background image

What systems can I use it on?

 9

ABOUT MY DEVICE 

DataLocker H300/H350 Enterprise User Guide 

Password-Protected

Device access is secured using password protection. Do not share your password with anyone so that even if 
your device is lost or stolen, no one else can access your data.

Self-Destruct Sequence

If the Cryptochip detects physical tampering, or if a specified number of consecutive incorrect password 
attempts have been entered, it initiates a permanent self-destruct sequence that securely erases all onboard 
data—

so remember your password

.

Anti-Malware Autorun Protection

Your device is capable of protecting you from many of the latest malware threats targeting USB drives by 
detecting and preventing autorun execution of unapproved programs. It can also be unlocked in Read-Only 
Mode if you suspect the host computer is infected.

Simple Device Management

Your device includes the DataLocker Control Panel, a program for accessing your files, managing your device 
and editing your preferences, changing your device password, and safely locking your device. Enterprise 
device users can also access their online account (if applicable) and admin users can open the Admin Console 
from the Control Panel. 

Online account

Your online account allows you to use some Enterprise applications and features, such as resetting a password. 

WHAT SYSTEMS CAN I USE IT ON?

• Windows

®

 10

• Windows

®

 8.1

• Windows

®

 8

• Windows

®

 7

• Windows

®

 Vista

• Windows

®

 XP (SP2+)

• Mac  OS

®

 X (10.6 or higher)

• Linux (2.6 or higher)—

Note:

 The Linux CLI Unlocker does not support any features that require net-

work access, for example setting up your device or changing your password.

Some applications are available only on specific systems:

Windows Only

• Virtual Keyboard (English only)

• Anti-Malware Scanner

• Device updates

Mac Only

• Auto-Launch Assistant 

HOW SECURE IS IT?

H300 and H350 devices have been designed from the ground up with security in mind. A combination of 
advanced security technologies are used to ensure that only you can access your data. Additionally, it has 
been designed to be physically secure, to prevent hardware-level attacks and tampering, as well as to make 
the device rugged and long-lasting. 

Содержание IronKey EMS H350 Enterprise

Страница 1: ...DATALOCKER H300 H350 ENTERPRISE ENCRYPTED EXTERNAL HARD DRIVE User Guide...

Страница 2: ...hat may cause undesired operation This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to part 15 of the FCC Rules These limits are designed to prov...

Страница 3: ...9 How secure is it 9 Product specifications 10 Recommended best practices 11 Using my device 13 Setting up the device 13 Unlocking and locking the device 14 Managing passwords 16 Accessing my secure...

Страница 4: ...ws systems prompt to restart after you first plug in your device You can safely close that prompt without restarting no new drivers or software are installed MISE EN ROUTE Installation avec Windows et...

Страница 5: ...rsten Mal anschlie en Sie k nnen diese Aufforderung sicher schlie en ohne Neu zu starten keine neuen Laufw erke oder Software werden installiert INICIO R PIDO Instalaci n en Windows y Mac Windows XP V...

Страница 6: ...ws XP Vista 7 8 8 1 10 Mac OS X 10 6 1 USB 2 Windows Unlocker Unlocker exe Mac Unlocker Unlocker 3 PRIVATE USB Windows Windows Mac Windows XP Vista 7 8 8 1 10 Mac OS X 10 6 1 USB 2 Windows Unlocker Un...

Страница 7: ...Mac Windows XP Vista 7 8 8 1 10 Mac OS X 10 6 1 USB 2 Windows Unlocker Unlocker exe Mac Finder Unlocker Unlocker 3 Windows Windows Mac Windows XP Vista 7 8 8 1 10 Mac OS X 10 6 1 USB 2 Windows Unlocke...

Страница 8: ...evice applications and features are configured by the System Administrator Some settings that are described in this guide may not be available to you if the administrator has not enabled them for your...

Страница 9: ...diting your preferences changing your device password and safely locking your device Enterprise device users can also access their online account if applicable and admin users can open the Admin Conso...

Страница 10: ...fied in hardware Password try counter implemented in tamper resistant hardware Once the password try count is exceeded the device will initiate a permanent self destruct sequence Sensitive data and se...

Страница 11: ...Tick Taiwan BSMI Japan VCCI Korea KCC KCC ID MSIP REM WKY H300 KCC ID MSIP REM WKY H350 Certification FIPS 140 2 level 3 certified applies to H350 only Hardware USB 3 0 SuperSpeed port recommended As...

Страница 12: ...practices 12 ABOUT MY DEVICE DataLocker H300 H350 Enterprise User Guide 3 Never unplug the device when the LED is on 4 Never share your device password 5 Perform a computer anti virus scan before sett...

Страница 13: ...e software will use the same language as your computer s operating system 4 Type a device password and confirm it and then click Continue Your password is case sensitive and must comply with the passw...

Страница 14: ...odifying your files Administrators can also force your device to unlock in a read only state When working in this mode the DataLocker Control Panel will display the text Read Only Mode In this mode yo...

Страница 15: ...he files by running CHKDSK and using data recovery software To manually lock the device Click the Lock button in the bottom left of the Control Panel to safely lock your device Tip You can also use th...

Страница 16: ...eyboard on page 16 To change your password 1 Unlock your device and click the Settings button on the menu bar 2 Click Password in the left sidebar 3 Enter your current password in the field provided 4...

Страница 17: ...u password reset privileges Otherwise you must contact your administrator To reset your password 1 Plug in your device and start the Unlocker 2 Click Password Help 3 At the Password Help prompt click...

Страница 18: ...Check for Updates 4 If an update is available click Download to start the install process and follow the instructions on screen Tip You can check for updates automatically each time you unlock your d...

Страница 19: ...ice is in use enter unlocker exe lock devicename where devicename is the name of the device you want to lock Please note the following important details for using your device on Linux 1 Kernel Version...

Страница 20: ...ailable on your device The green bar graph represents how full the device is for example the meter will be totally green when the device is full The white text on the Capacity Meter displays how much...

Страница 21: ...re you can quickly launch on board applications and files Items that appear in the list are shortcuts to the actual files Managing the list items does not alter the actual file 1 Unlock your device Th...

Страница 22: ...me If you own more than one Enterprise device you can create nicknames for each device Names help you tell the devices apart from each other 1 Log on to your online account 2 On the My Devices tab cli...

Страница 23: ...e information about DataLocker products Please contact your Help desk or System Administrator if you have further questions support datalocker com Support information knowledge base and video tutorial...

Отзывы: