background image

PAGE  1

IRONKEY ENTERPRISE USER GUIDE

IronKey Enterprise

Models: S200, S100, D200

User Guide

Summary of Contents for Enterprise D200

Page 1: ...PAGE 1 IRONKEY ENTERPRISE USER GUIDE IronKey Enterprise Models S200 S100 D200 User Guide ...

Page 2: ...llions of dollars of development have gone into bringing this tech nology to you in the IronKey For a quick product overview you can also view our online demos at https www ironkey com demo We are very open to user feedback and would greatly appreciate hearing about your comments suggestions and experiences with the IronKey Standard Feedback feedback ironkey com Anonymous Feedback https www ironke...

Page 3: ...s and Mac 14 Using the IronKeyVirtual Keyboard Windows Only 17 Using the Onboard Firefox and Secure Sessions Service Windows Only 18 Using the IronKey Identity Manager Windows Only 19 Using the Secure Backup Software Windows Only 21 Using RSA SecurID onYour IronKey Windows Only 22 Importing a Digital Certificate into the IronKey Windows Only 23 Using my ironkey com Windows and Mac 25 UsingYour Iro...

Page 4: ...ly store 1 2 4 8 16 or 32 gigabytes of documents applications files and other data The IronKey Cryptochip inside the IronKey protects your data to the same level as highly classified government information and cannot be disabled or accidently turned off Self Destruct Sequence If the IronKey Cryptochip detects any physical tampering by a hacker it will self destruct Similarly after too many consecu...

Page 5: ...twork even across unsecured wireless hotspots with IronKey s Secure Sessions Service It can be easily toggled through the onboard Mozilla Firefox web browser Self Learning Password Management Securely store and backup all your passwords as you go with the IronKey Identity Manager It allows you to automatically log into your applications and online accounts to avoid keylogging spyware and phishing ...

Page 6: ... lasting You can rest assured that your data is secured when you carry an IronKey This IronKey Cryptochip is hardened against physical attacks such as power attacks and bus sniffing It is physically impossible to tamper with its protected data or reset the password counter If the Cryptochip detects a physical attack from a hacker it will destroy the encryption keys making the stored encrypted file...

Page 7: ...rity Features USB command channel encryption to protect device communications Firmware and software securely updateable over the Internet Updates verified by digital signatures in hardware Physically Secure Solid rugged case Encryption keys stored in the tamper resistant IronKey Cryptochip All chips are protected by epoxy based potting compound Exceeds military waterproof standards MIL STD 810F De...

Page 8: ...ally encrypted with 256 bit AES using randomly generated keys encrypted with a SHA 256 hash of your device password All of this data is then doubly encrypted with 128 bit or 256 bit AES hardware encryption This is the strongest password protection we have ever seen in the industry When you back up your passwords online IronKey performs a complicated public key cryptography handshake with IronKey s...

Page 9: ...dard Usage Requires Windows 2000 SP4 XP SP2 Vista or 7 Mac 10 4 or Linux 2 6 computer A USB 2 0 port for high speed data transfer An Internet connection for the online services An email from your System Admin with an Activation Code Activation and Initialization Windows and Mac When you open the package you will find one IronKey Secure Flash Drive and a Quick Start Guide Below is a brief descripti...

Page 10: ... that is needed to use your IronKey Enter your email address and your Activation Code into the fields provided on the IronKey window Click Continue when you are ready If your IronKey cannot connect to the Internet click Edit Proxy Settings to adjust its network settings 4 Create a device password and a nickname for your IronKey Since you can have multiple IronKeys associated with one IronKey accou...

Page 11: ...t Depending on your organization s settings you will create a unique username password confirm your email address for out of band authentication and answer Secret Questions for supplemental authentication You will also select a Secret Image that you will see whenever you log in as well as a Secret Phrase that is used as an anti phishing measure when communicating with you via email 9 You might nee...

Page 12: ...t unplug and reinsert the IronKey NOTE Some operations require that your IronKey connect to the Internet before unlocking If it cannot connect click Edit Proxy Settings to configure how your IronKey connects to the Internet 2 Choose which action to take when you unlock it By selecting the corresponding checkboxes before unlocking your IronKey you can view your secure files launch the IronKey Contr...

Page 13: ...x systems If enabled you can manage your secure files on Linux 2 6 allowing you to securely transfer files from and between Windows Mac and Linux computers Depending on your Linux distribution you might need root privileges to use the program ironkey found in the Linux folder of the mounted virtual CD ROM If you have only one IronKey attached to the system simply run the program from a command she...

Page 14: ...ve permissions to mount external SCSI and USB devices Some distributions do not mount automatically you must run the following command mount dev name of the device media name of the mounted device The name of the mounted device varies depending on the distribution The names of the IronKey devices can be discovered by running ironkey show 3 Permissions You must have permissions to mount external us...

Page 15: ... update its software and firmware through signed updates that are verified in hardware This allows users to keep their devices up to date and protect themselves from future malware and online threats To check for available updates click the Check for Updates button Windows or Check Now button Mac Windows If an update is available you can download and install it by clicking the Download Update butt...

Page 16: ... proxy Use System Settings default Uses the proxy settings of your computer from the following locations Windows Control Panel Internet Options Mac System Preferences Network Proxy IMPORTANT Firefox proxy settings must be the same as System Preferences and IronKey Control Panel Firefox does not use System Preference data Configuration Script Enter the URL or path to where your Web Proxy Auto Detec...

Page 17: ...delete applications in the list You can also change between icon and list view NOTE Mac Applications installed on the secure volume are automatically added to the list default empty Items in the list are shortcuts to actual files Managing the items in the list will not alter the actual file Items are automatically sorted alphabetically Any file can be added to the list including documents images a...

Page 18: ... number of other applications when you need extra security typing out information e g email documents Step Description 1 Click the IronKeyVirtual Key board icon The IronKeyVirtual Keyboard will appear Alternatively you can press CTRL ALT V 2 Click the keys to type your pass word Click Enter when you are finished You can use the IronKeyVirtual Keyboard in conjunc tion with the actual keyboard so th...

Page 19: ...irectly from your IronKey out to a secured IronKey web server where it is then decrypted and sent out to the destination site This security gives you anti phishing and anti pharming protection for example we do our own DNS checking as well as enhanced privacy protection for example your IP address will not be available to other websites and ISPs You can check this out by going to a site such as wh...

Page 20: ...cannot simply copy your password database Also not typing your passwords provides added protection from keyloggers and other crimeware The Identity Manager works withVeriSign sVIP service to lock down many important online accounts including eBay PayPal AOL and Geico accounts This new technology generates a one time password for each login locking down your online account so that it can only be us...

Page 21: ...r encrypted Identity Manager data to your Online SecurityVault Simply click the Backup button from within the IronKey Identity Manager to back up all of your Identity Manager data Synchronizing IronKeys or setting up Master Slave relationships is easy since you can restore backups to your other IronKeys 5 Locking down accounts with VeriSign sVIP Service You can lock down some important online acco...

Page 22: ...g up your IronKey You can create an encrypted backup of a single file or your entire IronKey to your local computer Click the Secure Backup button in the IronKey Control Panel select a destination folder and select which files to back up It s that simple 2 Restoring encrypted backups If you ever lose your IronKey you can restore your data from an encrypted backup Open the Secure Backup client sele...

Page 23: ...m Web and pasting that URL in the appropriate field 3 If you prefer rename your tokens Click the Change Name button to create a name for the selected token If your file contains more than one Token you will receive a duplicate message for each token imported Click OK When all tokens have been imported the RSA application will be available for use 4 To use the application enter the PIN if required ...

Page 24: ...ional strong authentication capabilities For example you could store a self signed certificate used for internal systems that will allow you to automatically log in when using the IronKey s onboard Firefox web browser The import process uses IronKey s PKCS 11 interface and requires Mozilla Firefox Note that there is only space for one additional private key in the IronKey Cryptochip though that ke...

Page 25: ...ificate is available here Now you can add your own Click the Import button 5 Browse to the PKCS 12 format certificate file and open it You will be prompted for the location of the PKCS 12 format certificate file file extension will be p12 in UNIX Linux pfx in Windows 6 A window appears asking you to confirm where to store the certificate Choose IronKey PKCS 11 ...

Page 26: ...gital identity credentials This locks down your account so that you must have both your IronKey and your password in order to gain access In other words only you can access your online IronKey account even if someone stole your IronKey or your password Step Description 1 Securely logging into your account If enabled you can securely log into your my ironkey com by clicking the my ironkey com butto...

Page 27: ...nager Data button 5 Monitoring account activities The Account Dashboard shows you the recent activities on your account such as logins failed password attempts and when your device password has been recovered 6 Enabling Account Alerts for real time account monitoring You can enable a number of Account Alerts for additional insight into what activities are occurring on your my ironkey com account A...

Page 28: ...your account you might need to answer your Secret Questions 4 You are now logged into Safe Mode If you had forgotten your device password and have backed it up to your Online SecurityVault you can recover it now UsingYour IronKey in Read Only Mode Windows Mac Linux You can unlock your IronKey in a read only state such that files on your IronKey cannot be edited An example of when this is useful is...

Page 29: ...re you can edit files again lock your IronKey ironkey lock Usingthe IronKey Malware Scanner Windows Only Normal flash drives can inadvertently spread malware from one computer to another Your IronKey however includes built in anti malware features including A read only virtual CD from which the most important IronKey files run Autorun protection from worms and viruses that spread just by plugging ...

Page 30: ... 1 If enabled the IronKey Malware Scanner runs automatically when you unlock your IronKey You can bring the IronKey Malware Scanner to the foreground at any time by clicking on the IronKey Malware Scanner system tray icon The IronKey Malware Scanner is a feature that is configured by your System Administrator 2 The IronKey Malware Scanner will automatically check for updates This is an important s...

Page 31: ... 9mm WEIGHT 0 8 oz WATERPROOF MIL STD 810F OPERATINGTEMPERATURE 0C 70C OPERATING SHOCK 16G rms ENCRYPTION Hardware 256 bit AES Models S200 D200 128 bit AES Model S100 Hashing 256 bit SHA PKI 2048 bit RSA FIPS CERTIFICATIONS See www ironkey com for details HARDWARE USB 2 0 High Speed port recommended USB 1 1 OS COMPATIBILITY Windows 2000 SP4 XP SP2 Vista or 7 IronKey Unlocker for Linux 2 6 x86 Iron...

Page 32: ...urity architecture and technology that we use in designing and building the IronKey devices and online services A great deal of information can be found online on our websites forum ironkey com User forum with thousands of IronKeyologists www ironkey com General information support ironkey com Customer support information and video tutorials Who is the IronKey Team The IronKey Team consists of sec...

Page 33: ...shing or use of this material The information provided herein is subject to change without notice The information contained in this document represents the current view of IronKey on the issue discussed as of the date of publication IronKey can not guarantee the accuracy of any information presented after the date of publication This document is for information purposes only IronKey makes no warra...

Reviews: