Computer Page
The computer page shows detailed information about selected client computer:
The page is divided into three parts:
General information (1)
This section incorporates the following information and controls:
Encryption information (2)
This section incorporates controls to manage BestCrypt Volume Encryption on the computer:
Encryption policies
Choose whether computer should inherit a policy from a group it belongs to or use individual policy. Main article: Encryption policies
Suspend protection
Temporarily disable boot-time prompt for password for troubleshooting or update roll-outs. Main article: Central Management of BestCrypt Volume Encryption
Recovery options
Recover lost password or generate recovery information for encrypted computer or removable device. Main article: Rescue Procedures in Jetico Central Manager
List of volumes
In this area the list of all volumes, fixed and removable attached to the computer is displayed.
For each volume a Volume Name, Encryption Status, displaying encryption progress in real time, Capacity and Volume Type are shown.
For removable media a unique ID is additionally displayed. This ID in recovery procedures for removable media.
Activity log
This area accumulates log messages from both Server and Client sides associated with this computer. The messages are divided in threee categories:
Service messages - standard messages logging various settings being changed or updated.
Warning messages - medium importance messages, requiring attention, but not necessarily immediate action.
Error messages - high importance messages, requiring immediate action.
Clicking Warnings or Errors on top of the Activity Log will filter log messages by their importance.
Checking Show unread will only leave the most recent messages in the view.
Clicking Mark as read will reset the state in computer icon (see above)
Deployment information (3)
- Version of client software installed, last update date, the option for the JCM administrator or operator to install/uninstall the software
- Delete computer button
Depending on a computer's state and settings, additional icons may appear near the computer name in the left panel:
- individual policy is set
- protection is suspended
- error occurs on the computer