IronKey Enterprise manual My.ironkey.com’ button

Page 10

3

Retrieve the email with your

Your System Admin has setup your IronKey ahead of

 

Activation Code. Copy and paste

time to abide by your organization’s security standards.

 

it into the IronKey window.

You will receive an email with an Activation Code that

 

 

 

 

is needed to use your IronKey.

 

 

 

 

Enter your email address and your Activation Code

 

 

 

 

into the fields provided on the IronKey window. Click

 

 

 

 

‘Continue’ when you are ready.

 

 

 

 

If your IronKey cannot connect to the Internet, click

 

 

 

 

“Edit Proxy Settings...” to adjust its network settings.

4

Create

 

Since you can have multiple IronKeys associated with

 

 

a device

 

one IronKey account, the nickname helps you distin-

 

password

 

guish between different IronKey devices.

 

and a

 

 

 

nickname

 

The threat of brute-force password attacks is removed

 

for your

 

by the IronKey’s self-destruct feature. Your password

 

IronKey.

 

is case-sensitive and must match your organization’s

 

 

 

 

password policy.

 

 

 

 

 

5

Back up your password to your

If enabled, you have the option to back up your pass-

 

online IronKey account

word online to your my.ironkey.com account. That way,

 

 

 

 

if you ever forget your password, your System Admin

 

 

 

 

can email you a reminder.

6

The IronKey will initialize.

During this process, it will generate the AES encryption

 

 

 

 

keys, create the file system for the secure volume, and

 

 

 

 

copy over secure applications and files to the secure

 

 

 

 

volume.

7

Set up your personalized login in-

If enabled, you continue the setup process online.

 

formation for your my.ironkey.com

my.ironkey.com is a secure site where you can man-

 

account by clicking the ‘Login to

age your IronKey account and devices. Accessing

 

my.ironkey.com’ button.

my.ironkey.com requires two-factor authentication (your

 

 

 

 

IronKey and your password).

8

Follow the onscreen directions to

Depending on your organization’s settings, you will cre-

 

setup your my.ironkey.com account.

ate a unique username, password, confirm your email

 

 

 

 

address for out-of-band authentication, and answer

 

 

 

 

Secret Questions for supplemental authentication.

 

 

 

 

You will also select a Secret Image that you will see

 

 

 

 

whenever you log in, as well as a Secret Phrase that is

 

 

 

 

used as an anti-phishing measure when communicating

 

 

 

 

with you via email.

9

You may need to respond to a

IronKey must verify your email address because it is

 

confirmation email by entering

used with important services related to your online

 

the confirmation code online.

account.

At this point, your IronKey is ready to protect your data, identity, and online privacy.

IRONKEY ENTERPRISE USER GUIDE

PAGE

Image 10
Contents User Guide Feedback@ironkey.com Contents Hardware-Encrypted Flash Drive Core FeaturesMeet the IronKey Self-Destruct SequenceSelf-Learning Password Management Portable & Cross-Platform Data AccessSecure Local Backup & Data Recovery Simple Device ManagementDevice Diagrams World’s Most Secure Flash DriveTMTechnical & Security Notes Password Manager Protection Making Tor Faster and More SecureStandard Usage Requires Product WalkthroughActivation and Initialization Windows only My.ironkey.com’ button Using the IronKey Unlocker on Windows Using the IronKey Unlocker on a Mac 10.4+Using the IronKey Unlocker on Linux Kernel Version must be 2.6 or higher Using the IronKey Control Panel Windows Only Vault at my.ironkey.com Using The Ironkey Virtual Keyboard Windows Only Using The Onboard Firefox & Secure Sessions Service windows Ctrl + ALT +Ironkey Enterprise User Guide Using The IronKey Password Manager Windows XP & Vista Only Adding Portable Bookmarks Adding online accountsIronkey Enterprise User Guide Using The Secure Backup Software Windows onlyUsing RSA SecurID onyour Ironkey WINdows Only Step Description Choose IronKey PKCS#11 Step Description Go to https//my.ironkey.com On Windows and Mac OS X Computers Usingyour IronKey in Read-Only Mode Windows, Mac, LinuxOn Linux Computers Using the IronKey Malware Scanner Windows Only Keeping your IronKey Malware Scanner Up to DateIronkey Enterprise User Guide Dimensions 75mm X 19mm X 9mm Product SpecificationsOperating Shock 16G rms Where can I go for more info? Who is the IronKey Team?Contact Information IronKey Online Support