Welcome to your new Imation® SECURE Hard Drivefrom Imation (www.imation.com). The Imation
SECURE™ Hard Drive product is a portable secure backup solution. It consists of an external hard drive
with the Imation SECURE Hard Drive security software from Imation and TotalMedia Backup software
from ArcSoft®, Inc. The Imation SECURE Hard Drive software allows users to protect the files on their
Imation SECURE Hard Drives by automatically encrypting and protecting the sensitive information.
(Encryption prevents unauthorized access to confidential data.) This user manual discusses how to
install, set up, and use the Imation SECURE Hard Drive software. It also includes some troubleshooting
information.
The Imation SECURE Hard Drive software is a Microsoft® Windows® application that is installed on a
user’s PC. It runs from the user’s PC or corporate server and automatically detects any Imation SECURE
Hard Drives connected to the machine.
After a user sets up authentication information for their drive (password, hint information, and,
optionally, a Bluetooth
®
device), the Imation SECURE Hard Drive software automatically and
transparently encrypts any data written to the drive after they have authenticated it. They do not have
to change their behavior—they work with files on the encrypted hard drive exactly the same way that
they do on standard unencrypted removable hard drives. If the user does not authenticate their Imation
SECURE Hard Drive, they cannot access the contents of the encrypted files.
If the drive contains unencrypted files, the software does not encrypt them unless the user chooses to
do so. Typically, unencrypted files are ones that the user adds while the drive is connected to a
computer that does not have the Imation SECURE Hard Drive software installed on it. The software
only encrypts files on authenticated Imation SECURE Hard Drives.
The Imation SECURE Hard Drive software also automatically decrypts the content of encrypted files on
the drive that the user opens. It re-encrypts the content when the user closes or saves the files after
making changes. If they save or copy files with encrypted content to their hard drive or other
removable storage devices, the content of the files they save or copy are unencrypted. They can then
use the files freely on machines that do not have the Imation SECURE Hard Drive software installed on
them.
System Requirements
The Imation SECURE Hard Drive 2.1 software is supported on Microsoft® Windows® XP Home/Pro,
32-bit version. It is also supported on 32- and 64-bit versions of Windows Vista, Windows 7, and
Windows 8.
For automatic backup, TotalMedia Backup, version 2.0 (and higher) by ArcSoft®, Inc. is the
recommended software to use with Imation SECURE Hard Drives. The drives contain the installation file
for this software when purchased.
Important Note: Users must have Java™ software, version 6, update 24 or higher from Oracle® Corp.
installed on their machine to use the Imation SECURE Hard Drive software. If the Imation SECURE Hard
Drive software does not run automatically, users can check their list of installed programs through the
Windows Control Panel to see if Java 6.0, update 24 or higher is installed on their PC. If it is not, they
can download Java 7.0 for free from
http://www.java.com.
Page 1
Important Product Use Concepts
• The Imation SECUREHard Drive software will encrypt any files written to an Imation SECURE
Hard Drive by an application, a DOS command window, or by Windows Explorer. Data
encryption is completely automatic.
•If the user connects their Imation SECURE Hard Drive to a PC that has the encryption software
installed on it and declines to authenticate it, it will become read-only. Only unencrypted files
will be readable. This allows the user to copy unencrypted files from their hard drive to the
machine, but they will be unable to write any data to it.
•The encrypted files on an Imation SECURE
Hard Drive are inaccessible to applications and the
Microsoft Windows operating system when users are working on machines that do not have the
Imation SECURE
Hard Drive software installed on them. The files are visible on the drive, but
they are encrypted.
•To remove authenticated drives, we recommend that users close all applications before safely
removing the drive through the Windows operating system and disconnecting it from the PC.
•They should not disconnect the cable that connects the Imation SECURE
Hard Drive to any
computer if they have not first safely removed the drive. Doing so can result in data loss and/or
corruption of the NTFS file system on the drive.
I. Installing the Imation SECURE Hard Drive Software
1. Verify that the machine for the Imation SECURE Hard Drive software meets the system
software requirements.
2. Log into the machine, using an account with administrator rights.
3. Connect an Imation SECURE
4. Through Windows Explorer, find and double-click the Imation SECURE
Hard Drive to the machine.
Hard Drive software
installation file (SecureHardDrive Installer.msi) located on the root of the drive.
5. Review the license agreement, accept the terms of the license agreement, and follow the
installation instructions that display.
The user then can log in as any type of user (administrator or non-administrator).
TAfter installation, the Imation SECURE Hard Drive software will appear as a padlock icon in
the notification area of the Windows taskbar (typically located in the lower right corner of the
desktop). The software is automatically initiated during system startup and therefore should
always be available unless the user selects the Upgrade Java feature.
TTd
Right-clicking the icon will display a context menu of the functions available in the Imation
SECURE
Hard Drive software.
Page 2
Occasionally, informational messages will display, using temporary pop-up boxes to provide the
user with instructions or inform them of events that have been detected. Users do not need to
click on the messages to close them. The messages will disappear automatically.
II. Setting up Imation SECURE Hard Drive Authentication
Users must set up their Imation SECURE Hard Drive for use with the Imation SECURE Hard Drive
software. They do so by specifying authentication information (password, hint question and
answer) and, optionally, by also selecting a Bluetooth device for authentication. If they have a
Bluetooth device that has an Android™ operating system from Google™, Inc. installed on it, they
can also separately install the Android Imation SECURE Drive App to further increase security.
The Imation SECURE Hard Drive software automatically detects any Imation SECURE Hard
Drive connected to the user’s machine. If the user has not yet set up their drive for encryption,
the software will prompt the user with the Imation SECURE Setup dialog box to create the
authentication information for the device. The setup dialog box establishes both the encryption
password for the drive as well as a hint question and answer. This information, in conjunction
with a Bluetooth device if one is designated, can be used not only to authenticate the device for
use but also to retrieve or initiate changing authentication credentials.
(Using a personal pass phrase instead of a simple password provides significantly greater
security. Because the password is case-sensitive, the user will need to type it exactly the same
way whenever they enter it.)
Page 3
If Bluetooth wireless technology is enabled for the computer to which the drive is connected,
the Utilize Bluetooth authentication check box on the setup dialog box is available. The user
can use this check box to access the Imation SECURE Bluetooth Preferences dialog box. The
dialog box enables the user to select a Bluetooth authentication option and specify a Bluetooth
device for authentication.
Authentication options
There are three authentication options:
•If the user chooses to save the password and hint information without selecting the Utilize
Bluetooth authentication check box, their authentication type is “Password only.”
•If the user wants to use either a password or Bluetooth device, they can select the Utilize
Bluetooth authentication check box and choose “Bluetooth OR password for convenience.”
•If the user wants the increased security of dual-factor authentication, they can choose
“Bluetooth AND password for security,” which requires them to provide both their password
and Bluetooth-enabled device.
Bluetooth security
When the user specifies a Bluetooth device to authenticate their drive, they can further enhance
the security of their Imation SECURE Hard Drive.
For Bluetooth devices that have the Android operating system installed on them, the Android
Imation SECURE Drive App generates a stronger authentication key when installed and used.
For Bluetooth devices that do not have the Android operating system installed on them, if the
user can modify the device name, they can strengthen the drive security by changing the
Bluetooth device name to a unique name.
A. Set up password and hint information
1. Connect an Imation SECURE Hard Drive that is not set up to work with the Imation
SECURE Hard Drive software to a computer that has the software installed on it.
The Imation SECURE Setup dialog box displays.
2. Enter a password in the Password and Confirm boxes.
3. Enter a hint question and answer.
4. To add a Bluetooth device if the Utilize Bluetooth authentication check box is enabled,
select the check box.
5. Click OK.
If the user has selected the check box, the Imation SECURE Bluetooth Preferences
dialog box displays (please refer to “Add a Bluetooth device” on page 5 for further
instructions).
– or –
If the user has not selected it, a message displays when the drive is ready for use.
Page 4
B. Add a Bluetooth device
1. If the Imation SECURE Bluetooth Preferences dialog box displays, choose a Bluetooth
authentication option.
2. Click Discover.
The Imation SECURE Bluetooth Recommendations dialog box displays.
3. Make sure the desired Bluetooth authentication device is within range of the computer,
enable its Bluetooth functionality, if necessary, and make the Bluetooth device
discoverable.
Page 5
4. Follow the instructions relevant for the desired Bluetooth authentication device. Then,
click Continue.
All discoverable Bluetooth devices that are Bluetooth-enabled and within range display
in the Imation SECURE Bluetooth Preferences dialog box list.
5. Select the desired Bluetooth device in the list.
6. Click OK while the Bluetooth device is still discoverable.
7. In the Imation SECURE Enter Device Comment dialog box, enter a comment to help
identify the Bluetooth device later.
Note: This comment displays on the About Imation SECURE dialog box.
Page 6
Loading...
+ 15 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.