computer is required after a Zeroize Drive, brute-force data Self Destruct.
Recommended file systems:
exFAT
- Pros: No file size limitations.
- Cons: Not supported by legacy operating systems.
FAT32
- Pros: Cross-platform compatible (Windows, macOS, and Linux) - Cons: Limited individual file size of 4GB
NTFS
- Pros: No file size limitations.
- Cons: Limited cross-platform compatibility - Windows, macOS (read-only), and Linux (read-only).
Note: Reformatting your K350 drive will erase the file table but will not erase your device password and settings or all files. As such, formatting should not be used as a method of securely erasing files. To securely erase your files, perform a Zeroize function. For more information, see the Zeroize Drive section.
Important: Before you reformat the device, back up your drive to a separate location, for example, to cloud storage or your computer.
Formatting Your K350 on Windows
Unlock K350 and connect. See Getting Started for more information.
The formatting dialogue box may appear automatically. Otherwise, in the search box on the taskbar, type control panel.
Click and Open Control Panel.
Click on System and Security.
Click on Create and format hard disk partitions.
Right click on the drive letter that corresponds to your K350. This example shows (E:). If the drive is not showing up you may need to right click and initialize the drive first.
Select Format.
Choose an appropriate ‘Volume Label’ and ‘File system’. Click OK.
You will be warned that all data will be erased and asked if you would like to continue. Click OK.
When finished, your K350 will available under This PC.
Formatting Your K350 on macOS
Go to Applications under your Finder.
Click Utilities and open Disk Utility. You will receive a warning message that the drive is not readable. Click Ignore.
Select the unformatted K350 disk.
Click the Erase tab at the top of the screen.
Rename the disk label to “DataLocker” and choose a file system.
When it is finished formatting, you may get a popup message asking if you would like to backup your drive with Time Machine. Choose your preferred option.
Click Done. Your formatted K350 should now appear under Devices.
Linux Compatibility and Configuration
The K350 is platform independent, capable of being run with 100% compatibility on most systems. For optimal Linux or Unix based system compatibility, we recommend using at least the Linux 2.6.31 Kernel (released 9 September 2009), which implemented the xHCI specification for USB 3.0.
Although older versions should work, they might run in USB 2.0 mode, which can be significantly slower.
You can check your kernel version by typing the following command in the terminal:
# uname -r
In most newer distributions the drive should automatically mount. To format the drive, first, enter terminal, then list detected hard disks using:
# fdisk -l | grep '^Disk'
Your configuration may vary. For this example, we’ll assume the disk is at /dev/sdb.
You will then type:
# fdisk /dev/sdb
Follow the instructions in fdisk to create a new partition. Finally, use the mkfs command to format the disk for Linux. Here, we use ext4.
# mkfs.ext4 /dev/sdb1
If you want to rename the drive, use the e2label command:
# e2label /dev/sdb1 /DataLocker
Product Specifications
* Advertised capacity is approximate. Some space is required for onboard software.
** Speed varies with host hardware, software, file system and usage.
*** Device should be completely dry before use.
Notices
DataLocker is continuously updating its products, the images and text in this manual may vary slightly from the images and text displayed by your K350. These changes are minor and should not adversely affect the ease of setup.
Disclaimer
DataLocker is not liable for technical or editorial errors and/or omissions contained herein; nor for incidental or consequential damages resulting from the furnishing or use of this material. The information provided herein is subject to change without notice. The information contained in this document represents the current view of DataLocker on the issue discussed as of the date of publication. DataLocker cannot guarantee the accuracy of any information presented after the date of publication. This document is for information purposes only. DataLocker makes no warranties, expressed or implied, in this document. DataLocker, DataLocker Sentry, and the DataLocker logo are registered trademarks of DataLocker Inc. and its subsidiaries. All other trademarks are the property of their respective owners. All rights reserved.
Patents
Patent: datalocker.com/patents
FCC Information
This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment to an outlet on a circuit different from that to which the receiver is connected.
Consult the dealer or an experienced radio/TV technician for help.
Note Changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment.