BestCrypt Data Shelter can display its System Tray Icon in the right bottom corner of the desktop. To activate the icon, click the Settings command from the left pane of the main window of the program. The following window will appear.

Options of the BestCrypt Data Shelter system tray icon


Options of the BestCrypt Data Shelter system tray icon

BestCrypt Data Shelter icon in the System Tray will appear if you set the Show in System tray option in the dialog window. Please note that BestCrypt Data Shelter shows notification messages in the System Tray area. By setting options for the various events reported by the program you can increase or decrease the number of the reported events.

If you click the BestCrypt Data Shelter Icon in the System Tray by mouse, the following menu will appear.

BestCrypt Data Shelter system tray icon


BestCrypt Data Shelter system tray icon

From the menu you can quickly run the program (if needed, as Administrator) and view the Log file of the program.

Besides of quick starting BestCrypt Data Shelter program, the System Tray Icon displays informational messages of the program:

  • When you change policy for the protected folder, the following window appears:

Policy change notification


You can click the Log File reference link to view more detail about the event in the BestCrypt Data Shelter LogViewer program. 

  • When BestCrypt Data Shelter denies some program from accessing the file in the protected folder, the following notification window appears.

Notification about denied program


You can click the Log File reference link and find the log string corresponding to the event of not granting access for the program attempting to read the file in the protected folder. Then, as the chapter Log file explains, you can run the Analyze access grant command for the log string and find out what the rule in the protection policy caused the event. 

  • As the chapter Creating policy based on folder access history explains, you can create the protection policy from the history of accessing the folder by programs. You can ask the program to accumulate the history and then review it after some time, for example, after a couple of days. When will it be the time to review the history, BestCrypt Data Shelter system tray icon will show you the following notification.

Notification about reviewing the folder access history




  • As the chapter Encrypted backup of the folder explains, you can create encrypted and compressed backup archive file for the protected folder. Besides, you can make BestCrypt Data Shelter notifying you regularly (monthly, weekly, daily) about updating the backup archive. When will it be the time to update the archive, BestCrypt Data Shelter system tray icon will show you the following notification.

Notification about updating backup archive of protected folder


  • BestCrypt Data Shelter monitors the way of accessing files in the protected folders. The program can detect an abnormal activity of some processes, for example, when the sign of ransomware activity detected. If it happens, BestCrypt Data Shelter can terminate the process momentarily. In this case the following notification appears.

Notification about terminated program


  • BestCrypt Data Shelter remembers the history of running processes. The history includes the hash (or secure checksum) of the executable files. If such a file is modified, in some cases it may mean that it is infected. When BestCrypt Data Shelter detects a modification of some executable file and the corresponding program accesses a protected folder, the program notifies the user and temporarily denies access to the folder for the program. In this case the following notification appears.

Notification about modified program executable file


As you see, with the notification dialogs of the System Tray Icon, BestCrypt Data Shelter allows the user to manage accessing the protection folders easier, as well as to keep an eye on reviewing access history of the folder and saving the backup data.

See also:

What is BestCrypt Data Shelter

Protection policy overview

Quarantined programs

Log file

Creating policy based on folder access history

Encrypted backup of the folder