Instruction/ maintenance manual of the product Personal D250 Ironkey
Go to page of 32
P A GE 1 IR ONKEY USER GUIDE IR ONKEY P ersonal User Guide Models S200, S100 D200.
P A GE 1 IR ONKEY USER GUIDE Thank y ou for y our inter est in Ir onK e y . Ir onK ey is committed to cr eating and dev eloping the best security technologies and making them simple-to-use , affor dable , and a vailable to e ver y one .
P A GE 2 IR ONKEY USER GUIDE CONTENTS What is it? ................................................ 3 Meet the Ir onK ey ....................................................... 3 Core F eatur es .........................................................
P A GE 3 IR ONKEY USER GUIDE What is it? Meet the Ir onK ey The Ir onK ey P ersonal Secure Flash Driv e, designed to be the w orld’ s most secur e USB ash drive, protects y our data, passw ords, and Internet privacy with some of toda y’ s most advanced security technologies.
P A GE 4 IR ONKEY USER GUIDE P ortable Cr oss-Platform Data Access The Ir onK ey Unlock er allows y ou to access your encrypted les on Windows 2000, XP , Vista, Mac OS X and n umerous distributions of Lin ux.
P A GE 5 IR ONKEY USER GUIDE De vice Diagrams The Ir onK ey has been designed fr om the ground up with security in mind. A combination of advanced security technologies ar e used to ensure maximum pr otection of y our data.
P A GE 6 IR ONKEY USER GUIDE T echnical and Security Notes W e are endea v oring to be very open about the security architectur e and technology that we use in designing and building the Ir onK ey devices and online ser vices. There is no hocus-pocus or handwa ving here.
P A GE 7 IR ONKEY USER GUIDE Identity Manag er Pr otection The Ir onK ey Identity Manager and my .ironk ey.com w ork together , giving you the ability to back up y our online passw ords to y our Online Security V ault at my .ir onk ey .com . First, you m ust unlock your Ir onK ey de vice, which requir es tw o-factor authentication.
P A GE 8 IR ONKEY USER GUIDE Secure Sessions: Making T or F aster and More Secur e Ir onK ey maintains a secur e , private T or network with its o wn, high- performance servers (separate fr om the public T or network).
P A GE 9 IR ONKEY USER GUIDE Ho w does it work? Pr oduct W alkthr ough Y our IronK e y Personal Secur e Flash Driv e consists of the following components: » Ir onK ey Unlock er (Windows, Mac and Linu.
P A GE 10 IR ONKEY USER GUIDE 3 Create a de vice passw ord and a nickname for y our Ir onK ey . Because y ou can ha ve multiple Ir onK eys associated with one Ir onK ey account, the nickname helps you distinguish between diff erent Ir onK ey de vices.
P A GE 11 IR ONKEY USER GUIDE USING THE IRONKEY UNLOCKER ON WINDO WS The Ir onK ey Unlock er allows y ou to securel y access your les on m ultiple operating systems. It pr ompts you f or your pass wor d, securely validates it, and then mounts your secur e volume where all of y our les ar e stored on the Ir onK ey .
P A GE 12 IR ONKEY USER GUIDE INITIALIZING AND A CTIV A TING Y OUR IR ONKEY ON A MA C If you pr efer to use a Mac, you can choose to initialize y our Ir onK ey on a Mac OS X computer : Step Description 1 Plug the Ir onK ey into y our computer’ s USB port.
P A GE 13 IR ONKEY USER GUIDE 6 Activate your m y .ironk ey .com account. my .ir onk ey.com is a secur e site where y ou can manage your Ir onK e y account and devices. Accessing my .ir onk ey.com r equires tw o-factor authentication (y our Ir onK ey and y our passwor d).
P A GE 14 IR ONKEY USER GUIDE INITIALIZING Y OUR IRONKEY ON LINUX If you pr efer to use a Lin ux computer , you can choose to initialize y our Ir onK ey on Linux: Step Description 1 Plug it into y our computer’ s USB port. Y our IronK e y can be initialized on Linux 2.
P A GE 15 IR ONKEY USER GUIDE NO TE: ironkey only unlocks the secur e volume; it must then be mounted. Many modern Linux distributions will do this automatically; if not, run the mount program fr om the command line, using the de vice name printed by ironkey .
P A GE 16 IR ONKEY USER GUIDE Step Description 1 Creating, editing, deleting secure les When you click “Secure Files” in the Ir onK ey Contr ol Panel, the default br owser on y our computer opens directl y to your secur e v olume . All les on your Ir onK e y are str ongly encrypted with militar y-grade AES encr yption.
P A GE 17 IR ONKEY USER GUIDE 2 Updating device rmwar e/softwar e The Ir onK ey can secur ely update its softwar e and rmware thr ough signed updates that ar e v eried in hardwar e. This allows users to k eep their de vices up- to-date and pr otect themselves fr om futur e malwar e and online thr eats.
P A GE 18 IR ONKEY USER GUIDE 5 Creating a Lost and F ound Message This featur e allows y ou to create a message that will appear on the Ir onK ey Unlock er window . In the ev ent that you lose y our Ir onK ey , someone can return it to you if y ou pr ovide y our contact information.
P A GE 19 IR ONKEY USER GUIDE USING THE IRONKEY VIR TU AL KEYBO ARD (WINDO WS ONL Y) If you ar e using y our IronK e y on an unfamiliar computer and are concerned about k eylogging and scr eenlogging sp yware, use the IronK e y Vir tual K eyboar d, which helps protects y our passw ords b y letting you click out letters and numbers.
P A GE 20 IR ONKEY USER GUIDE USING THE ONBO ARD FIREFO X AND SECURE SESSIONS SER VICE (WINDO WS) Since your Ir onK e y comes with a Firefo x web br o wser already onboar d, none of your cookies, histor y les, bookmarks, add-ons or online passw ords ar e stor ed on the local computer .
P A GE 21 IR ONKEY USER GUIDE USING THE IRONKEY IDENTITY MANA GER (WINDO WS ONL Y) The Ir onK ey Identity Manager secur ely stor es and uses many of y our most important identity credentials, including login information and one-time pass wor ds to applications and online accounts.
P A GE 22 IR ONKEY USER GUIDE 2 Automatically logging into an account The next time you r eturn to a w ebsite or application for which y ou ha ve stor ed a passw ord, your login automatically lls in for y ou. If you ha v e the auto-login option enabled for that account, the Identity Manager also submits the login.
P A GE 23 IR ONKEY USER GUIDE USING THE SECURE BA CKUP SOFTW ARE (WINDO WS ONL Y) If your Ir onK e y is lost or stolen, you ha v e peace of mind knowing that your condential information cannot be seen by an yone but y ou.
P A GE 24 IR ONKEY USER GUIDE IMPOR TING A DIGIT AL CER TIFICA TE INT O THE IRONKEY (WINDO WS ONL Y) The Ir onK ey Cr yptochip includes a limited amount of extr emely secure har dwar e storage space , which can be used for storing the private k e y associated with a digital cer ticate.
P A GE 25 IR ONKEY USER GUIDE 4 Note that Ir onK ey’ s certicate is a vailable her e . Now y ou can add y our own. Click the “Impor t” button. 5 Br owse to the PKCS#12- format certicate le and open it. Y ou will be prompted f or the location of the PKCS#12- format certicate le (le extension will be .
P A GE 26 IR ONKEY USER GUIDE USING MY .IRONKEY .COM (WINDO WS AND MA C) Y our IronK e y suppor ts advanced cr yptographic authentication using str ong PKI k ey pairs generated in the Ir onK ey Cr yptochip . When you log into m y .ir onke y .com fr om y our device, it uses these unique k eys as y our digital identity cr edentials.
P A GE 27 IR ONKEY USER GUIDE 4 Monitoring account activities The Account Dashboard sho ws you the r ecent activities on your account, such as logins, failed passw ord attempts, and when your de vice passw ord has been r ecov ered.
P A GE 28 IR ONKEY USER GUIDE USING Y OUR IRONKEY IN READ-ONL Y MODE (WINDO WS, MA C , LINUX) Y ou can unlock your Ir onK ey in a r ead-only state such that les on y our Ir onK ey cannot be edited. An example of when this is useful is when you want to access a le on y our Ir onK ey while using an untrusted or unknown computer .
P A GE 29 IR ONKEY USER GUIDE * Adver tised capacity is appro ximate and not all of it will be available for storag e . Some space is requir ed for onboard softw are. Pr oduct Specications For details about y our device, see “About Ir onK ey” in Ir onK ey Contr ol Panel Settings.
P A GE 30 IR ONKEY USER GUIDE What’ s next? In many wa ys, that’ s up to y ou. W e ar e focused on building not only the world’ s most secure ash driv e, but also enabling technologies that are simple and enjo yable to use.
P A GE 31 IR ONKEY USER GUIDE Contact Information Pr oduct F eedback F eature Requests feedback@ironk ey .com featur erequest@ir onk ey .com Ir onK ey Online IronK e y Suppor t https://my .ir onk ey.com https://suppor t.ir onk ey .com https://learn.ironk ey .
An important point after buying a device Ironkey Personal D250 (or even before the purchase) is to read its user manual. We should do this for several simple reasons:
If you have not bought Ironkey Personal D250 yet, this is a good time to familiarize yourself with the basic data on the product. First of all view first pages of the manual, you can find above. You should find there the most important technical data Ironkey Personal D250 - thus you can check whether the hardware meets your expectations. When delving into next pages of the user manual, Ironkey Personal D250 you will learn all the available features of the product, as well as information on its operation. The information that you get Ironkey Personal D250 will certainly help you make a decision on the purchase.
If you already are a holder of Ironkey Personal D250, but have not read the manual yet, you should do it for the reasons described above. You will learn then if you properly used the available features, and whether you have not made any mistakes, which can shorten the lifetime Ironkey Personal D250.
However, one of the most important roles played by the user manual is to help in solving problems with Ironkey Personal D250. Almost always you will find there Troubleshooting, which are the most frequently occurring failures and malfunctions of the device Ironkey Personal D250 along with tips on how to solve them. Even if you fail to solve the problem, the manual will show you a further procedure – contact to the customer service center or the nearest service center