Go to page of
Similar user manuals
-
Computer Drive
IronKey Personal
32 pages 2 mb -
Computer Drive
IronKey Secure Flash Drive Enterprise
32 pages 1.96 mb -
Computer Drive
IronKey Personal USB Flash Drive
2 pages 3.48 mb -
Computer Drive
IronKey Enterprise
32 pages 1.87 mb -
Computer Drive
IronKey USB Flash Drive
2 pages 3.32 mb -
Computer Drive
IronKey Personal Secure Flash Drive Personal
32 pages 2.09 mb -
Computer Drive
IronKey USB Flash Drives
2 pages 2.83 mb
A good user manual
The rules should oblige the seller to give the purchaser an operating instrucion of IronKey Enterprise, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.
What is an instruction?
The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of IronKey Enterprise one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.
Unfortunately, only a few customers devote their time to read an instruction of IronKey Enterprise. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.
What should a perfect user manual contain?
First and foremost, an user manual of IronKey Enterprise should contain:
- informations concerning technical data of IronKey Enterprise
- name of the manufacturer and a year of construction of the IronKey Enterprise item
- rules of operation, control and maintenance of the IronKey Enterprise item
- safety signs and mark certificates which confirm compatibility with appropriate standards
Why don't we read the manuals?
Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of IronKey Enterprise alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of IronKey Enterprise, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the IronKey service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of IronKey Enterprise.
Why one should read the manuals?
It is mostly in the manuals where we will find the details concerning construction and possibility of the IronKey Enterprise item, and its use of respective accessory, as well as information concerning all the functions and facilities.
After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.
Table of contents for the manual
-
Page 1
P A GE 1 IR ONKEY ENTERPRISE USER GUIDE User Guide Ir onK e y Enterprise Secur e Flash Driv e[...]
-
Page 2
P A GE 1 IR ONKEY ENTERPRISE USER GUIDE Thank y ou for y our inter est in Ir onK e y . Ir onK ey is committed to cr eating and dev eloping the best security technologies and making them simple-to-use , affor dable , and a vailable to ev er y- one . Y ears of resear ch and millions of dollars of de velopment ha v e gone into bringing this tech- nolo[...]
-
Page 3
P A GE 2 IR ONKEY ENTERPRISE USER GUIDE CONTENTS What is it? Meet the Ir onK ey Enterprise Cor e Components Device Diagrams T echnical & Security Notes Ir onK ey Device Security Ho w Does it W ork? Pr oduct W alkthrough Activation and Initialization Using the Ir onK ey Unloc k er on Windo ws Using the Ir onK ey Unloc k er on a Mac Using the Ir [...]
-
Page 4
P A GE 3 IR ONKEY ENTERPRISE USER GUIDE What is it? Meet the Ir onK e y The Ir onK ey Enterprise Secur e Flash Drive, designed to be the world’ s most secur e USB ash drive, protects y our data, passw ords, and Internet privacy with some of toda y’ s most advanced security technologies. Y our Ir onK ey includes a suite of security softwar e [...]
-
Page 5
P A GE 4 IR ONKEY ENTERPRISE USER GUIDE Simple De vice Manag ement Y our Ir onK ey includes the Ir onK ey Contr ol Panel, a central launchpad for launching your a pplications, editing your pr efer ences, and safely locking your Ir onK e y . P ortable & Cr oss-Platform Data Access The Ir onK ey Unlock er allows y ou to access your encrypted l[...]
-
Page 6
P A GE 5 IR ONKEY ENTERPRISE USER GUIDE De vice Diagrams The Ir onK ey has been designed fr om the ground up with security in mind. A combination of advanced security technologies ar e used to ensure maximum pr otection of y our data. Additionally , the IronK ey has been designed to be ph ysically secur e, to pr ev ent hardwar e-le vel attacks and [...]
-
Page 7
P A GE 6 IR ONKEY ENTERPRISE USER GUIDE T echnical & Security Notes W e are endea v oring to be very open about the security architectur e and technology that we use in designing and building the Ir onK ey devices and online ser vices. There is no hocus-pocus or handwa ving her e . W e use established cr yptographic alg orithms, we de velop thr[...]
-
Page 8
P A GE 7 IR ONKEY ENTERPRISE USER GUIDE P assw ord Mana ger Pr otection The Ir onK ey Passw ord Manager and m y .ironk ey .com work together , giving you the ability to back up y our online passw ords to y our Online Security V ault. First, you must unlock y our Ir onK ey de vice , which requir es tw o- factor authentication. Y our passwor ds are s[...]
-
Page 9
P A GE 8 IR ONKEY ENTERPRISE USER GUIDE Ho w does it work? Pr oduct W alkthr ough Y our Ir onK ey Enterprise Secure Flash Driv e consists of the follo wing components: » Ir onK ey Unlock er (Windows, Mac and Linux) » Ir onK ey Contr ol P anel (Windows only) » Ir onK ey Vir tual K eyboar d (Windows only) » Mozilla Firef o x & IronK e y’ s [...]
-
Page 10
P A GE 9 IR ONKEY ENTERPRISE USER GUIDE 3 Retriev e the email with y our Activation Code. Cop y and paste it into the Ir onK ey window . Y our System Admin has setup your Ir onK ey ahead of time to abide by y our organization’ s security standar ds. Y ou will receiv e an email with an Activation Code that is needed to use y our IronK e y . Enter [...]
-
Page 11
P A GE 10 IR ONKEY ENTERPRISE USER GUIDE USING THE IRONKEY UNLOCKER ON WINDO WS The Ir onK ey Unlock er allows y ou to securel y access your les on m ultiple operating systems. It pr ompts you f or your pass wor d, securely validates it, and then mounts y our secur e volume where all of y our les ar e stored on the Ir onK ey . Here is ho w to[...]
-
Page 12
P A GE 11 IR ONKEY ENTERPRISE USER GUIDE 2 Choose which action to tak e when you unlock it. By selecting the corr esponding checkbox bef ore un- locking your Ir onK e y , you can vie w y our secure les and/or unlock y our IronK e y in Read-Only Mode. 3 Locking & unplugging the IronK e y Clicking “Lock Drive” will exit open Ir onK ey a pp[...]
-
Page 13
P A GE 12 IR ONKEY ENTERPRISE USER GUIDE Please note the follo wing impor tant details for using y our IronK e y on Linux: If you compile y our own k ernel, y ou must include the follo wing in it: » DeviceDrivers->SCSIDevic[...]
-
Page 14
P A GE 13 IR ONKEY ENTERPRISE USER GUIDE USING THE IRONKEY CONTROL P ANEL Step Description 1 Creating, editing, deleting secur e les When you click on “Secure Files” in the Ir onK ey Contr ol Panel, Windo ws Explorer will open dir ectly to your secur e v olume . All les on your Ir onK e y ar[...]
-
Page 15
P A GE 14 IR ONKEY ENTERPRISE USER GUIDE 3 Conguring device settings The Settings menu allows y ou to congur e pref erences to your liking, such as: » Enabling/Disabling the Passw ord Manager » Enabling/Disabling the Secur e Sessions » Conguring Passw ord Manager options » Select which web br o wser your Ir onK ey should use As well as[...]
-
Page 16
P A GE 15 IR ONKEY ENTERPRISE USER GUIDE 7 Adding, r enaming, and remo ving applications to the Applications List T o manage the items in the Application List of the Ir onK ey Contr ol Panel, simply right-click anywher e in Application List. A menu will appear allo wing you to: 1. Br owse to a new a pplication to add it to the list 2. Rename existi[...]
-
Page 17
P A GE 16 IR ONKEY ENTERPRISE USER GUIDE Step Description 1 Click the Ir onK ey Vir tual K ey- board icon. The Ir onK ey Vir tual K eyboar d will appear . Alternativ ely , y ou can press CTRL + AL T + V 2 Click on the k eys to type out your pass wor d. Click on ‘Enter’ when you ar e nished. Note that y ou can use the IronK e y Vir tual K eyb[...]
-
Page 18
P A GE 17 IR ONKEY ENTERPRISE USER GUIDE 2 T oggle Secure Sessions for secur e and private surng If enabled, clicking the Ir onK ey button on the bottom right of the onboard Fir efo x will silently turn Ir onK ey’ s Secure Sessions Service on/off. This will cr eate an encr ypted tunnel directl y fr om your Ir onK ey , out to a secured Ir onK e[...]
-
Page 19
P A GE 18 IR ONKEY ENTERPRISE USER GUIDE USING THE IRONKEY P ASSW ORD MANA GER The Ir onK ey Passw ord Manager , if enabled, connects to the onboar d Firef ox br owser , or to Internet Explorer (v ersions 6 or 7) on y our computer , automatically lling in y our sa ve[...]
-
Page 20
P A GE 19 IR ONKEY ENTERPRISE USER GUIDE 3 Editing/deleting logins and P or - table Bookmarks Y ou can manage your Pass wor d Manager accounts fr om within the IronK e y Control Panel. Each w ebsite will ha v e a set-able name , a URL, a username (logins only), and a passw or d (logins only). Y our passw ords ar e not shown unless y ou click the ?[...]
-
Page 21
P A GE 20 IR ONKEY ENTERPRISE USER GUIDE USING THE SECURE BA CKUP SOFTW ARE If your Ir onK e y is lost or stolen, you ha v e peace of mind knowing that your condential information cannot be seen by an yone but y ou. And getting y our data back is simple with Ir onK ey’ s Se- cure Backup softwar e, w[...]
-
Page 22
P A GE 21 IR ONKEY ENTERPRISE USER GUIDE USING RSA SECURID ON Y OUR IRONKEY Step Description 1 Open the RSA SecurID application Click on the icon in the Ir onK ey Contr ol Panel’ s application list. 2 Import a .stdid le . This ma y be done by y our System Admin for y ou. 1. Click the ‘ Options ...[...]
-
Page 23
P A GE 22 IR ONKEY ENTERPRISE USER GUIDE IMPOR TING A DIGIT AL CER TIFICA TE INT O THE IRONKEY The Ir onK ey Cr yptochip includes a limited amount of extr emely secure har dwar e storage space , which can be used for storing the private k e y associated with a digital cer ticate. This pr ovides you wi[...]
-
Page 24
P A GE 23 IR ONKEY ENTERPRISE USER GUIDE 4 Note that Ir onK ey’ s certicate is a vailable her e . Now y ou can add y our own. Click the ‘ Impor t ’ button. 5 Br owse to the PKCS#12-for - mat certicate le and open it. Y ou will be pr ompted for the location of the PKCS#12- format certicate le (le extension will be .p12 in UNI[...]
-
Page 25
P A GE 24 IR ONKEY ENTERPRISE USER GUIDE USING MY .IRONKEY .COM NO TE: DependingonhowyourSystem Administratorhascongur edyourIronK ey , youmanynothave an online IronK ey account, and this section may not apply to you. Y our Ir onK ey supports advanced cr yp[...]
-
Page 26
P A GE 25 IR ONKEY ENTERPRISE USER GUIDE 5 Monitoring account activities The Account Dashboard sho ws you the r ecent activities on your account, such as logins, failed passw ord attempts, and when y our device pass- wor d has been r ecover ed. 6 Enabling Account Aler ts for r eal-time account monitoring Y ou can enable a number of Account Alerts f[...]
-
Page 27
P A GE 26 IR ONKEY ENTERPRISE USER GUIDE USING Y OUR IRONKEY IN READ-ONL Y MODE Y ou can unlock your Ir onK ey in a r ead-only state such that les on y our Ir onK ey cannot be ed - ited. An example of when this is useful is when you want to access a le on y our Ir onK ey [...]
-
Page 28
P A GE 27 IR ONKEY ENTERPRISE USER GUIDE USING THE IRONKEY MAL W ARE SCANNER Normal ash driv es can inadvertently spread mal ware fr om one computer to another . Y our Ir onK ey , ho we ver , includes built-in anti-malwar e featur es, including: » A read-onl y vir tual CD fr om which the most impo[...]
-
Page 29
P A GE 28 IR ONKEY ENTERPRISE USER GUIDE 3 The Ir onK ey Malwar e Scanner will au- tomatically scan y our Ir onK ey , including onboard les (compr essed and uncom - pressed les) and an y running system pr ocesses. A window opens in the backgr ound that shows you the scanning pr ogress. NO TE : The IronK ey Mal ware Scanner does not scan y our[...]
-
Page 30
P A GE 29 IR ONKEY ENTERPRISE USER GUIDE Pr oduct Specications CAP A CITY* 1GB, 2GB, 4GB, 8GB SPEED * Up to 30 MB per second r ead speed Up to 20 MB per second write speed DIMENSIONS 75mm X 19mm X 9mm WEIGHT 0.8 oz W A TERPROOF MIL-STD-810F OPERA TING TEMPERA TURE -40 C , +85 C OPERA TING SHOCK 16G rms ENCR YPTION Hardwar e: 128-bit AES (CBC-Mod[...]
-
Page 31
P A GE 30 IR ONKEY ENTERPRISE USER GUIDE What’ s next? In many wa ys, that’ s up to y ou. W e are f ocused on building not only the world’ s most secure ash driv e, but also enabling technologies that are simple and enjo yable to use . Y our feedback reall y matters to us, and we carefull y re view all f eature r equests and customer feedb[...]
-
Page 32
P A GE 31 IR ONKEY ENTERPRISE USER GUIDE Contact Information Pr oduct F eedback F eatur e Requests feedback@ironk ey .com featur erequest@ir onk ey .com Ir onK ey Online Suppor t https://my .ir onk ey.com F or suppor t, please contact your https://learn.ironk ey .com Helpdesk or System Admin https://suppor t.ironk ey .com https://forum.ir onk ey.co[...]