background image

Copyright 

©

 2011

 

MXI Security. All rights reserved. This document may not be reproduced or transmitted in any form 

(whether now known or hereinafter discovered or developed), in whole or in part, without the express prior written 
consent of MXI Security. 

Windows is a registered trademark of Microsoft Corporation in the United States and other countries.

All products and company names are trademarks or registered trademarks of their respective owners.

Stealth Key M200 Quick Start Guide

Document Number: MSW1027-M-QSG10-39

Date of Publication: March 17, 2011

Support: [email protected] or http://mxisecurity.com/support

Web site: http://www.mxisecurity.com

The following information applies to only EU-member states:

 

The equipment that you bought required the extraction and use of natural resources for its production. It 
may contain hazardous substances that could impact human health and the environment. The crossed-
out wheeled bin symbol indicates that this product may not be treated as household waste. By disposing 
of this product using the appropriate take-back systems, you will help prevent the spread of hazardous 
substances to our environment and reduce the impact on natural resources. Those systems will reuse or 
recycle most of the materials of your end-life equipment in a sound way. If you need more information on 

the collection, reuse and recycling systems, please contact your local or regional waste administration. You can also 
contact us for more information on the environmental performance of our products.

Summary of Contents for stealth key m200

Page 1: ...Stealth Key M200 Quick Start Guide ...

Page 2: ...llowing information applies to only EU member states The equipment that you bought required the extraction and use of natural resources for its production It may contain hazardous substances that could impact human health and the environment The crossed out wheeled bin symbol indicates that this product may not be treated as household waste By disposing of this product using the appropriate take b...

Page 3: ...tation 5 2 Getting Started 6 Opening and closing a device 6 Attaching the lanyard loop 6 Personalizing a device 8 3 Accessing data on the device 10 Logging into and out of the device 10 Saving and opening files 11 Disconnecting the device 11 4 Warranty Information 12 5 Troubleshooting 13 Difficulty closing device cap 13 ...

Page 4: ... cannot be used with ACCESS Enterprise Minimum System Requirements Stealth Key M200 comes with built in ACCESS Standard software on its application partition The following list describes the requirements you need to use your device with ACCESS Standard A USB port Type A An operating system that supports USB 2 0 or 1 1 Mass Storage Devices Operating systems Microsoft Windows 7 Pro Windows XP Profes...

Page 5: ...essing the device Managing users Managing devices Protecting the device from viruses Troubleshooting Online Help is also available with ACCESS Standard software To view the ACCESS Standard User Guide From the root directory of the application partition double click the UserGuide pdf file Note You need Adobe Reader http www adobe com acrobat to view the documentation To view online Help When ACCESS...

Page 6: ...lectrical emissions outside the product s original design and certification Opening and closing a device Stealth Key M200 devices have an integral case that opens by removing a large front cap To open the device Grasp the front and rear caps and pull apart To close the device Slide the device into the front cap and squeeze the caps together Attaching the lanyard loop Stealth Key M200 comes with a ...

Page 7: ...op optional 1 Insert the small bullet end of the lanyard through the hole in the main part of the device 2 Grip both ends of the lanyard loop and bend the ends towards each other in a circle 3 Insert the small end into the larger barrel 4 Turn the larger barrel to thread the parts together ...

Page 8: ...ice Personalizing a device involves three main steps 1 Applying a device profile The profile sets default preferences for the device You can choose the Typical profile with preconfigured device settings or the Custom profile that allows you to configure device settings The Typical profile contains the following device set tings Authentication method password authentication Number of device users 1...

Page 9: ...t of the taskbar click the MXI icon and then click Personalize from the menu 2 On the main page of ACCESS Standard click Personalize Device 3 On the Device Personalization page click one of the device profile options 4 Complete the instructions on the pages that follow to set the Administrator password if appli cable and create a user Note 1 If you do not complete the personalization process you m...

Page 10: ...to and out of the device To log into the device 1 From the notification area at the far right of the taskbar right click the MXI icon and click Login 2 If you are using a computer running Mac OS X open a file manager and click the application drive for the device Double click the ACCESS Standard application 3 On the main page of ACCESS Standard under Manage Device click Login Follow the prompts in...

Page 11: ...t the device From the notification area at the far right of the taskbar right click the MXI icon and click Eject Device If you are using a computer running Mac OS X drag the device drive on the desktop to the Trash Release the mouse button when you see the Eject prompt Tip You can also disconnect the device by clicking the Safely Remove Hardware icon in the notification area at the far right of th...

Page 12: ...ardware Warranty Terms There are special terms that apply to your hardware warranty and various services that you can use during the one year warranty period You can contact an MXI Customer Service Representative at 1 888 422 6726 to receive a Return Materials Authorization RMA number ...

Page 13: ... your fingernail to gently lift the ring and roll it out of the groove towards the USB connector about as far as the LEDs Then roll the ring back into the groove Repeat if necessary Table 5 1 LED states State Description of state Solid green Open if no authentication mechanisms are set any user can use the device User has logged into the device if users exist it indicates that the device has authe...

Reviews: