background image

 

 

 

3.

 

Depending on the policy created by your System Administrator, you may be required to create 

an Online Account. An email will be provided to the end user with the instructions on how to 

create an online account. After the account has been confirmed, click OK

 

The user will receive an Online Account Error message if the online account has not been 

created or there was an issue while attempting to verify the account. 

4.

 

Choose a Secure Volume File System (see 

Formatting My Device

) and click Continue

5.

 

The device will now finalize the setup process and be ready for use. Access the encrypted 

storage by clicking the Folder Icon in the top menu. The settings of the device can be 

accessed and altered by clicking the Gear Icon. See the 

IronKey Control Panel 

for more 

information. 

 

 

Using My Device - Managed Features 

 

Accessing My Secure Files 

 

After unlocking the device, you can access your secure files. Files are automatically encrypted and 

decrypted when you save or open them on the drive. This technology gives you the convenience 

of working as you normally would with a regular drive, while providing strong, “always-on” security. 
To access your secure files: 

1.

 

Click Files on menu bar of the IronKey Control Panel. 

 

Windows: Opens Windows Explorer to the IRONKEY SECURE FILES USB drive. 

 

macOS: Opens Finder to the KINGSTON USB drive. 

2.

 

Do one of the following: 

 

To open a file, double-click the file on the D300SM USB drive. 

 

To save a file, drag the file from your computer to the D300SM USB drive. 

Hint:  You can also access your files by right-clicking the IronKey Icon in the Windows taskbar 

and clicking Secure Files

 

 

Unlocking In Read-Only Mode 

 

You can unlock your device in a read-only state so that files cannot be altered on your secure drive. 

For example, when using an untrusted or unknown computer, unlocking your device in Read-Only 

Mode will prevent any malware on that computer from infecting your device or modifying your files. 

Managed devices can be forced to unlock in a read-only state by an administrator. 

When working in this mode, the IronKey Control Panel will display the text Read-Only Mode. In 

this mode, you cannot perform any operations that involve modifying files on the device. For 

example, you cannot reformat the device, restore applications or edit the Applications List, or edit 

files on the drive. 
To unlock the device in Read-Only Mode: 

1.

 

Insert the device into the USB port of the host computer and run the IronKey.exe

2.

 

Check the Read-Only Checkbox below the password entry box. 

3.

 

Type your device password and click Unlock. The IronKey Control Panel will appear with  the 

text Read-Only Mode at the bottom. 

Summary of Contents for IRONKEY D300SM

Page 1: ...IRONKEY D300SM SECURE USB 3 0 FLASH DRIVE User Guide 1...

Page 2: ...ed Features 9 Accessing My Secure Files 9 Unlocking In Read Only Mode 9 Changing The Unlock Message 10 Locking The Device 10 Typing Passwords With The Virtual Keyboard 12 ManagingPasswords 12 Formatti...

Page 3: ...y EMS Both SafeConsole and IronKey EMS are secure cloud or on premises management platforms that allow your organization to centrally manage compatible USB Universal Serial Bus storage devices easily...

Page 4: ...o you can feel confident that you re complying with regulatory requirements Hardware Encryption The Advanced Encryption Controller in your device protects your data with the same level of protection a...

Page 5: ...lish only Anti MalwareScanner NOTE Optional Management Feature DeviceUpdates Product Specifications For further details about your device see the Device Info page in the IronKey Control Panel Specific...

Page 6: ...e device when not in use before unplugging it before the system enters sleep mode 2 Never unplug the device when the LED is lit 3 Never share your device password 4 Perform a computer anti virus scan...

Page 7: ...the D300SM encrypted USB drive into an available USB port on the macOS notebook or desktop and wait for the operating system to detect it 2 DoubleclicktheIRONKEY volumethatappears onthedesktoptostartt...

Page 8: ...proval The System Administrator may require their approval to proceed with device registration 2 Enter a secure Password and Confirm it Once the password created meets the requirements listed to the r...

Page 9: ...Windows Opens Windows Explorer to the IRONKEY SECURE FILES USB drive macOS Opens Finder to the KINGSTON USB drive 2 Do one of the following To open a file double click the file on the D300SMUSB drive...

Page 10: ...force the application or file to close Although you can configure the auto lock setting to force the device to lock doing so can result in loss of data to any open and unsaved files If your files have...

Page 11: ...rd so that you type some characters and click some characters Hint Click Randomize to arrange the keys in a random order This helps protect against screen loggers Note When you click a key in the Virt...

Page 12: ...anel 2 Click Tools on the left sidebar 3 Under Device Health select the file format and click Reformat Secure Volume Finding Information About My Device Use the Capacity Meter located at the bottom ri...

Page 13: ...ms Right click the application or file and choose the action from the menu To sort or change the way icons appear in the list Right click anywhere in the Application list and choose Large Icons List T...

Page 14: ...e fields provided then click Change Password Scanning My Device For Malware If enabled by your System Administrator the Malware Scanner is a self cleaning technology that detects and removes malware o...

Page 15: ...s To remove a trusted account simply highlight the account you wish to remove and click Remove Using My Device On Linux You can use your device on several distributions of Linux There are two executab...

Page 16: ...o mount external SCSI and USB devices Some distributions do not mount automaticallyand require the followingcommandto be run mount dev name of the device media mounted device name The name of the moun...

Page 17: ...e must accept any interference received including interference that may cause undesired operation This equipment has been tested and found to comply with the limits for a Class B digital device pursua...

Reviews: