Kingston Technology IRONKEY D300SM User Manual

IRONKEY™D300SM SECURE USB 3.0 FLASH DRIVE
User Guide
1
Contents
About This Guide ......................................................................................................................................... 3
Quick Start ...................................................................................................................................................... 4
About My Device ............................................................................................................................................... 4
How Is This Different Than A Regular USB Drive?.......................................................................................... 4
What Systems Can I Use It On? .................................................................................................................. 5
Someapplicationsareonlyavailableonspecificsystems:WindowsOnly ................................................... 5
Produc t Specifications .................................................................................................................................... 5
Recommended Best Practices .................................................................................................................. 6
Setting Up My Device ................................................................................................................................... 6
Device Access (Windows Environment) ......................................................................................................... 6
Device Access (macOS Environment) ......................................................................................................... 7
IronKey Control Panel. ..................................................................................................................................... 7
Setting Up A Managed Device With IronKey EMS ...................................................................................... 8
Using My Device - Managed Features ...................................................................................................... 9
Accessing My Secure Files .............................................................................................................................. 9
Unlocking In Read-Only Mode ...................................................................................................................... 9
Changing The Unlock Message...................................................................................................................10
Locking The Device ....................................................................................................................................... 10
Typing Passwords With The Virtual Keyboard ..................................................................................................12
Managing Passwords ....................................................................................................................................... 12
Formatting My Device .................................................................................................................................. 13
OptionsareforWindowsoperatingsystemsonly‐macOSwillautomaticallyformattoFAT32 ................. 13
FAT32 ........................................................................................................................................................................ 13
exFAT ............................................................................................................................................................................. 13
Finding Information About My Device .......................................................................................................13
Editing The Applications List ...................................................................................................................... 14
Resetting My Device ........................................................................................................................................ 14
Using My Device - Managed Only Features ........................................................................................... 15
Accessing My Device If I Forget My Password ........................................................................................... 15
Scanning My Device For Malware ................................................................................................................ 15
Using ZoneBuilder In SafeConsole .............................................................................................. .............. 16
Using My Device On Linux ...................................................................................................................... 16
Using The Unlocker ........................................................................................................................................... 16
Where Can I Get Help? ............................................................................................................................... 17
2
About This Guide
IronKey either SafeConsole or IronKey EMS. Both SafeConsole and IronKey EMS are secure cloud or on­premises management platforms that allow your organization to centrally manage compatible USB (Universal Serial Bus) storage devices easily and efficiently.
This guide will explain how to setup and initialize a D300SM drive as either a SafeConsole or IronKey EMS managed drive.
TM
D300SMis a Managed drive that requires a device license and can be managed by
3
Figu re 1: IronKey D300SM
Quick Start
Windo ws (7, 8.1, 10) & mac OS Setup ( v. 10 . 1 1. x - 10. 14.x)
1. Plug the device into your computer’s USB port.
2. When the Device Setup window appears, followthe on-screen instructions. If this window does not appear, open it manually:
• Wind ows: Start > Thi s PC > I ro n Ke y U nlo cke r > I ron Key. ex e
• macOS : Finder > IRO NKEY > Iro nKey .app
3. When Device Setup is complete, you can move your important files to the IRONKEY S EC U RE FILE S USB drive and they will be automa ticall y encrypte d.
Some Windows systems prompt to restart after you first plug in your device. You can safely close that promp t w ithout res tartin g - no new d rivers o r sof twa re are installe d.
About My Device
IronKey D300SM USB 3.0 is a portable flash drive with built-in password security and data encryption. It is designed with advanced AES 256-bit encryption and other features that enhance mobile data security. Now you can safely carry your files and data with you wherever you go.
How Is This Different Than A Regular USB Drive?
FIPS 140-2 Level 3 Certification - The IronKey D300SM is a FIPS-certified device, so you can feel
confiden t that you ’re c omplyin g with regul atory requi rements. Hardware Encryption – The Advanced Encryption Controller in your device protects your
data with the same level of protection as highly classified government information. This security technology feature is alway s on and cannot be disabled.
Password-Protected - Device access is secured using password protection. Do not share your passw ord with anyone so that even if your device is lost or stolen, no one else can access your data.
Device Reset - If the Advanced Encryption Controller detects physical tampering, or if the number of consecutive incorrect password attempts exceeds 10 attempts, the device will initiate a reset sequence. Important - When a device is reset, all onboard data will be erased and the device returns to factory settings - so remember your password. NOTE: Admins can reset
password using either SafeConsole or EMS depending on which management server the device is being managed by.
Anti-Malware Autorun Protection (Managed Only) - Your device is capable of protecting you from many of the latest malware threats targeting USB drives by detecting and preventing autorun execution of unapproved programs. It can also be unlocked in Read-Only Mode if you suspect the host computer is infected.
4
Simple Device Management - Your device includes the IronKey Control Panel, a program for accessing your files, managing your device and editing your preferences, changing your device password, and safely locking your device.
What Systems Can I Use It On?
• Windows® 10
• Windows® 8.1
• Windows® 7
• macOS® (10.11 - 10.14)
• Linux (2.6 or higher) Note: The Linux CLI Unlocker does not support any features that require network access, for example, setting up your device or changing your password.
Some applications are only available on specific systems: Windows Only
• Virtual Keyb oard ( English only)
• Anti-Malware Scanner (NOTE: Optional Management Feature)
• Device Updates
Product Specifications
For further details about your device, see the Devic e Info page in the IronKey Control Panel.
Specification Capacity*
Speed**
Details 4GB, 8GB, 16GB, 32GB, 64GB, 128GB
USB 3.0:
- 4GB: 80MB/s read, 12MB/s write
- 8GB & 16GB: 165MB/s read, 22MB/s write
- 32GB: 250MB/s read, 40MB/s write
- 64GB & 128GB: 250MB/s read, 85MB/s write
USB 2.0:
- 4GB: 30MB/s read, 12MB/s write
- 8GB-128GB: 30MB/s read, 20MB/s write
Dimensions Waterproof
77.9 mm x 22.2 mm x 12.05 mm Up to 4 ft. (1.2m)
Conf orms to IEC 60529 IPX8
Product must be clean and dry before use
Temperature
Operating: 0°C to 60°C
Storag e: - 20°C to 85°C Hardwar e Encryption 256-bit AES (XTS Mode) EMI/EMC
Compliance
TAA Compliant, FCC, CE, VCCI & KC, RoHS & WEEE
5
Specification Certification
Hardware
Details
FIPS 140-2 level 3 certified
USB 3.0 compliant and USB 2.0 compliant
Requires 2 free drive letters OS Compatibility Windows 10, Windows 8.1, Windows 7 (SP1)
macOS v .10. 11.x-10.14.x
Linux 2.6.x*** Accessibility
IronKey Control Panel is designed to be Section 508
compliant. Users with disabiliti es have key boa rd navig ation
and screen reader support. Warranty
5 Year s Lim ited
Designed and as sembled in the U.S.A., D300SM devices do not req uire any so ftware or drivers to be installed. * Advertised capacity is approximate. Some space is required for onboard software. ** Speed varies with host hardware, software, and usage. *** Limited Feature Set. No online management features.
Recommended Best Practices
1. Lock the device:
• when not in use
• before unplugging it
• before the system enters sleep mode
2. Never u nplu g the devi ce when the LED is lit.
3. Never share your device password.
4. Perform a computer anti-virus scan before setting up and using the device.
Setting Up My Device
To ensure there is ample power provided to the D300SM encrypted USB drive, insert it directly into a USB 2.0/3.0 port on a notebook or desktop. Avoid connecting it to any peripheral devices th at may feature a USB port, such as a keyboard or USB-powered hub. Initial setup of the device must be done on a supported Windows or macOS based op erating system.
Device Access (Windows Environment)
1. Plug the D300SM encrypted USB drive into an available USB port on the not ebook or desktop and wait for Windows to detect it.
• Windows 7/8.1/10 users will receive a device driver notification.
• Once the new hardware detection is complete, Windows will prompt to begin the initialization process.
6
2. Select the option IronKey.exe inside of the Unlocker partition that can be found in File Explorer. Please note that the partition letter will vary based on the next free drive letter. The drive letter may change depending on what devices are connected. In the image below, the drive letter is (E:).
Device Access (macOS Environment)
1. Plug the D300SM encrypted USB drive into an available USB port on the macOS notebook or desktop and wait for the operating system to detect it.
2. Double clic k the IRONKEY volumethat appears on the desktopto start the initialization proc ess.
• If the Unlocker volume does not appear on the desktop, open Finder and locate the Unlocker volume on the left side of th e Finder window (listed under Devices.) Highl ight the volume and double-click the Unlocker application icon in the Finder window. This will start the initialization process.
IronKey Control Panel
7
Setting Up A D300SM Device With SafeConsole
The initialization process will begin by allowing the device to be ready to communicate with the SafeConsole server. The steps needed to register a D300SM to SafeConsole will depend on the policies that your a dministr ator is e nforc ing. Not all dialogs will be shown.
A SafeConsole Connection Token will be needed. The SafeConsole Connection Token is obtained by the System Administrator through the Quick Connect Guide, located inside of the SafeConsole user interf ace.
1. Enter the SafeConsole Connection Token that is obtained in the steps above. Review the license agreement, check the checkbox to accept it, and click Activate in the bottom left-hand corner.
• Optionally Enabled Policies - These policies may or may not be enabled b y yo ur Sy stem Administrator. They will appear during device registration if they have been enabled.
– Confirm Ownership of the device: Enter the Wind ows username and pas sword tha t is
assoc iate d with the lo gin cr ede nti al s of the com pute r th e dev ice is p lugg ed i nto.
– Unique User Token: This token is directly associated with the end user’s account and
will be provided by the System Admini stra tor.
– Administrator Registration Approval: The Syste m Administ rat or m a y require t h ei r
approval to proceed with device registration.
2. Enter a secure Password and Confirm it. Once the password created meets the requirements listed to the right side of the input fields, click Continue. The re quirements of th is password wi ll depend on the policy selected by yo ur a dmin istr ato r.
3. Choose a Secure Volum e File System (see Formatting My Device) and click Continue.
4. The device will now finalize the setup process and be ready for use. Ac cess the Encryp ted Storage by clicking the Folder Icon in the top menu. The settings of the device can be accessed and altered by clicking the Gear Icon. See the IronKey Control Panel for more information.
Setting Up A Managed Device With IronKey EMS
The initialization process will begin by allowing the device to be ready to communicate with the IronKey EMS server.
An IronKey EMS Activation Code will be needed. The IronKey EMS Activation Code is obtained by the System Administrator through the IronKey EMS Consol e. This c ode can als o be emailed to the end user .
1. Enter the IronKey EMS Activation Code that is obtained in the steps above. Review the license agreement, check the checkbox to accept it, and click Activate in the bottom left-hand corner.
2. Enter a secure Password and Confirm it. Once the password created meets the requirements listed to the right side of the input fields, click Continue.
8
3. Depending on the policy created by your System Adminis trato r, you may be required to create an Online Account. An email will be provided to the end user wit h the instructions on how to create an online account. After the account has been confirmed, clic k OK.
• The user will recei ve an Online Account Error message if the online account has not been created or there was an issue while attempting to verify the account.
4. Choose a Secure Volum e File System (see Formatting My Device) and click Continue.
5. The device will now finalize the setup process and be ready for use . Access the encrypted storage by clicking the Folder Icon in the top menu. The settings of the device can be accessed and altered by clicking the Gear Icon. See the IronKey Control Panel for more information.
Using My Device - Managed Features
Accessing My Secure Files
After unlocking the device, you can access your secure files. Fil e s are automatically encrypted and decrypted when you save or open them on the drive. This technology gives you the convenience of working as you normally would with a regular drive, while providing strong, “always-on” security .
To access your secure files:
1. Click Files on menu bar of the IronKey Con trol Panel.
• Windows: Opens Windows Explorer to the IRONK EY S ECU RE FIL ES USB drive.
• macOS: Opens Fin der to the KI N GS TO N USB dri ve.
2. Do one of the follow ing :
• To open a file, double-click the file on the D300S M USB drive.
• To s ave a fi le, dr ag the fi le f rom yo ur co mputer to the D3 0 0S M USB drive.
Hint: You can also access your files by right-clicking the IronKey Icon in the Windows taskbar and clicking Secure Files.
Unlocking In Read-Only Mode
You can unlock yo ur device in a read-only state so that files cannot be altered on your secure drive. For examp le, when u sing an untrust ed or unknown computer, unlocking your device in Read-Only Mode will prevent any malware on that computer from infecting your device or modifying your files. Managed devices can be forced to unlock in a read-only state by an administrator.
When working in this mode, the IronKey Control Panel will display the text Read-Only Mode. In this mode, you cannot perform any operations that involve modifying files on the device. For example, you cannot reformat the device, restore applications or edit the Applications List, or edit files on the drive.
To unlock the device in Read-Only Mode:
1. Inse rt the de v ic e i nto the U SB por t of the ho st c o mp ut er and ru n th e IronKey .exe.
2. Check the Read-Only Checkbox below the password entry box.
3. Type your device password and click Unlock. The IronKey Control Panel will appear with the text Read-Only Mode at the bottom.
9
Changing The Unlock Message
The Unlock Message is custom text that displays in the Unlocker window when you unlock the device. This feature allows you to customize the message that displays. For example, adding contact information will display information on how a lost drive can be returned to you. For Managed devices, this feature may or may not be enabled by your System Adminis trator.
To change the Unlock Message:
1. In the IronKey Control Panel, click Settings on the menu bar.
2. Click Preferences in the left sidebar.
3. Type the message text in the Unlock Message field. The text must fit in the space provided (appro xima tely 7 li nes an d 200 cha racter s).
Locking The Device
Lock your device when you are not using it to prevent unwanted access to your secure files on the drive. You can manually lock the device or you can set the device to automatically lock after a specified per iod of inactiv ity. For Managed devices, t his feature may or may not be enable d by your System Administrator.
Caution: By default, if a file o r application is open when the device tries to auto-lock, it will not force the application or file to close. Although you can configure the auto-lock setting to force the device to lock, doing so can result in loss of data to any open and unsaved files.
If your files have become corrupt from a forced lock procedure or from unplugging the device before locking, you might be able t o recover the files by running CHKDSK and using dat a recovery software (Windows only).
To manually lock the device:
1. Click Lock in the botto m left-h and corne r of the Iro nKey Co ntro l Panel to safely lock you r device.
• You can also use the keyboard shortcut: CTRL + L (Windows only), or right-click the
IronKey Icon in the system tray and click Lock Device.
Note: Managed devices will automatically lock during use if an administrator remotely disables
the device. You will not be able to unlock the device until the System Administrator re-enables the device.
To set a device to automati cally lock:
1. Unlock your device and click Settings on the menu bar in the Ir onKey C ontrol Panel.
2. Click Preferences in the left sidebar.
3. Click the Checkbox for auto-locking the device and set the time-out to one of the following time inter vals: 5, 15, 30, 60, 120, or 180 minutes.
To run CHKDSK (Windows only):
1. Unlock the device.
2. Press the WINDOW S LOGO KEY + R to open the Run prompt:
3. Type CMD and press ENTER.
11
4. From the command prompt, type CHKDSK, the IRONKEY SECURE FILES USB drive letter, then “/F /R”. For example, if the IRONKE Y S EC URE FIL ES USB drive letter is G, you would type: CHKDSK G: /F /R
5. Use data recovery software if necessary in order to recover your files.
Typing Passwords With The Virtual Keyboard
If you are unlocking your device on an unfamiliar computer and are concerned about keylogging and screen logging spyware, use the Virtual Keyboard. I t helps protect your device password by letting you click out letters and numbers using your mouse and the virtual keyboard. The underlying techniques in the Virtual Keyboard will bypass many trojans, keyloggers, and screen loggers.
Note: This feature uses a standard QWERTY key set. It is available on Windows only and the language preference for the devic e must be set to Englis h.
To type a password using the Virtual Keyboa rd (W indows only):
1. Open the Virtual K eyb oar d by do ing one of the fol low ing actions:
• In the password field, click the Virtual Keyboard Icon.
• When the keyboar d fo cus is in a password field, press CTRL+ALT+ V.
2. Click the keys to type your password, and then click Enter.
You can also use the Virtual Keyboard in conjunction with the actual keyboard, so that you type some characters and click some characters.
Hint: Click Randomize to arrange the keys in a random order. This helps protect against screen loggers.
Note: When you click a key in the Virtual Keyboard, all of the keys briefly go blank. This feature prevents screen loggers from capturing what you clicked. To disable this feature, click the icon (beside the Exit button) and choose Disable Screen Logger Protection.
Managing Passwords
You can change your password on your device by accessing the Password tab in the IronKey Control Panel.
For Managed devices, password policy settings are determined by your System Administrator. Sometimes, you may be required to change your password to comply with new corporate password policies. When a change is required, the Password Chan ge screen will appear the next time you unlock the device. If the device is in use, it will lock and you will have to change the password before you can unlock it.
Note: When a password is required, for example, when logging into the device or during a manual password change operation, you can use the Virtual Keyboard instead of the actual keyboard to type the pass word .
To change your password:
1. Unlock your device and click Settings on the menu bar.
2. Click Passwor d in the left sidebar
3. Enter your current password in the field provided.
4. Enter your new password and confirm it in the fields provided.
5. Click Change Passw ord.
12
Formatting My Devic e
Your device will need to be for matted during initialization before it can be used to store files. If initializing on Windows, you will be given the option of formatting the IRONKEY SECUR E FILES USB
drive as either FAT 3 2 or exFAT. Options are for Windows operating systems only - macOS will automatically format to FAT32
FAT32
– Pros: Cross-platform compatible (Windows and macOS) – Cons: Limited individual file size of 4GB
exFAT
– Pros: No file size limitatio ns – Cons: Microsoft restricts usage by license obligations
After initialization, reformatting the IRONK EY SECU RE FILE S U SB drive will erase all your files and your Application List, but will not erase your device password and settings.
Important: Before you reformat the device, back up your IRONKEY SE CURE FIL ES USB drive to a separate loc ation, for example, to cloud storage or your co mputer.
To reformat a device:
1. Unlock your device and click Settings on the menu ba r of the IronK ey Contro l Panel.
2. Click Tools on th e left si d eba r.
3. Under Device Health, select the file format and click Reformat Secure Volume.
Finding Information About My Device
Use the Capacity Meter, located at the bottom right of the IronKey Control Panel, to see how much storage space is sti ll available on your device. Th e green ba r graph represents how full the device is. For example, the meter will be totally green when the devic e is full. The white text on the Capacity Meter displays how much free space remains.
For general information about your device, see the Device Info page. To view device information:
1. Unlock your device and click Settings on the menu ba r of the IronK ey Contro l Panel.
2. Click Device Info in the left sidebar .
The About This Device section includes the following details about your device:
• Model Number
• Serial Number
• Software and Firmware Version
• Release Date
• Management Console
• Secure Files Drive Letter
• Unlocker Drive Letter
• Operating System and System Adminis trative Privileges
Note: To visit the IronKey website or access more informationabout legal notices or certifications for IronKey products, click one of the information buttons on the Device Info page.
13
Hint: Click Copy to copy the dev ice information to the clipboard so that you can paste it in an email or support request.
Editing The Applications List
The Applications List, located in the IronKey Control Panel, is the area where you can quickly launch on-board applications and files. I tems that appear in the list are shortcuts to the actual files. Managing the list items does not alter the actual file.
To edit the Applications List:
1. Unlock your device. The IronKey Control Panel will appear with the Applications List selected by default.
2. If the IronKey Control Panel is already open, cli ck Applications on th e men u ba r to v ie w the Applications List. Do one of the following:
• To add a file or appli cation short cut: Drag a fil e from the deskt op to the Applications List area to add it to the list . You can also right-click the Applications List area and click Add Application.
• To rename or delete list items: Right-click the application or file and choose the action from the menu.
• To sort or change the way icons appear in the list: Right-click any w he r e in the Application list and choose Large Ic ons, List, Ti le, or Sort Alphabetical ly.
Functions of the Ap plications Li st:
• You can add any file to the list, including documents, images, and batch files.
• For items that are not applications, the operating system opens the item with the default program associated with that file type.
• Items that are Windows executables will be hidden from view on macOS. Similarly, macOS application files will be hidden from view on Window s computers.
Resetting My Device
Your device can be reverted back to factory settings. This will securely wipe all data from the device and a new security key will be created for the next use.
For Managed devices, your System Administrator may have this option disabled. Contact your administrator if you need to reset your device.
Resetting your device:
1. Unlock your device.
2. Right-click on the IronKey Icon in the system tray.
3. Click Reset Device.
Your device will now be reset back to factory settings.
14
Using My Device - Managed Only Features
Accessing My Device If I Forget My Password
If you forget your password an d an administrator has granted you password reset privi leges, you can reset it. If your administrator has not granted password reset priv ileges, you must cont act your administrator for help resetting your password.
To reset your password:
1. Plug in your device and start the Unloc ker.
2. Click Password Help.
3. At the Password Help prompt, click Reset Password. Follow the onscreen instructions to complete the password reset.
4. Depending on the management platform, you may receive an email with instructions on how to obtain your recovery code. Otherwise, you will need to contact your administrator to obtain t he recovery code. You may be required to provide the request code a nd serial number.
• The recovery code will need to be copied and pasted exactly as it is given to you. Incorr ect co des coun t again st the ten unl ock attempts bef ore the d evic e is reset.
5. Type your new password (or use the Virtual Keyboard) and confirm it in t he fields provided, then click Change Passwor d.
Scanning My Device For Malware
If enabled by your System Administrator, the Malware Scanner is a self-cleaning technology that detects and remov es malware on your dev ice from a n infected file or computer. Powered by the McAfee® AntiVirus and Anti-Malware signature database, and constantly updated to combat the latest malware threats, the scanner first checks for the latest updates, scans your device, then reports and cleans any malware that is found.
Some things to know about scanning your device:
• The scanner runs automatic ally when you unlock your device.
• It scans any running system processes and all onboard files (compressed and uncompressed).
• It reports and cleans any malware it finds.
• The scanner will automatically update itself before each scan to protect you from the latest malware threats.
• An update requires an internet connection.
• Ensure a minimum of 135 MB of free space on the devic e to accomm odate the down loaded malware si gnature files.
• Your first update may take a long time to download, depending on your internet connection.
• The date of the last update is displayed onscreen.
• If the scanner becomes too far out of date , it will need to download a large file to bring it back up-to-date.
15
Using ZoneBuilder In SafeConsole
If enabled by your System Administrator, Zone Builde r is a SafeConsole tool used to create a Trusted Zone of computers. It can be used to restrict device ac cess to compute rs within t he Trusted Zone and, if enabled, can automatically unlock your device, which eliminates the need to enter your password.
If your administrator chooses to enable this policy, you may be required to trust the account. Trusting the account:
1. Unlock your device and click Settings in the IronKey Control Panel.
2. Click ZoneBuilder on the left sidebar.
3. Click Trust This Account. Your account will now show up in the Trusted Accounts box.
Your account is now in the Trusted Zone of computers. Depending on the policy set by your System Administrator, you may have restricted device access outside of the Trusted Zone or when offline. Your device may also be set to automatically unlock on trusted computers.
To remove a trusted accoun t, simply highli ght the accoun t you wish to rem ove and c lick Remove.
Using My Device On Linux
You can use your device on several distributions of Linux. There are two executables in the linux folder, Unlocker_32.exe and Unlocker_64.exe. For this guide, replace Unlocker_xx.exe with the executable that is compatible with your system.
The device must be previously set up using a Windows or macOS operating system. See Setting Up
My Device for more information. S ome Manag ed dev ice polic ies , set by the Sy stem Administrator,
may restrict usage of the device to systems only running Windows or macOS operating systems.
Using The Unlocker
Use the Unloc k er _x x. e xe f o r Li nux to access y o ur fi les. Depending on your Linux distribution, you m ay need root privileges to use the program Unlocker_xx.exe found in the Linux folder of the mounted public volume. By default, most Linux distributions will append the execute bit to .exe files on a fat32 partition. Otherwise the execute bit must be manually set before running by using th e following commands.
• chmod +x Unlocker_32.exe
• chmod +x Unlocker_64.exe
16
If you have only one device attached to the system, run the program from a command shell with no argume nt s (for example, Un l o c k e r _ x x.exe). This will then prompt you f or your de vi ce p a s sword to unlock the drive. If you have multiple devices, you must specify which one you want to unlock.
Note: Unlocker_xx.exe only unlocks the IRONKEY SECURE FILES USB; it must then be mounted. Many mode r n Li n ux distri b uti o ns d o thi s a u to m a ti ca lly. If not, ru n th e mo u n t progr a m f r o m th e co mmand line, using the device name printed by Unlocker_xx.exe.
Simply un-mounting the device does not automatically lock the IRONKEY SECURE FILES USB. To lock the device, you must either unmoun t and physically remov e (unplug) it, or run:
• Unlocker_xx.exe -l
Please note the fo ll owi ng impor tant deta ils f or using you r dev ice o n Linu x:
1. Kernel Ve rs io n mu st be 2.6 or h igher
2. Mounting
• Make sure you have permissions to mount external SCSI and USB devices.
• Some distributions do not mount automatically and require the follo wing co mmand to be run: mount /dev/[name of the device] /media/[mounted devi ce name]
• The name of the mount ed devi ce va rie s depend ing on the distri bution .
3. Permissions
• You m ust ha ve perm issions to mo unt exter nal/usb /devices.
• You must have permissions to run an executable file from the public volume in order to launch the Unloc ker.
• You migh t need root user permissions.
4. The Unlocker f or Linux supports x86 and x86_64 systems.
5. Policies that will block the device
• If the device is disabled within the policy settings in either SafeConsole or IronKey EMS , you wi ll not be able to u nlo ck the d evi ce .
Where Can I Get Help?
The following resources provide more information about IronKey products. Please contact your Help Desk or System Administrator if you have further questions.
• kingston.com/usb/encrypted_security: Information, marketing material, and video tutorials
• IronKeySupport@Kingston.com: Feedback and feature requests
• kingston.com/support: Product support, FAQ’s and downloads
17
© 2018 Kingsto n Digital, Inc. All rights reser ved.
NOTE: IronKey is not liable for technical or editorial errors and/or omissions contained herein; nor for incidental or consequential damages resulting from the furnishing or use of this material. The information provided herein is subje ct to change without notice. The information contained in t his document represents the current view of IronKey on the issue discussed as of the date of publication. IronKey cannot guarantee the accuracy of any information presented after the date of publication. This document i s for information purposes only. IronKey makes no warrant ies, expressed or implied, in this document. IronKey, and the IronKey logo are trademarks of Kingston Digital, Inc. and its subsidiaries. All other trademarks are the property of their respective owners. IronKey Technologies. All rights reserved.
FCC Information This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including inte rference that may cause undesired operation. T his equipment has been tested and found t o comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. I f this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
TM
is a registered trademark of Kingston Technologies, used under permission of Kingston
• Reorient or reloca te the rec eivin g antenna.
• Increase the separation between the equipment and receiver .
• Connect the equipment to an outlet on a circuit different from that to which the receiver is connected.
• Consult the dealer or an experienced radio/TV technician for help.
Note: Changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment.
Document No. 48000131-001.A05
18
Loading...