background image

 

 

 

2.

 

Select the option IronKey.exe inside of the Unlocker partition that can be found in File Explorer. 

Please note that the partition letter will vary based on the next free drive letter. The drive letter 

may change depending on what devices are connected. In the image below, the drive letter 

is (E:). 

 

 

 

Device Access (macOS Environment) 

 

1.

 

Plug the D300SM encrypted USB drive into an available USB port on the macOS notebook or 

desktop and wait for the operating system to detect it. 

2.

 

Double click the IRONKEY volumethat appears on the desktopto start the initialization process. 

 

If the Unlocker volume does not appear on the desktop, open Finder and locate the 

Unlocker volume on the left side of the Finder window (listed under Devices.) Highlight 

the volume and double-click the Unlocker application icon in the Finder window. This will 

start the initialization process. 

 

 

IronKey Control Panel 

 

 

Summary of Contents for IRONKEY D300SM

Page 1: ...IRONKEY D300SM SECURE USB 3 0 FLASH DRIVE User Guide 1...

Page 2: ...ed Features 9 Accessing My Secure Files 9 Unlocking In Read Only Mode 9 Changing The Unlock Message 10 Locking The Device 10 Typing Passwords With The Virtual Keyboard 12 ManagingPasswords 12 Formatti...

Page 3: ...y EMS Both SafeConsole and IronKey EMS are secure cloud or on premises management platforms that allow your organization to centrally manage compatible USB Universal Serial Bus storage devices easily...

Page 4: ...o you can feel confident that you re complying with regulatory requirements Hardware Encryption The Advanced Encryption Controller in your device protects your data with the same level of protection a...

Page 5: ...lish only Anti MalwareScanner NOTE Optional Management Feature DeviceUpdates Product Specifications For further details about your device see the Device Info page in the IronKey Control Panel Specific...

Page 6: ...e device when not in use before unplugging it before the system enters sleep mode 2 Never unplug the device when the LED is lit 3 Never share your device password 4 Perform a computer anti virus scan...

Page 7: ...the D300SM encrypted USB drive into an available USB port on the macOS notebook or desktop and wait for the operating system to detect it 2 DoubleclicktheIRONKEY volumethatappears onthedesktoptostartt...

Page 8: ...proval The System Administrator may require their approval to proceed with device registration 2 Enter a secure Password and Confirm it Once the password created meets the requirements listed to the r...

Page 9: ...Windows Opens Windows Explorer to the IRONKEY SECURE FILES USB drive macOS Opens Finder to the KINGSTON USB drive 2 Do one of the following To open a file double click the file on the D300SMUSB drive...

Page 10: ...force the application or file to close Although you can configure the auto lock setting to force the device to lock doing so can result in loss of data to any open and unsaved files If your files have...

Page 11: ...rd so that you type some characters and click some characters Hint Click Randomize to arrange the keys in a random order This helps protect against screen loggers Note When you click a key in the Virt...

Page 12: ...anel 2 Click Tools on the left sidebar 3 Under Device Health select the file format and click Reformat Secure Volume Finding Information About My Device Use the Capacity Meter located at the bottom ri...

Page 13: ...ms Right click the application or file and choose the action from the menu To sort or change the way icons appear in the list Right click anywhere in the Application list and choose Large Icons List T...

Page 14: ...e fields provided then click Change Password Scanning My Device For Malware If enabled by your System Administrator the Malware Scanner is a self cleaning technology that detects and removes malware o...

Page 15: ...s To remove a trusted account simply highlight the account you wish to remove and click Remove Using My Device On Linux You can use your device on several distributions of Linux There are two executab...

Page 16: ...o mount external SCSI and USB devices Some distributions do not mount automaticallyand require the followingcommandto be run mount dev name of the device media mounted device name The name of the moun...

Page 17: ...e must accept any interference received including interference that may cause undesired operation This equipment has been tested and found to comply with the limits for a Class B digital device pursua...

Reviews: