Gebruiksaanwijzing /service van het product Basic D250 van de fabrikant Ironkey
Ga naar pagina of 32
P A GE 1 IR ONKEY USER GUIDE IR ONKEY P ersonal User Guide Models S200, S100 D200.
P A GE 1 IR ONKEY USER GUIDE Thank y ou for y our inter est in Ir onK e y . Ir onK ey is committed to cr eating and dev eloping the best security technologies and making them simple-to-use , affor dable , and a vailable to e ver y one .
P A GE 2 IR ONKEY USER GUIDE CONTENTS What is it? ................................................ 3 Meet the Ir onK ey ....................................................... 3 Core F eatur es .........................................................
P A GE 3 IR ONKEY USER GUIDE What is it? Meet the Ir onK ey The Ir onK ey P ersonal Secure Flash Driv e, designed to be the w orld’ s most secur e USB ash drive, protects y our data, passw ords, and Internet privacy with some of toda y’ s most advanced security technologies.
P A GE 4 IR ONKEY USER GUIDE P ortable Cr oss-Platform Data Access The Ir onK ey Unlock er allows y ou to access your encrypted les on Windows 2000, XP , Vista, Mac OS X and n umerous distributions of Lin ux.
P A GE 5 IR ONKEY USER GUIDE De vice Diagrams The Ir onK ey has been designed fr om the ground up with security in mind. A combination of advanced security technologies ar e used to ensure maximum pr otection of y our data.
P A GE 6 IR ONKEY USER GUIDE T echnical and Security Notes W e are endea v oring to be very open about the security architectur e and technology that we use in designing and building the Ir onK ey devices and online ser vices. There is no hocus-pocus or handwa ving here.
P A GE 7 IR ONKEY USER GUIDE Identity Manag er Pr otection The Ir onK ey Identity Manager and my .ironk ey.com w ork together , giving you the ability to back up y our online passw ords to y our Online Security V ault at my .ir onk ey .com . First, you m ust unlock your Ir onK ey de vice, which requir es tw o-factor authentication.
P A GE 8 IR ONKEY USER GUIDE Secure Sessions: Making T or F aster and More Secur e Ir onK ey maintains a secur e , private T or network with its o wn, high- performance servers (separate fr om the public T or network).
P A GE 9 IR ONKEY USER GUIDE Ho w does it work? Pr oduct W alkthr ough Y our IronK e y Personal Secur e Flash Driv e consists of the following components: » Ir onK ey Unlock er (Windows, Mac and Linu.
P A GE 10 IR ONKEY USER GUIDE 3 Create a de vice passw ord and a nickname for y our Ir onK ey . Because y ou can ha ve multiple Ir onK eys associated with one Ir onK ey account, the nickname helps you distinguish between diff erent Ir onK ey de vices.
P A GE 11 IR ONKEY USER GUIDE USING THE IRONKEY UNLOCKER ON WINDO WS The Ir onK ey Unlock er allows y ou to securel y access your les on m ultiple operating systems. It pr ompts you f or your pass wor d, securely validates it, and then mounts your secur e volume where all of y our les ar e stored on the Ir onK ey .
P A GE 12 IR ONKEY USER GUIDE INITIALIZING AND A CTIV A TING Y OUR IR ONKEY ON A MA C If you pr efer to use a Mac, you can choose to initialize y our Ir onK ey on a Mac OS X computer : Step Description 1 Plug the Ir onK ey into y our computer’ s USB port.
P A GE 13 IR ONKEY USER GUIDE 6 Activate your m y .ironk ey .com account. my .ir onk ey.com is a secur e site where y ou can manage your Ir onK e y account and devices. Accessing my .ir onk ey.com r equires tw o-factor authentication (y our Ir onK ey and y our passwor d).
P A GE 14 IR ONKEY USER GUIDE INITIALIZING Y OUR IRONKEY ON LINUX If you pr efer to use a Lin ux computer , you can choose to initialize y our Ir onK ey on Linux: Step Description 1 Plug it into y our computer’ s USB port. Y our IronK e y can be initialized on Linux 2.
P A GE 15 IR ONKEY USER GUIDE NO TE: ironkey only unlocks the secur e volume; it must then be mounted. Many modern Linux distributions will do this automatically; if not, run the mount program fr om the command line, using the de vice name printed by ironkey .
P A GE 16 IR ONKEY USER GUIDE Step Description 1 Creating, editing, deleting secure les When you click “Secure Files” in the Ir onK ey Contr ol Panel, the default br owser on y our computer opens directl y to your secur e v olume . All les on your Ir onK e y are str ongly encrypted with militar y-grade AES encr yption.
P A GE 17 IR ONKEY USER GUIDE 2 Updating device rmwar e/softwar e The Ir onK ey can secur ely update its softwar e and rmware thr ough signed updates that ar e v eried in hardwar e. This allows users to k eep their de vices up- to-date and pr otect themselves fr om futur e malwar e and online thr eats.
P A GE 18 IR ONKEY USER GUIDE 5 Creating a Lost and F ound Message This featur e allows y ou to create a message that will appear on the Ir onK ey Unlock er window . In the ev ent that you lose y our Ir onK ey , someone can return it to you if y ou pr ovide y our contact information.
P A GE 19 IR ONKEY USER GUIDE USING THE IRONKEY VIR TU AL KEYBO ARD (WINDO WS ONL Y) If you ar e using y our IronK e y on an unfamiliar computer and are concerned about k eylogging and scr eenlogging sp yware, use the IronK e y Vir tual K eyboar d, which helps protects y our passw ords b y letting you click out letters and numbers.
P A GE 20 IR ONKEY USER GUIDE USING THE ONBO ARD FIREFO X AND SECURE SESSIONS SER VICE (WINDO WS) Since your Ir onK e y comes with a Firefo x web br o wser already onboar d, none of your cookies, histor y les, bookmarks, add-ons or online passw ords ar e stor ed on the local computer .
P A GE 21 IR ONKEY USER GUIDE USING THE IRONKEY IDENTITY MANA GER (WINDO WS ONL Y) The Ir onK ey Identity Manager secur ely stor es and uses many of y our most important identity credentials, including login information and one-time pass wor ds to applications and online accounts.
P A GE 22 IR ONKEY USER GUIDE 2 Automatically logging into an account The next time you r eturn to a w ebsite or application for which y ou ha ve stor ed a passw ord, your login automatically lls in for y ou. If you ha v e the auto-login option enabled for that account, the Identity Manager also submits the login.
P A GE 23 IR ONKEY USER GUIDE USING THE SECURE BA CKUP SOFTW ARE (WINDO WS ONL Y) If your Ir onK e y is lost or stolen, you ha v e peace of mind knowing that your condential information cannot be seen by an yone but y ou.
P A GE 24 IR ONKEY USER GUIDE IMPOR TING A DIGIT AL CER TIFICA TE INT O THE IRONKEY (WINDO WS ONL Y) The Ir onK ey Cr yptochip includes a limited amount of extr emely secure har dwar e storage space , which can be used for storing the private k e y associated with a digital cer ticate.
P A GE 25 IR ONKEY USER GUIDE 4 Note that Ir onK ey’ s certicate is a vailable her e . Now y ou can add y our own. Click the “Impor t” button. 5 Br owse to the PKCS#12- format certicate le and open it. Y ou will be prompted f or the location of the PKCS#12- format certicate le (le extension will be .
P A GE 26 IR ONKEY USER GUIDE USING MY .IRONKEY .COM (WINDO WS AND MA C) Y our IronK e y suppor ts advanced cr yptographic authentication using str ong PKI k ey pairs generated in the Ir onK ey Cr yptochip . When you log into m y .ir onke y .com fr om y our device, it uses these unique k eys as y our digital identity cr edentials.
P A GE 27 IR ONKEY USER GUIDE 4 Monitoring account activities The Account Dashboard sho ws you the r ecent activities on your account, such as logins, failed passw ord attempts, and when your de vice passw ord has been r ecov ered.
P A GE 28 IR ONKEY USER GUIDE USING Y OUR IRONKEY IN READ-ONL Y MODE (WINDO WS, MA C , LINUX) Y ou can unlock your Ir onK ey in a r ead-only state such that les on y our Ir onK ey cannot be edited. An example of when this is useful is when you want to access a le on y our Ir onK ey while using an untrusted or unknown computer .
P A GE 29 IR ONKEY USER GUIDE * Adver tised capacity is appro ximate and not all of it will be available for storag e . Some space is requir ed for onboard softw are. Pr oduct Specications For details about y our device, see “About Ir onK ey” in Ir onK ey Contr ol Panel Settings.
P A GE 30 IR ONKEY USER GUIDE What’ s next? In many wa ys, that’ s up to y ou. W e ar e focused on building not only the world’ s most secure ash driv e, but also enabling technologies that are simple and enjo yable to use.
P A GE 31 IR ONKEY USER GUIDE Contact Information Pr oduct F eedback F eature Requests feedback@ironk ey .com featur erequest@ir onk ey .com Ir onK ey Online IronK e y Suppor t https://my .ir onk ey.com https://suppor t.ir onk ey .com https://learn.ironk ey .
Een belangrijk punt na aankoop van elk apparaat Ironkey Basic D250 (of zelfs voordat je het koopt) is om de handleiding te lezen. Dit moeten wij doen vanwege een paar simpele redenen:
Als u nog geen Ironkey Basic D250 heb gekocht dan nu is een goed moment om kennis te maken met de basisgegevens van het product. Eerst kijk dan naar de eerste pagina\'s van de handleiding, die je hierboven vindt. Je moet daar de belangrijkste technische gegevens Ironkey Basic D250 vinden. Op dit manier kan je controleren of het apparaat aan jouw behoeften voldoet. Op de volgende pagina's van de handleiding Ironkey Basic D250 leer je over alle kenmerken van het product en krijg je informatie over de werking. De informatie die je over Ironkey Basic D250 krijgt, zal je zeker helpen om een besluit over de aankoop te nemen.
In een situatie waarin je al een beziter van Ironkey Basic D250 bent, maar toch heb je de instructies niet gelezen, moet je het doen voor de hierboven beschreven redenen. Je zult dan weten of je goed de alle beschikbare functies heb gebruikt, en of je fouten heb gemaakt die het leven van de Ironkey Basic D250 kunnen verkorten.
Maar de belangrijkste taak van de handleiding is om de gebruiker bij het oplossen van problemen te helpen met Ironkey Basic D250 . Bijna altijd, zal je daar het vinden Troubleshooting met de meest voorkomende storingen en defecten #MANUAl# samen met de instructies over hun opplosinge. Zelfs als je zelf niet kan om het probleem op te lossen, zal de instructie je de weg wijzen naar verdere andere procedure, bijv. door contact met de klantenservice of het dichtstbijzijnde servicecentrum.