IronKey Secure Flash Drive Enterprise User Manual

IronKey Secure Flash Drive Enterprise User Manual

Ironkey enterprise secure flash drive user guide

Advertisement

Quick Links

User Guide
IronKey Enterprise
Secure Flash Drive
IRONKEY ENTERPRISE USER GUIDE
PAGE 

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Secure Flash Drive Enterprise and is the answer not in the manual?

Questions and answers

Summary of Contents for IronKey Secure Flash Drive Enterprise

  • Page 1 User Guide IronKey Enterprise Secure Flash Drive IRONKEY ENTERPRISE USER GUIDE PAGE ...
  • Page 2 Thank you for your interest in IronKey. IronKey is committed to creating and developing the best security technologies and making them simple-to-use, affordable, and available to every- one. Years of research and millions of dollars of development have gone into bringing this tech- nology to you in the IronKey.
  • Page 3: Table Of Contents

    How Does it Work? Product Walkthrough Activation and Initialization Using the IronKey Unlocker on Windows Using the IronKey Unlocker on a Mac Using the IronKey Unlocker on Linux Using the IronKey Control Panel Using the IronKey Virtual Keyboard Using the Onboard Firefox & Secure Sessions Service...
  • Page 4: Core Features

    Core Features Hardware-Encrypted Flash Drive Your IronKey can safely store , , 4 or 8 gigabytes of documents, applica- tions, files and other data. The IronKey Cryptochip inside the IronKey protects your data to the same level as highly classified government infor- mation and cannot be disabled or accidently turned off.
  • Page 5 Secure Local Backup & Data Recovery Securely back up the data on your IronKey using IronKey’s Secure Backup software. It allows you to recover your data to a new IronKey in case your IronKey is ever lost or stolen, or synchronize data between IronKeys.
  • Page 6: Device Diagrams

    Device Diagrams The IronKey has been designed from the ground up with security in mind. A combination of advanced security technologies are used to ensure maximum protection of your data. Additionally, the IronKey has been designed to be physically secure, to prevent hardware-level attacks and tampering, as well as to make the device rugged and long-lasting.
  • Page 7: Technical & Security Notes

    Device Password Protection The device password is hashed using salted SHA-56 before being trans- mitted to the IronKey Secure Flash Drive over a secure and unique USB channel. It is stored in an extremely inaccessible location in the protected hardware. The hashed password is validated in hardware (there is no “get- Password”...
  • Page 8 The IronKey Password Manager and my.ironkey.com work together, giving you the ability to back up your online passwords to your Online Security Vault. First, you must unlock your IronKey device, which requires two- factor authentication. Your passwords are securely stored in a hidden...
  • Page 9: How Does It Work

    An email from your System Admin with an Activation Code ACTIVATION AND INITIALIzATION (WindoWs onLy) When you open the package, you will find one IronKey Secure Flash Drive, one lanyard with keyring, and a Quick Start Guide. Your IronKey can only be setup on a Windows computer.
  • Page 10 9 You may need to respond to a confirmation email by entering the confirmation code online. At this point, your IronKey is ready to protect your data, identity, and online privacy. IRONKEY ENTERPRISE USER GUIDE Your System Admin has setup your IronKey ahead of time to abide by your organization’s security standards.
  • Page 11: Using The Ironkey Unlocker On Windows 10

    It prompts you for your password, securely validates it, and then mounts your secure volume where all of your files are stored on the IronKey. Here is how to unlock your IronKey on Windows 2000 (SP4), XP (SP2), and Vista: Step Plug in your IronKey and unlock it with your password.
  • Page 12: Using The Ironkey Unlocker On Linux

    Depending on your Linux distribution, you may need root privileges to use the program ‘iron- key’ found in the Linux folder of the mounted virtual CD-ROM. If you have only one IronKey attached to the system, simply run the program from a command shell with no arguments (e.g.
  • Page 13 5. The ironKey Unlocker for Linux only supports x86 systems at this time. NOTE: In IronKey Enterprise, you may not be allowed to change the device password or un- lock your IronKey on a Mac, depending on your System Administrator’s configuration.
  • Page 14: Using The Ironkey Control Panel

    Most of the Control Panel’s options are located in the “Settings” menu. Description When you click on “Secure Files” in the IronKey Control Panel, Windows Explorer will open directly to your secure volume. All files on your IronKey are strongly encrypted with military-grade AES encryption.
  • Page 15 If proxy authentication is required, you can enter your username and password in the appropriate fields. message that will appear on the IronKey Unlocker win- dow. In the event that you lose your IronKey, someone can return it to you if you provide your contact infor- mation.
  • Page 16: Using The Ironkey Virtual Keyboard

    » Use the keyboard shortcut of CTRL + ALT + V The IronKey Virtual Keyboard can be used in a number of other applications when you need extra security typing out information (e.g. email, documents, etc.). IRONKEY ENTERPRISE USER GUIDE...
  • Page 17: Using The Onboard Firefox & Secure Sessions Service

    USINg THE ONBOARD FIREFOX & SECURE SESSIONS SERVICE (WindoWs) If enabled, a Firefox web browser is already onboard your IronKey, so none of your cookies, his- tory files, bookmarks, add-ons or online passwords is stored on the local computer. Now you can carry your personalized web experience with you to other computers without worry.
  • Page 18 Network Map, Bandwidth Meter, and Changing Identities IRONKEY ENTERPRISE USER GUIDE If enabled, clicking the IronKey button on the bottom right of the onboard Firefox will silently turn IronKey’s Secure Sessions Service on/off. This will create an encrypted tunnel directly from your IronKey, out to a secured IronKey web server, where it is then decrypt- ed and sent out to the destination site.
  • Page 19: Using The Ironkey Password Manager

    IronKey’s Password Manager also allows you to back up your encrypted Password Manger data to your Online Security Vault, synchronize password data between IronKeys, or, if your IronKey is ever lost or stolen, securely restore all your passwords to a new IronKey. Only you can access and decrypt your passwords.
  • Page 20 First, set up this information by clicking on the “Set- tings” button in the IronKey Toolbar. Then, to fill a webform, simply click the “Form Filler” button. You can use the Password Generator (located within the IronKey Control Panel) to create long, random passwords.
  • Page 21: Using The Secure Backup Software 0

    Back up your data on a regular basis. Description You can create an encrypted backup of a single file or your entire IronKey to your local comput- er. Click on the “Secure Backup” button in the IronKey Control Panel, select a destination folder, and select which files to back up.
  • Page 22: Using Rsa Securid

    To copy your pass- word to the clipboard, click ‘Copy’. IRONKEY ENTERPRISE USER GUIDE Description Click on the icon in the IronKey Control Panel’s application list. . Click the ‘Options...’ button . Click the ‘Add’ button 3. Browse on your computer to the .stdid file 4.
  • Page 23: Importing A Digital Certificate Into The Ironkey

    The import process uses IronKey’s PKCS# interface and requires Mozilla Firefox. Note that there is only space for one additional private key in the IronKey Cryptochip, though that key will receive the security benefits of the Cryptochip’s tamperproof hardware and self-destruct mechanisms.
  • Page 24 4 Note that IronKey’s certificate is available here. Now you can add your own. Click the ‘Import’ button. 5 Browse to the PKCS#-for- mat certificate file and open it. 6 A window will appear ask- ing you to confirm where to store the certificate.
  • Page 25: Using My.ironkey.com 4

    This locks down your account so that you must have both your IronKey and your password in order to gain access. In other words, only you can access your online IronKey account, even if someone stole your IronKey or your pass- word.
  • Page 26 7 Changing account credentials In the event that you ever lose your IronKey or forget your IronKey device password, you can still access the site in Safe Mode: a restricted mode with limited functionality. This is useful for marking your IronKey as lost, or recovering a forgotten password.
  • Page 27: Using Your Ironkey In Read-Only Mode 6

    You can unlock your IronKey in a read-only state such that files on your IronKey cannot be ed- ited. An example of when this is useful is when you want to access a file on your IronKey while using an untrusted or unknown computer. If you unlock your IronKey in Read-Only Mode, you need not fear that malware on that machine will infect your IronKey or modify your files.
  • Page 28: Using The Ironkey Malware Scanner 7

    Your first update may take a long time to download, depending on your Internet connection. If your IronKey Malware Scanner becomes too far out of date, it will need to download a large file to bring it back up to date.
  • Page 29 IronKey Malware Scanner system tray menu. A popular use for the IronKey Malware Scanner is to use it in Read-Only Mode to detect if malware on a computer you suspect is infected. The IronKey provides a secure, convenient and portable way of detecting malware, making it a valuable addition to your security toolbelt.
  • Page 30: Operating Shock

    Windows 2000 (SP4), XP (SP2), Vista IronKey Unlocker for Linux (2.6+, x86) IronKey Unlocker for Mac (10.4+, PPC and Intel) * Speeds tested with 4GB device in a laboratory environment with Iometer software. Actual speeds may vary. Advertised capacity is approximate and not all of it will be available for storage. Some space is required for onboard software.
  • Page 31: What's Next

    Have a cool idea or suggestion? Please let us know. You can open a thread on the IronKey Forum (forum.ironkey.com) or submit feedback to feedback@ironkey.com. Let us know if you would like to be a beta tester of new functionality.
  • Page 32: Contact Information

    The information contained in this document represents the current view of IronKey on the issue discussed as of the date of publication. IronKey can- not guarantee the accuracy of any information presented after the date of publication. This document is for information purposes only. IronKey makes no warranties, expressed or implied, in this document.

Table of Contents