IronKey ENTERPRISE S250, ENTERPRISE D250 User Manual

IR
ONKEY™
ENTERPRISE S250/D250
Last Updated: July15, 2016
IRONKEY ENTERPRISE S250/D250 USER GUIDE
GE 2

CONTENTS

QUICK START ................................................................................................ 3
ABOUT MY DEVICE ........................................................................................ 7
How is it different than a regular flash drive? .......................................................................................................... 7
What systems can I use it on? ..................................................................................................................................... 9
How secure is it? .............................................................................................................................................................. 9
Product specifications .................................................................................................................................................. 11
Recommended best practices ................................................................................................................................... 11
USING MY DEVICE ........................................................................................ 12
Setting up the device ................................................................................................................................................... 12
Unlocking and locking the device ............................................................................................................................. 13
Accessing my device if I forget my password .......................................................................................................... 16
Changing my password ................................................................................................................................................ 16
Accessing my secure files ............................................................................................................................................ 17
Encrypting and decrypting files ................................................................................................................................ 17
Creating a secure backup of my files ...................................................................................................................... 17
Updating my device ...................................................................................................................................................... 18
Reformatting my device ............................................................................................................................................... 19
Using my device on Linux ........................................................................................................................................... 19
Finding information about my device ....................................................................................................................... 21
Using onboard applications ........................................................................................................................................ 21
Importing digital certificates ...................................................................................................................................... 23
Using Identity Manager .............................................................................................................................................. 24
Managing my online account settings ..................................................................................................................... 25
WHERE CAN I GET HELP? .......................................................................... 27
For more information ................................................................................................................................................... 27
To contact support ....................................................................................................................................................... 27
はじめに ........................................................................................................... 28
시작하기 ........................................................................................................... 39
入门 .................................................................................................................. 49
開始使用 ........................................................................................................... 59
PRIMEROS PASOS ......................................................................................... 69
MISE EN ROUTE ............................................................................................ 80
ERSTE SCHRITTE ......................................................................................... 90
IRONKEY ENTERPRISE S250/D250 USER GUIDE
GE 3

Quick Start

Enterprise devices must be set up using a Windows or Mac operating system. Once set up, you can use your device on Windows, Mac, or Linux systems. For more information about using your device on Linux, see.
Windows & Mac Setup
Windows Vista (SP2), 7 (SP1), 8, 8 .1 or Mac OS X 10 .9.x - 10.11.x
1. Plug the device into your computer’s USB port.
2. When the Device Setup window appears, follow the on-screen instructions. If this window
does not appear, open it manually:
Windows: Start > My Computer > IronKey Unlocker > IronKey.exe
Mac: Finder > IronKey Unlocker > IronKey
3. When Device Setup is complete, you can move your important files to the IronKey Secure
Files drive (IronKey USB drive for Mac) and they will be automatically encrypted. Some Windows systems prompt to restart after you first plug in your device.You can safely
close that prompt without restartingno new drivers or software are installed.

Mise en route

Installation avec Windows et Mac
Windows Vista (SP2), 7 (SP1), 8, 8 .1 ou Mac OS X 10 .9.x - 10.11.x
1. Branchez le périphérique sur le port USB de votre ordinateur.
2. Lorsque la fenêtre d’Installation du périphérique s’affiche, suivez les instructions à l’écran. Si
cette fenêtre ne s’affiche pas, ouvrez-la manuellement :
Windows :Démarrer > Ordinateur > IronKey Unlocker > IronKey.exe
Mac : Finder > IronKey Unlocker > IronKey
3. Lorsque l’installation du périphérique est terminée, vous pouvez déplacer vos fichiers impor-
tants vers le lecteur Secure Files (Fichiers sécurisés). Ils seront automatiquement cryptés. Certains systèmes Windows vous invitent à redémarrer la première fois que vous branchez
votre périphérique.Vous pouvez fermer cette invite en toute sécurité sans redémarrer, aucun nouveau pilote ou logiciel n’est installé.
IRONKEY ENTERPRISE S250/D250 USER GUIDE
GE 4

Kurzanleitung

Geräte-Setup bei Windows und Mac
Windows Vista (SP2), 7 (SP1), 8, 8 .1 oder Mac OS X 10 .9.x - 10.11.x
1. Stecken Sie das Gerät in den USB-Port Ihres Computers
2. Wenn sich das Fenster „Geräte-Setup― öffnet, folgen Sie den Anweisungen auf dem Bild-
schirm.Wenn sich dieses Fenster nicht öffnet, dann öffnen Sie es wie folgt manuell:
Windows: Start > My Computer > IronKey Unlocker > IronKey.exe
Mac: Finder > IronKey Unlocker > IronKey
3. Wenn das Geräte-Setup abgeschlossen ist, können Sie Ihre wichtigen Dateien auf das Lauf-
werk „Secure Files― verschieben und sie werden automatisch entschlüsselt. Einige Windows-Systeme werden Sie zum Neustart auffordern, wenn Sie das Ihr Gerät zum
ersten Mal anschließen. Sie können diese Aufforderung sicher schließen ohne Neu zu starten – keine neuen Laufwerke oder Software werden installiert.

Inicio rápido

Instalación en Windows y Mac
Windows Vista (SP2), 7 (SP1), 8, 8 .1 o Mac OS X 10 .9.x - 10.11.x
1. Conecte el dispositivo en el puerto USB de su equipo
2. Cuando aparezca la ventana Instalación del dispositivo, siga las instrucciones que se muestran
en pantalla. Si no aparece, ábrala manualmente:
Windows: Inicio > Equipo > IronKey Unlocker > IronKey.exe
Mac: Finder > IronKey Unlocker > IronKey
3. Tras finalizar la instalación del dispositivo, podrá mover sus archivos importantes a la unidad
―Secure Files‖ y estos se cifrarán de forma automática. Algunos sistemas Windows le solicitarán que reinicie el sistema tras conectar el dispositivo
por primera vez. Puede cerrar este mensaje con seguridad sin reiniciar el equipo, no se instalarán drivers ni software nuevo.
IRONKEY ENTERPRISE S250/D250 USER GUIDE
GE 5

クイックスタート

W
indow
Windows Vista (SP2), 7 (SP1), 8, 8 .1
s
および
1. デバイスをコンピューターのUSBポートに挿入します。
2. [デバイスのセットアップ] 画面が表示されたら、画面上の指示に従ってください。
この画面が表示されない場合は、手動で開いてください。
M
ac
のセットアップ
または
Mac OS X 10 .9.x - 10.11.x
Windows の場合:[スタート] > [マイ コンピューター] > [IronKey Unlocker] >
[IronKey.exe]
Mac の場合: [セレクタ] > [IronKey Unlocker] > [IronKey]
3. デバイスのセットアップが完了したら、重要なファイルを「Secure Files」ドライブに移動
せることができ、そこで自動的に暗号化されます。 デバイスを初めて挿し込むと、Windows システムが再起動するようにプロンプトを表示
します。 新しいドライバーまたはソフトウェアがインストールされていない場合、再起動 することなくそのプロンプトを安全に閉じることができます。

빠른 시작

Windows Mac 설정
Windows Vista (SP2), 7 (SP1), 8, 8 .1
1. 컴퓨터 USB 포트로 장치를 꽂습니다.
2. 장치 설정 창이 나타나면 화면의 지침을 따릅니다.
이 창이 나타나지 않으면 다음과 같이 수동으로 엽니다.
또는
Mac OS X 10 .9.x - 10.11.x
Windows: 시작 > 내 컴퓨터 > IronKey Unlocker > IronKey.exe
Mac: Finder > IronKey Unlocker > IronKey
3. 장치 설정이 완료되면 중요한 파일을 „Secure File드라이브로
이동할 수 있습니 다. 이동한 파일은 자동으로 암 호화됩니다. 일부 Windows 시스템에서는 장치를 처음으로 꽂으면 다시
시작하라는 메시지를 표시합니다. 다시 시작하지 않고 메시지를 닫아도 안전 합니다 . 새로운 드라이버나 소프트웨어가 설치되지 않습니다.
IRONKEY ENTERPRISE S250/D250 USER GUIDE
GE 6

快速入

Windows & Mac 安装

Windows Vista (SP2), 7 (SP1), 8, 8 .1 或 Mac OS X 10 .9.x - 10.11.x
1. 设备插到电脑 USB 接口。
2. 设备安装窗口后,按屏幕上的行操作。
如果窗口未示,可手将其打开:
Windows开始 > 我的电脑 > IronKey Unlocker > IronKey.exe
MacFinder > IronKey Unlocker > IronKey
3. 设备安装完成后,可以将重要文件移安全文件驱动器中,文件会自加密
首次插入设备后,某 Windows 会提示重新启动 您可以放心关闭此提示,且无需 重新启 ,因并未安装任何新的驱动程序或软件。

快速入門

Windows Mac 設定

支援系統為:
Windows Vista (SP2), 7 (SP1), 8, 8 .1 或 Mac OS X 10 .9.x - 10.11.x
1. 將裝置連接到您的電腦 USB 連接埠。
2. 當裝置設定視窗出現時,請依照畫面上指示操作。
若此視窗並未出現,請手動開
Windows開始 > 我的電腦 > IronKey Unlocker > IronKey.exe
MacFinder > IronKey Unlocker > IronKey
3. 當裝置設定完成時,即可將您的重要檔案移至「安全檔案」裝置,接著這些檔案就會
自動加密。 部分 Windows 系統會在您第一次連接裝置後,提示您重新啟動電腦。您可以放心關 閉此提示
且無需重新動,因為系統並無安裝任何新的驅動程式或軟體。
IRONKEY ENTERPRISE S250/D250 USER GUIDE
GE 7

About my device

The IronKey Enterprise 250 Series (S250 and D250) is designed to be the world’s most secure USB flash drives. Now you can safely carry your files and data with you wherever you go.
Your device (once set up) will be connected to the IronKey Enterprise Management System that manages your organization’s IronKey devices. Device applications and features are configured by the System Administrator. Some settings that are described in this guide may not be available to you if the administrator has not enabled them for your device.

Device features with administrative control

» Password policies » Password Reset » Auto-locking device » Onboard applications » Force Read-Only mode
» Force Update

How is it different than a regular flash drive?

Hardware Encryption

Inside your device is the IronKey Cryptochip, which protects your data to the same level as highly classified government information. This security technology is always on and cannot be disabled.

Password-Protected To access your secure data, you unlock the device with a password using the Unlocker software

that is carried on the device. Do not share your password with anyone. That way, even if your device is lost or stolen, no one else can access your data.
IRONKEY ENTERPRISE S250/D250 USER GUIDE
GE 8

Self-Destruct Sequence

If the Cryptochip detects physical tampering by a hacker, or if a specified number of consecutive incorrect password attempts have been entered, it can initiate a permanent self-destruct sequence that securely erases all onboard dataso remember your password.

Anti-Malware Autorun Protection

Your device helps protect you from many of the latest malware threats targeting USB flash drives by detecting and preventing autorun execution of unapproved programs. It can also be unlocked in Read-Only Mode if you suspect the host computer is infected.

Simple Device Management

Your device includes the IronKey Control Panel, a central management area for accessing your files, editing your preferences, changing your device password and safely locking your device.

Secure Local Backup and Data Recovery

Securely back up your secure files using the onboard Secure Backup software (Windows only). The backup allows you to recover your data to a new IronKey Enterprise device in case this one is ever lost or stolen.

Onboard Web Browsing

Surf the web through almost any network using the onboard Mozilla Firefox web browser.

Online account

Your online account allows you to use some applications and features, such as resetting a password, updating your device software and creating data. Your online account includes the Security Vault. If your device is ever lost or stolen, you can easily restore your online passwords from this encrypted online backup.

Self-Learning Password Management

Securely store and back up all your online passwords with the IronKey Identity Manager. It allows you to automatically log into your online account to avoid keylogging spyware and phishing attacks.

Waterproof and Tamper-Resistant

Designed to survive the extremes, the rugged metal encasing is injected with an epoxy compound that makes it not only tamper-resistant, but waterproof to military specifications (MIL-STD-810F).
IRONKEY ENTERPRISE S250/D250 USER GUIDE
GE 9

What systems can I use it on?

®
»
Windows
»
Windows
»
Windows
»
Windows
»
Mac
OS
» Linux (2.6+)
8.1
®
8
®
7 (SP1)
®
Vista (SP2)
®
X (10.9.x - 10.11.x)
The computer must have a USB 2.0 port for high-speed data transfer. A USB 1.1 port or powered hub will also work, but will be slower.
Some applications are available only for specific systems:
»
Windows Only
Onboard Firefox Secure Backup Virtual Keyboard IronKey Identity Manager Device updates
CRYPTOCard

» Mac Only

Auto-Launch Assistant

How secure is it?

IronKey Enterprise 250 Series has been designed from the ground up with security in mind. A combination of advanced security technologies are used to ensure that only you can access your data. Additionally, it has been designed to be physically secure, to prevent hardware-level attacks and tampering, as well as to make the device rugged and long-lasting.
The IronKey Cryptochip is hardened against physical attacks such as power attacks and bus sniffing. It is physically impossible to tamper with its protected data or reset the password counter. If the Cryptochip detects a physical attack from a hacker, it destroys the Cryptochip making the stored encrypted files inaccessible.
We strive to be very open about the security architecture and technology that we use in designing and building this product. We use established cryptographic algorithms, we develop threat models, and we perform security analyses (internal and third party) of our systems all the way through design, development and deployment.
IRONKEY ENTERPRISE S250/D250 USER GUIDE
GE 10

DEVICE SECURITY

Data Encryption Keys
» AES key generated by onboard Random Number Generator » AES key generated at initialization time and encrypted with hash of user password » No backdoors: AES key cannot be decrypted without the user password
» AES key never leaves the hardware and is not stored in NAND flash
Data Protection
» Secure volume does not mount until password is verified in hardware » Password try-counter implemented in tamper-resistant hardware
» Once the password try-count is exceeded, the device will initiate a permanent self-destruct
sequence
» Sensitive data and settings are stored in hardware

APPLICATION SECURITY

Device Password Protection
» USB command channel encryption to protect device communications » Password-in-memory protection to protect against cold-boot and other attacks
» Virtual Keyboard to protect against keyloggers and screenloggers
The device password is hashed using salted SHA-256 before being transmitted to the device firmware over a secure USB channel. It is stored in an extremely inaccessible location in the protected Cryptochip hardware. The hashed password is validated in hardware (there is no ―getPassword‖ function that can retrieve the hashed password). Only after the password is validated is the AES encryption key decrypted.The password try-counter is also implemented in hardware to prevent memory rewind attacks.

IDENTITY MANAGER PROTECTION

The Identity Manager and your online account work together, allowing you to back up your online passwords to your Online Security Vault. First, you must unlock your device using two­factor authentication.Your passwords are securely stored in a hidden, hardware-encrypted area inside the device (not in the file system), being first locally encrypted with 256-bit AES, using randomly generated keys encrypted with a SHA-256 hash of your device password.All of this data is then doubly encrypted with 128-bit or 256-bit AES hardware encryption.
When you back up your passwords online, your device performs a complicated public key cryptography handshake with IronKey’s services using RSA 2048-bit keys. After successful authentication, your encrypted block of password data is securely transmitted over SSL to your encrypted Online Security Vault.
IRONKEY ENTERPRISE S250/D250 USER GUIDE
GE 11

Product specifications

Specification
Details
Capacity*
Up to 64GB, depending on the model
Dimensions
75mm X 19mm X 9mm
Weight
0.8 oz
Waterproof
MIL-STD-810F
Operating Temperature
0C, 70C
Operating Shock
16G rms
Hardware Encryption
Data: 256-bit AES (CBC Mode)
Hardware: 256-bit AES
Hashing: 256-bit SHA
PKI: 2048-bit RSA
FIPS Certifications
See www.ironkey.com/en-US/website/certification-and-compliance for details.
Hardware
USB 2.0 (High-Speed) port recommended, USB 1.1
OS Compatibility
Windows Vista (SP2),Windows 7 (SP1), or Windows 8,
Windows 8.1
Mac OS X 10.9.x - 10.11
Unlocker for Linux (2.6+, x86)
Accessibility
IronKey Control Panel is designed to be Section 508 compliant. Users with disabilities have keyboard navigation and screen reader support.
For details about your device, see ―Device Info‖ in the Control Panel settings.
Designed and Assembled in the U.S.A. IronKey Enterprise devices do not require any software or drivers to be installed.
* Advertised capacity is approximate and not all of it will be available for storage. Some space is required for onboard software.

Recommended best practices

» Create an online account so that you can:
reset a forgotten device password
back up your Identity Manager passwords
» Lock the device
when not in use
before unplugging it
before the system enters sleep mode
» Never unplug the device when the LED is on » Never share your device password
» Perform a computer anti-virus scan before setting up the device
IRONKEY ENTERPRISE S250/D250 USER GUIDE
GE 12

Using my device

Setting up the device

Enterprise devices must be set up using a Windows or Mac operating system. Once set up, you can use your device on Windows, Mac, or Linux systems. The setup process is the same for systems running a Microsoft Windows or Mac operating system.
1. Plug the IronKey device into your computer’s USB port. The ―Device Setup‖ screen appears.
The setup software runs automatically from a virtual DVD. This screen may not appear if your computer does not allow devices to autorun. You can start it manually by:
WINDOWS: Double-clicking the ―IronKey Unlocker‖ drive in ―My Computer‖ and
launching ―IronKey.exe‖.
MAC: Opening the IronKey Unlocker drive in Finder and opening the IronKey application
in the IronKey Unlocker folder. You can install the Auto-Launch Assistant, so that the Unlocker will automatically open when you plug in a device. See ―Installing the Auto- Launch Assistant (Mac only)‖ on page 14.
2. Type or paste the Activation Code. You should have received the code in an email
message sent from your Administrator.
3. Select a default language preference, agree to the end-user license agreement, and then click
the ―Activate‖ button. By default, IronKey software will use the same language as your computer’s operating system.
4. Type a device password and confirm it, and then click the ―Continue‖ button.
Your password is case-sensitive and must comply with the password policy set by the administrator.
5. If you are prompted to provide an email address for an online account, enter it now and
click the ―Continue‖ button. A message prompt will appear indicating that an email has been sent to you. Follow the
instructions in the email to set up your online account; this includes creating a ―secret question‖.
Your online account is required for some security features, such as resetting a password, updating your device software, and creating online backups of Identity Manager data.
6. Once you have set up your online account, click OK in the message prompt to proceed with
the device setup.
7. Click ―Continue". The device initializes.
IRONKEY ENTERPRISE S250/D250 USER GUIDE
GE 13
During this process, it generates the AES encryption key, creates the file system for the secure volume, and copies secure applications and files to the secure volume.
When the initialization is complete, the IronKey Control Panel appears.Your device is now ready to protect your data and can be used on a Windows, Mac or Linux computer. Some policies set by the administrator may restrict use of the product to systems running only Windows and Mac.

Installing the Auto-Launch Assistant (Mac only)

Installing the Auto-Launch Assistant will automatically open the IronKey Unlocker window when you plug in your device on that computer. This feature is only available on a Mac.
1. Unlock your device and click the ―Settings‖ button in the menu bar.
2. On the ―Tools‖ side bar, click the ―Install Auto-Launch Assistant‖ button.
TIP: To uninstall it, click on the ―Uninstall Auto-Launch Assistant‖ button

Unlocking and locking the device

UNLOCKING THE DEVICE

The unlock process is the same for Windows and Mac systems. For Linux systems, see ―Using my device on Linux‖ on page 20.
1. Plug in your device and wait for the Unlocker window to appear.
If the Unlocker window does not appear, you can start it manually by:
WINDOWS: Double-clicking the ―IronKey Unlocker‖ drive in ―My Computer‖ and
launching ―IronKey.exe‖.
MAC: Opening the IronKey Unlocker drive in Finder and opening the IronKey application
in the IronKey Unlocker folder.
NOTE: On a Mac you can install the Auto-Launch Assistant, which automatically opens
the Unlocker when you plug in an IronKey Enterprise device.
2. Type your device password and click ―Unlock". The IronKey Control Panel will appear.
Optionally, you can click the ―Read-Only Mode‖ check box to unlock the device in Read-
Only Mode.
Entering your password correctly (which is verified in hardware) will mount your secure
volume with all your secure applications and files. Entering the wrong password a consecutive number of timesdepends on the password
settings defined by the administratorwill permanently destroy the device and all your
onboard data.
As a security precaution, you must unplug and reinsert the device after every three failed
password attempts.
IRONKEY ENTERPRISE S250/D250 USER GUIDE
GE 14
Unlocking in Read-Only mode
You can unlock your device in a read-only state so that files cannot be edited on your secure drive. For example, say that you want to access a file on your device while using an untrusted or unknown computer; unlocking your device in Read-Only Mode will prevent any malware on that machine from infecting your device or modifying your files. Administrators can also set your device to unlock in a read-only state.
1. Plug in your device and launch the Unlocker.
2. Click the ―Read-Only Mode‖ check box.
3. Click the ―Unlock‖ button.
» You will see a message in the Control Panel that indicates you are in Read-Only Mode. » When you unlock your device in Read-Only Mode, you will remain in Read-Only Mode until
you lock your device.
» Some features are not available in Read-Only Mode because they require modifying files on
your device. Examples of unavailable features include reformatting, restoring applications, editing files on the Secure Files drive, editing the Applications List, and running onboard Firefox.
» To unlock your device in Read-Only Mode on Linux, enter: ironkey --readonly
Changing the Unlock message
This feature, if enabled by the System Admin, allows you to create a message that appears on the IronKey Unlocker window. For example, you can provide contact information so that if you lose your device someone will know how to return it to you.
1. Unlock your device and click the ―Settings‖ button in the menu bar.
2. Click the ―Preferences‖ button in the left sidebar.
3. Enter text in the ―Unlock Message‖ field.
Your message text must fit the space provided (approximately 7 lines and 200 characters).

LOCKING THE DEVICE

Click the ―Lock‖ button in the bottom left of the Control Panel to safely lock your
device.You can also use the keyboard shortcut: CTRL + L. If you want the device to automatically lock when not in use, see ―Setting the device to automatically lock‖ on page
16.
NOTE: If you have applications or files open on the Secure Files drive, you might not be able to
lock your device (this prevents potential file corruption). Close any open onboard applications and files and retry locking the device.
NOTE: An administrator can remotely disable your device if necessary. Disabling an unlocked
device will automatically lock the device.You cannot unlock the device unless the System Admin re-enables the device.
CAUTION: Once the device is locked, you can safely unplug it. However, do not unplug the
device when it is unlocked.
IRONKEY ENTERPRISE S250/D250 USER GUIDE
GE 15
Setting the device to automatically lock
If enabled by your System Admin, you can set a device time-out to automatically lock your device after a specified period of inactivity. This will help prevent others from accessing your secure files.
1. Unlock your device and click the ―Settings‖ button in the menu bar.
2. Click the ―Preferences‖ button in the left sidebar.
3. Click the checkbox for auto-locking the device and set the time-out for either 5, 15, 30, 60,
120, or 180 minutes.
If a secure file has been opened, it may not be safe to lock the device; otherwise, you may lose the file changes or corrupt the file.The device will continue to try to lock in this situation, but will not force the application to quit.You can configure the setting to force the device to lock; however, you risk losing data in any opened and modified files.
IMPORTANT: Forcing a device to lock can result in data loss. If your files have become
corrupt from a forced lock procedure or from unplugging the device before locking, you might be able to recover the files by running CHKDSK and using data recovery software.
To run CHKDSK (Windows only)
1. Unlock the device.
2. Use the following keyboard shortcut to bring up the ―Run‖ prompt:
WINDOWS LOGO BUTTON + R.
3. Type CMD‖ and press ENTER.
4. From the command prompt, type CHKDSK, the Secure files drive letter,
and then ―/F /R‖. For example, if the Secure Files drive letter is G, you would enter:
CHKDSK G: /F /R
5. Use data recovery software if necessary in order to recover your files.

TYPING PASSWORDS WITH THE VIRTUAL KEYBOARD

If you are unlocking your device on an unfamiliar computer and are concerned about keylogging and screenlogging spyware, use the IronKey Virtual Keyboard. It helps protect your device password by letting you click out letters and numbers. The underlying techniques in the Virtual Keyboard will bypass many trojans, keyloggers, and screenloggers.
You can start the Virtual Keyboard in a couple of ways:
1. Click the Virtual Keyboard icon in a password field on the IronKey Unlocker or Control
Panel.The Virtual Keyboard appears.
Alternatively, when the keyboard focus is in a password field you can press CTRL+ALT+ V.
2. Click the keys to type your password. Click ―Enter‖ when you are finished.
IRONKEY ENTERPRISE S250/D250 USER GUIDE
GE 16
You can use the Virtual Keyboard in conjunction with the actual keyboard, so that you
type some characters and click some characters. You can also optionally click the ―Randomize‖ button to randomize where the keys are
located. This helps protect against screenloggers.
NOTE: This feature is available on Windows only and uses a standard QWERTY keyset. The
language preference for the device must be set to English.
NOTE: When you click a key in the Virtual Keyboard, all of the keys briefly go blank. This
feature prevents screenloggers from capturing what you clicked. If you do not want to use this feature, you can disable it in the options menu beside the ―Close‖ button.

Accessing my device if I forget my password

If you forget your password, you can reset it if an administrator has granted you password reset privileges. Otherwise, you must contact your administrator.
1. Plug in your device and launch the Unlocker.
2. Click the ―Password Help‖ button.
3. On the Password Help prompt, click the ―Reset Password‖ button.An email will be sent to
the email address provided during account setup with instructions on how to proceed.
4. After you complete the instructions in the email message, click the ―Continue‖ button.
5. Type your new password, or use the Virtual Keyboard, and confirm the password in the fields
provided, then click the ―Change Password‖ button.

Changing my password

Password settings are determined by an administrator. Sometimes you may be required to change your password to comply with new corporate password policies. When a change is required, the Password Change screen will appear the next time you unlock the device. If the device is in use, it will lock and you will have to change the password before you can unlock it.
It is also good security practice to regularly change your password on your own. However, be especially careful to remember your device password.
1. Unlock your device and click the ―Settings‖ button in the menu bar.
2. Click the ―Password‖ button in the left sidebar.
3. Enter your current password in the field provided.
4. Enter your new password and confirm it in the fields provided.
5. Click the ―Change Password‖ button.
NOTE: If you created a backup with the Secure Backup application, restoring the backup will
require you to enter the device password that was used at the time of the back up.
IRONKEY ENTERPRISE S250/D250 USER GUIDE
GE 17

Accessing my secure files

After unlocking the device, you can access the files securely stored on the device by:
Clicking the ―Files‖ button (folder icon) in menu bar of the IronKey Control Panel.
WINDOWS: Opening Windows Explorer to the ―Secure Files‖ drive.
MAC: Opening Finder to the ―Secure Files‖ drive.
TIP: You can also access your files by right-clicking the IronKey icon on the Windows taskbar
and clicking ―Secure Files‖.

Encrypting and decrypting files

Everything you store on your IronKey Enterprise device is encrypted. Since the device has a built-in Cryptochip, all of the encryption and decryption is done for you ―on-the-fly‖, giving you the convenience of working as you normally would with a regular flash drive, while providing strong and ―always-on‖ security.
Drag a file onto the Secure Files drive to automatically encrypt it.
Files opened from the Secure Files drive are automatically decrypted as you open them.

Creating a secure backup of my files

If your device has the Secure Backup application onboard, you can restore an encrypted backup of your data to a new or existing IronKey Enterprise device (Windows only, English only).
Secure Backup saves an encrypted backup of some or all of your onboard files to your local computer or network fileshare.You use the same application to restore one or all of your files.
1. In the Applications list of the IronKey Control Panel, click the ―Secure Backup‖ button to
open the program (Windows only)
The Secure Backup window should appear, displaying the Secure Files drive.
2. Select the files you want to back up.
3. Click the check boxes next to the files you want to back up.
A green check mark means all files in this folder and all sub-folders will be backed up
A red minus sign means only some of the files in this folder or its subfolders will be
backed up
4. Type the path to the destination folder for the backed up files or use the Browse button to
locate it.
IRONKEY ENTERPRISE S250/D250 USER GUIDE
GE 18
The destination folder can be an existing folder, a new folder, or a separate drive (for
example, a network fileshare)
5. Click ―Backup Now". The files will be encrypted and backed up.
NOTE: While the files are securely encrypted, the filenames are not. To hide the filenames, zip
the files you want to back up before you create the backup file.
IMPORTANT: Do not add, alter, or delete the backed up files or you may be prevented from
restoring them later.

RESTORING FILES TO THE DEVICE FROM A BACKUP FILE

1. In the Applications list of the IronKey Control Panel, click the ―Secure Backup‖ button to
open the program (Windows only).
The Secure Backup window should appear, displaying the Secure Files drive.
2. Select the ―Restore from My Computer‖ tab.
3. Select the destination folder you had chosen previously when backing up your data.
Make sure to select the folder that contains the backup file, not files or folders within
that folder.
4. Select which files/folders to restore and click ―Restore Now‖. Restored files will overwrite
existing files of the same name on the Secure Files drive.
NOTE: If the data was backed up from a different IronKey Enterprise device, you must use the
device password for that device in order to restore the files to another device.

Updating my device

You can securely update software and firmware on your device through signed updates that are verified in hardware. Keeping your device up-to-date helps protect you from future malware and online threats. If enabled for your device by an administrator, you will receive an update notification when a new update becomes available. You must update your device within the time period indicated in the message. If you do not update your device within the time allowed, access to your files may be restricted to read-only until you update your device.
1. Unlock your device and click the ―Settings‖ button on the menu bar of the IronKey Control
Panel.
2. Click the ―Tools‖ sidebar and in the Updates section, click the ―Check for Updates‖ button.
3. If an update is available, click ―Download‖ to install it.
NOTE: You must use a computer running Windows to download and install software updates. TIP: You can check for updates automatically each time you unlock your device by clicking the
―Automatically check for updates‖ check box. If your administrator has already set this option, the check box will appear enabled and dimmed.
IRONKEY ENTERPRISE S250/D250 USER GUIDE
GE 19

Reformatting my device

Reformatting the Secure Files drive will erase all your secure files and your Application List, but it will not erase your device password and settings.
1. Unlock your device and click the ―Settings‖ button in the menu bar.
2. Click the ―Reformat Secure Volume‖ button.
TIP: Back up your data prior to reformatting; otherwise, it will be erased.

Using my device on Linux

You can use your IronKey Enterprise device on several distributions of Linux (x86 systems only with kernel version 2.6+). However, you must set up the device using a Windows or Mac operating system. Some policies set by the administrator may restrict use of the product to systems running only Windows and Mac.

USING THE UNLOCKER

Use the Unlocker for Linux to access your files and change your device password on Linux, allowing you to securely transfer files from and between Windows, Mac, and Linux computers.
Depending on your Linux distribution, you might need root privileges to use the program ironkey‖ found in the Linux folder of the mounted virtual DVD. If you have only one IronKey Enterprise device attached to the system, run the program from a command shell with no arguments (e.g. ironkey). If you have multiple IronKey Enterprise devices, you must specify which one you want to unlock.
NOTE: ironkey only unlocks the secure volume; it must then be mounted. Many modern Linux
distributions do this automatically; if not, run the mount program from the command line, using the device name printed by ironkey.
To unlock the device in Read-Only Mode, enter:
ironkey --readonly When prompted, type your password.
To unlock the device, enter:
ironkey --unlock When prompted, type your password.
To lock the device, you must either unmount and physically remove (unplug) it, or else run:
ironkey --lock
Simply unmounting the device does not automatically lock the secure volume.
To lock the device named “devicename,” enter:
ironkey --lock [devicename]
IRONKEY ENTERPRISE S250/D250 USER GUIDE
GE 20
Please note the following important details for using your device on Linux:
1.
Kernel Version must be 2.6 or higher
If you compile your own kernel, you must include the following in it:
» DeviceDrivers->SCSIDeviceSupport-><*>SCSICDROMSupport » DeviceDrivers-><*> Support for Host-side USB » DeviceDrivers-><*> USB device filesystem » DeviceDrivers-><*> EHCI HCD (USB 2.0) support » DeviceDrivers-><*> UHCI HCD (most Intel and VIA) support
» DeviceDrivers-><*> USB Mass Storage Support
The kernels that are included by default in most major distributions already have these features, so if you are using the default kernel that comes with a supported distribution you do not need to take any other action.
Also, on 64-bit linux systems the 32-bit libraries must be installed in order to run the ironkey program. Consult the distribution’s help resources for assistance and more information.
2.
Mounting problems
» Make sure you have permissions to mount external SCSI and USB devices » Some distributions do not mount automatically and require the following command to be
run:
mount /dev/<name of the device> /media/<mounted device name>
» The name of the mounted device varies depending on the distribution. The names of the
IronKey Enterprise devices can be discovered by running:
ironkey --show
3.
Permissions
» You must have permissions to mount external/usb/flash devices » You must have permissions to run executables off the device’s virtual DVD in order to
launch the Unlocker
» You might need root user permissions
See the Linux folder on the device’s virtual DVD for information about how to set up permissions to allow non-root users to access their IronKey Enterprise devices.All of these methods require that the system administrator take (one time) action to enable access; after that, ordinary users can lock, unlock, and change passwords on any IronKey Enterprise devices they plug in.
4.
Supported distributions
Not all distributions of Linux are supported. Please visit http://support.ironkey.com for the latest list of supported distributions.
5.
The IronKey Unlocker for Linux only supports x86 systems at this time.
IRONKEY ENTERPRISE S250/D250 USER GUIDE
GE 21

Finding information about my device

VIEWING DEVICE INFORMATION

1. Unlock your device and click the ―Settings‖ button in the menu bar.
2. Click the ―Device Info‖ button in the left sidebar.
On this screen you can view details about your device, including:
Model number
Serial number
Software and firmware versions
Secure files drive letter
Operating System and system administrative privileges
TIP: You can also click the ―Copy‖ button to copy the device information to the clipboard for
pasting in an email, forum posting or support request.

DETERMINING THE STORAGE SPACE AVAILABLE ON THE DEVICE

The Capacity Meter at the bottom right of the Control Panel provides current information about how much data storage is
available on your device.The green bar graph represents how full the device is (for example, the meter will be totally green when the device is full), while the white text on the Capacity Meter displays how much free space remains.

Using onboard applications

Your administrator determines the applications that are installed on your device.

BROWSING THE WEB WITH ONBOARD FIREFOX

If enabled, a Firefox web browser is already onboard your device, so none of your cookies, history files, bookmarks, add-ons or online passwords are stored on the local computer. Now you can carry your personalized web experience with you to other computers without worry.
Click the ―Applications‖ button on the menu bar of the Control Panel, and then click the
Mozilla Firefox application.
NOTE: If you have a local version of Firefox running at the same time, you will be prompted to
close it.
TIP: You can also open onboard Firefox by right-clicking the IronKey icon in the Windows
taskbar and clicking ―Secure Browser.‖
IRONKEY ENTERPRISE S250/D250 USER GUIDE
GE 22

SCANNING MY DEVICE FOR MALWARE

If enabled by your System Administrator, the IronKey Malware Scanner is a self-cleaning technology that detects and removes malware that gets on your device from an infected file or machine. Powered by the McAfee® Anti-Virus and Anti-Malware signature database, and constantly updated to combat the latest malware threats, the scanner first checks for the latest updates, then scans your device, and reports and cleans any malware that is found.
Some things to know about scanning your device:
» The scanner runs automatically when you unlock your device.
It scans any running system processes and all onboard files (compressed and
uncompressed) . It reports and cleans any malware that it finds.
» The scanner will automatically update itself before each scan to protect you from the latest
malware threats.
An update requires an Internet connection.
Ensure a minimum of 135 MB of free space on the device to accommodate the
downloaded malware signature files. Your first update may take a long time to download depending on your Internet
connection. The date it was last updated is displayed onscreen.
If the scanner becomes too far out of date, it will need to download a large file to bring it
back up-to-date.

EDITING THE APPLICATIONS LIST

The Applications List is the area where you can quickly launch onboard applications and files. Items in the list are shortcuts to actual files. Managing the items in the list does not alter the actual file.
1. Unlock your device.The Control Panel will appear with the Applications List selected by
default.
2. If the Control Panel is already open, click the ―Applications‖ button in the menu bar to view
the Applications List. Do one of the following:
To add a file or application shortcut—Drag a file from the desktop to the
Applications List area to add it to the list. To add, rename, sort or delete items in the list—right-click anywhere in the
Application List and choose the action from the options menu. To change the way icons appear in the list—right-click anywhere in the Application list
and choose, "Large icons", "List‖, or ―Tile‖.
Some things to know about the Applications List:
» You can add any file to the list, including documents, images, and batch files. » For items that are not applications, the operating system opens the item with the default
program associated with that filetype.
» Items that are Windows executables will be hidden from view on the Mac. Similarly, Mac
application files will be hidden from view on Windows computers.
IRONKEY ENTERPRISE S250/D250 USER GUIDE
GE 23

RESTORING ONBOARD APPLICATIONS

You can restore your onboard applications if they are ever erased or corrupted (Windows only).
1. Unlock your device, and click the ―Settings‖ button on the menu bar of the IronKey Control
Panel.
2. Click the ―Tools‖ button in the left sidebar and then, under Device Health, click the ―Restore
Onboard Apps‖ button.

Importing digital certificates

The Cryptochip includes a limited amount of extremely secure hardware storage space, which you can use to store the private key associated with a digital certificate. This provides you with additional strong authentication capabilities. For example, you could store a self-signed certificate used for internal systems that will allow you to automatically log in when using the onboard Firefox web browser.
The import process uses IronKey’s PKCS#11 interface and requires Mozilla Firefox. Note that there is space for five additional private keys in the Cryptochip; these keys will receive the security benefits of the Cryptochip’s tamperproof hardware and self-destruct mechanisms.
1. Start onboard Firefox.
2. Click the ―Firefox‖ menu, and then click ―Options‖.
3. In the ―Options‖ window, click the ―Advanced‖ icon, and then click the ―Encryption‖ tab.
4. Click the ―View Certificates‖ button to open the Firefox Certificate Manager.
5. IronKey’s certificate is available here. To add your own, click the ―Import‖ button.
6. Browse to the PKCS#12-format certificate file and open it.
You will be prompted for the location of the PKCS#12-format certificate file (the file extension is .p12 in UNIX/Linux, .pfx in Windows).
7. A window appears asking you to confirm where to store the certificate. Choose ―IronKey
PKCS#11‖.
8. Enter the password that was used to protect the certificate. If no password was used, simply
leave the text field blank.
9. Your certificate is now stored securely in the IronKey Cryptochip and is available for use in
the onboard Mozilla Firefox.
NOTE: When deleting certificates, you must restart Firefox for the action to take effect.You
cannot delete the IronKey certificate that was pre-packaged with your device.
IRONKEY ENTERPRISE S250/D250 USER GUIDE
GE 24

Using Identity Manager

If IronKey Identity Manager is enabled on your device, you can use it to securely store and use important identity credentials, such as login information and one-time passwords to applications and online accounts. With the click of a button, it automatically launches a specified application, fills in your username and password, and then logs you in. It can even generate strong passwords for you, so that you can lock down your important accounts.
Identity Manager also allows you to back up your encrypted Identity Manager data to your Online Security Vault in your online account.The backup synchronizes password data between IronKey Enterprise devices and allows you to securely restore all your passwords to a new device if your device is ever lost or stolen. Only you can access and decrypt your passwords.
Identity Manager does not store your passwords in a file on the file system of the flash drive, so malware cannot copy your password database. Also, since your passwords are not typed in this provides added protection from keyloggers and other crimeware.
The Identity Manager works with VeriSign’s VIP service to lock down many important online accounts, including eBay, PayPal,AOL, and Geico accounts. This new technology generates a one­time password for each login, locking down your online account so that it can only be used from your device.
See the Help file for detailed information about the benefits of using Identity Manager. To view it, click the Help icon in the top right of the main Identity Manager window.

To start Identity Manager

1. Unlock your device and click the ―Applications‖ button in the menu bar of the Control Panel.
2. Click ―Identity Manager‖.

To modify settings in Identity Manager

Start Identity Manager and click the ―Settings‖ button in the main Identity Manager window.
See the Help file for more information.

ADDING ACCOUNTS AND PASSWORDS

You can add accounts to Identity Manager in several ways:
» Restore them from your Online Security Vault. » Import them from Firefox, KeePass, RoboForms or Internet Explorer. » Add them manually using the ―Add‖ button in the main Identity Manager window. » When on a particular website, select ―Add Account‖ from the Titlebar Menu.
» Use the Identity Manager’s built-in self-learning approach to capture your logins by logging
into a site as usual.The Identity Manager prompts you to store this password securely on your device.
Generate strong and random passwords
You can create strong random passwords with Identity Manager when you add or edit an account. Once you create the password, Identity Manager can remember them for you.
IRONKEY ENTERPRISE S250/D250 USER GUIDE
GE 25

LOGGING INTO AN ACCOUNT AUTOMATICALLY

The next time you return to a website or application for which you have stored a password, your login automatically fills in for you. If you have the auto-login option enabled for that account, the Identity Manager also submits the login.
You can also automatically log in by:
» Using the IronKey Launcher (Ctrl + Alt + R). » Using the Titlebar menu in the top right of the application window. » Using the IronKey System Tray Menu.
» Clicking the ―AUTO‖ button in the main Identity Manager window.

EDIT AND DELETE ACCOUNTS AND LOGINS

You can manage your Identity Manager accounts from within the main Identity Manager window.
1. Unlock your device and Open Identity Manager.
2. Double-click the account, or select it and click the ―Edit‖ button.
Your data is automatically saved when you finish making your edits.

LOCKING DOWN ACCOUNTS WITH VERISIGN VIP

You can lock down some important online accounts with VeriSign’s VIP service so that they can only be accessed using your device. Log into eBay or PayPal, and the Identity Manager will guide you through the rest.
TIP: You can also manually use the VeriSign VIP service for an account by editing the account
and selecting VeriSign VIP from the ―Additional Authentication‖ list.

BACKING UP AND RESTORING MY IDENTITY MANAGER DATA

You can securely back up your encrypted Identity Manager data to your Online Security Vault. You can synchronize devices (or set up Master-Slave relationships) by restoring backups to your other IronKey Enterprise devices.
To create a backup—Open Identity Manager and click the ―Backup‖ button, then select
―Online Backup‖. To restore a backup—Open the Identity Manager and click the ―Backup‖ button, then
select ―Online Restore‖

Managing my online account settings

NOTE: You may not have an online account if your System Administrator has not enabled this
feature. Online accounts are typically created during device setup.You must have an online account to use features such as resetting a password, updating your device software, and creating online backups of Identity Manager data.
IRONKEY ENTERPRISE S250/D250 USER GUIDE
GE 26
Your device supports advanced cryptographic authentication using strong PKI key pairs
Task
Description
Review account activity
Click ―Account Dashboard‖ to monitor recent events such as logins, failed password attempts and so on.
Set up email alerts
Click ―Account Alerts‖ to have email alert notices sent to you when specific activities occur, such as an incorrect secret question attempt. You can also sign up to be notified of new Ironkey product
Edit Secret Questions and Answers
Click the ―Edit‖ button to modify your Secret Question responses that you provided during the setup of your online account. You can also edit time zone data.
generated in the Cryptochip. When you log into your online account from your device, it uses these unique keys as your digital identity credentials. This locks down your account so that you must have both your device and your password in order to gain access. In other words, only you can access your online account, even if someone stole your device or password.

To log on to your online account

1. Unlock your device and click the ―Settings‖ button on the menu bar of the Control Panel.
2. Click the ―Account‖ button in the left sidebar.
3. Click the ―Manage Account Settings‖ button.

CHANGING DEVICE NICKNAME

If you own more than one IronKey Enterprise device, you can create nicknames for each device. Names help you tell the devices apart from eachother.
1. Log on to your online account.
2. On the ―My IronKeys‖ tab, click the ―Edit‖ button beside the device whose nickname you
want to change.
3. Type a new nickname in the box and click the ―Save‖ button.

MANAGING ACCOUNT SETTINGS

The following table describes some tasks you can perform when you log on to your online account.
Access your online account and then follow the steps in the table below.
NOTE: You cannot update email addresses in your online profile unless you are a System
Administrator.
IRONKEY ENTERPRISE S250/D250 USER GUIDE
GE 27

Where can I get Help?

support.ironkey.com
Support information, knowledgebase and video tutorials
http://www.ironkey.com
General information

For more information

To contact support

http://support.ironkey.com
S250/D250 USER GUIDE
ページ

はじめに

このセクションでは、いくつかの基本操作についての簡単な概略を説明し、IronKeyデ バイスの 使用に役立ちます。IronKey Enterprise デバイスを使用している場合、シス テム管理者によっ て管理されている Enterprise ソリューションとリンクしています。 結果として、このセクショ ンのいくつかの設定は、管理者が有効にしない場合は利用で きない可能性があります。
デバイスIronKeyの IronKey コントロールパネルソフトウェアは、いくつかの言語に 翻 訳されています。 しかし、IronKey マルウェア検索プログラム (Enterprise デバ イス専 用)、個人情報管理、オンボード Firefox, バーチャルキーボード、いくつかのオンボー ドアプリケーションは英語のみ です。オンラインアカウントの Web サイトやデフォルトの電子メールメッセージも 英語のみです。
このセクションでは、次についての情報を含んでいます。
»

システム要件

»
推奨されるベストプラクティス
»
デバイスのセットアップ
»
デバイスのロック解除
»
デバイスのロック
»
セキュアファイルへのアクセス
»
ファイルの暗号化および解読
»
パスワードを忘れた場合のデバイスへのアクセス
»
言語基本設定の変更
»
ファイルのセキュアバックアップの作成
»
Linux でのデバイスの使用
»
ヘルプの入手場所
システム要件
»
Windows 8.1
»
Windows 8
»
Windows 7 (SP1)
»
Windows Vista (SP2)
»
Mac OS X
»
Linux (2.6+)
コンピュータは高速データ転送のため USB 2.0 ポートが必要です。USB 1.1 ポートまた は電 源付きハブでも作動しますが、速度は遅くなります。
(10.9.x - 10.11)
S250/D250 USER GUIDE
ページ
いくつかのアプリケーションは、特定のシステム専用です。
» Windows のみ
オンボード Firefox
セキュアバックアップ
バーチャルキーボード
IronKey 個人情報管理
» Mac 専用—Auto-Launch Assistant

推奨されるベストプラクティス

» オンラインアカウントを作成すると、次のことが可能になります。
デバイスのパスワードを忘れた場合にリセットする
個人情報管理パスワードをバック アップする
» デバイスをロックしてください
使用していない場合
取り外す前
システムがスリープモードになる前
» LED が点灯しているときは絶対にデバイスを取り外さないでください » デバイスのパスワードを共有しないでください » デバイスをセットアップする前に、コンピュータのウイルス対策スキャンを行います

デバイスのセットアップ

セットアップ プロセスは、Windows と Mac のシステムでは同じです。Linux システム に関し ては、Linux でのデバイスの使用をご覧ください。
1. Ironkey デバイスをコンピュータの USB ポートに接続します。[デバイスセットア
ッ プ] 画面が表示されます。 セットアップソフトウェアが、仮想 DVD から自動的に実行されます。この画面は、 コンピ
ュータでデバイスを自動実行できない場合は、表示されない場合がありま す。次の手順で手 動で開始できます。
WINDOWS: [マイコンピュータ] [IronKey Unlocker] ドライブをダブルクリッ
クして、[IronKey.exe] を起動します。 MAC: Finder IronKey Unlocker ドライブを開き、IronKey Unlocker フォル
ダの Ironkey アプリケーションを開きます。
2. アクティベーションコードを入力しま す。管理者によって送信された、電子メールメッセー
ジに記載されているコードを
受け取る必要があります。
S250/D250 USER GUIDE
ページ
3. デフォルトの言語基本設定を選択し、使用許諾契約に従うことに同意して、[アクテ
ィベート] ボタンをクリックします。
デフォルトでは、Ironkey ソフトウェアはコンピュータのオペレーティングシステ ムと同じ言語を使用します。
4. デバイスパスワードを入力し、[続行] ボタンをクリックします。
パスワードは大文字と小文字が区別され、少なくとも 4 文字以上である必要があり ます。
5.
オンラインアカウントに電子メールアドレスの入力が すぐに入力して、[続行] ボタンをクリックします。
6. メッセージのプロンプトが表示され、電子メールが送信されたことを示します。電
子メールの指示に従い、オンラインアカウントをセットアップします。これには「 秘密の質問」の作成が含まれます。
パスワードリセット、デバイスソフトウェアの更新など、オンラインアカウ ト
にはいくつかのセキュリティ機能が必要です。
7. デバイスにオンラインアカウントをセットアップしたら、メッセージプロンプトの
[OK] をクリックし、デバイスのセットアップを進めます。
8. デバイスが初期化されます。このプロセス中、AES 暗号キーが生成され、ソース
ボ リュームのファイルシステムが作成され、セキュアアプリケーションとファイ ルが セキュアボリュームにコピーされます。
指示されている場合、
9. 初期化が完了したら、IronKey コントロールパネルが表示されます。デバイスはデ ータを保
護する準備ができており、WindowsMac または Linux で使用できます。
Unlocker 画面に表示されているメッセージを追加または変更する場合は、パス ワードを
忘れた場合のデバイスへのアクセスをご覧ください

デバイスのロック解除

ロック解除プロセスは、Windows と Mac システムでは同じです。Linux システムに関 しては 、Linux でのデバイスの使用をご覧ください。
1. デバイスを接続し、Unlocker ウィンドウが表示されるまでお待ちください。
Unlocker ウィンドウが表示されない場合、次の手順で手動で開始できます。
WINDOWS: [マイコンピュータ] [Ironkey Unlocker] をダブルクリックし
て、[IronKey.exe] を起動します。
MAC: Finder IronKey Unlocker ドライブを開き、IronKey Unlocker フォル
ダの Ironkey アプリケーションを開きます。
注: Mac では、デバイスに接続するとき、自動的に Unlocker を開く Auto-
Launch Assistant をインストール IronKey できます。
Loading...
+ 70 hidden pages