The computer page shows detailed information about selected client computer:

The page is divided into three parts:

General information (1)

This section incorporates the following information and controls:

  • Computer icon

The computer icon indicates a device's current working state. There are five possible states:



  • Computer name

    By default, computer's hostname is displayed in this area. Additionally, a Display Name may be set to help distinguish between computers easier.

    To set a Display Name, click the pencil-shaped icon on the right of computer name. The Display Name will then be added in brackets after the computer name as shown at the screenshot above.

    To get computers displayed by their Display Name in the left pane of the management console, enable "Show computers by display name" in Company Settings.

  • Computer connection status

  • Operating system and boot type (MBR/EFI)

  • IP address


Software-specific information (2)

This section incorporates controls to manage BestCrypt Volume Encryption on the computer:

  • Information about policy compliance, warnings and errors

  • Encryption policies

Choose whether computer should inherit a policy from a group it belongs to or use individual policy. Main article: Encryption policies

  • Suspend protection

Temporarily disable boot-time prompt for password for troubleshooting or update roll-outs. Main article: Central Management of BestCrypt Volume Encryption

  • Recovery options

Recover lost password or generate recovery information for encrypted computer or removable device. Main article: Rescue Procedures in Jetico Central Manager

  • List of volumes

In this area the list of all volumes, fixed and removable attached to the computer is displayed.

For each volume a Volume Name, Encryption Status, displaying encryption progress in real time, Capacity and Volume Type are shown.
For removable media a unique ID is additionally displayed. This ID in recovery procedures for removable media.

  • Activity log

This area accumulates log messages from both Server and Client sides associated with this computer. The messages are divided in three categories:

Service messages - standard messages logging various settings being changed or updated.

Warning messages - medium importance messages, requiring attention, but not necessarily immediate action.

Error messages - high importance messages, requiring immediate action.


Clicking Warnings or Errors on top of the Activity Log will filter log messages by their importance. Checking Show unread will only leave the most recent messages in the view. Clicking Mark as read will reset the state in computer icon (see above)

Deployment information (3)

  • Version of client software installed, last update date, the option for the JCM administrator or operator to install/uninstall the software
  • Delete computer button




See also:

Groups of Computers

Encryption policies

Deleting Computers

Central Management of BestCrypt Volume Encryption

BestCrypt Volume Encryption on Client Computers

Rescue Procedures in Jetico Central Manager