IronKey Workspace W700 User Guide - Kingston Technology › support › ironkey › WS42 › v41 ›...

17
IronKey Workspace Models: W700 Updated: September 2013 User Guide

Transcript of IronKey Workspace W700 User Guide - Kingston Technology › support › ironkey › WS42 › v41 ›...

Page 1: IronKey Workspace W700 User Guide - Kingston Technology › support › ironkey › WS42 › v41 › IronKey_… · IRONKEY WORKSPACE W700 USER GUIDE PAGE 7 1. IronKey Control Panel

PAGE 1IRONKEY WORKSPACE W700 USER GUIDE

IronKey Workspace Models: W700Updated: September 2013

User Guide

Page 2: IronKey Workspace W700 User Guide - Kingston Technology › support › ironkey › WS42 › v41 › IronKey_… · IRONKEY WORKSPACE W700 USER GUIDE PAGE 7 1. IronKey Control Panel

PAGE 1IRONKEY WORKSPACE W700 USER GUIDE

Thank you for your interest in IronKey™ Workspace W700 by Imation.

Imation’s Mobile Security Group is committed to creating and developing the best security technologies and making them simple-to-use and widely available. Years of research and millions of dollars of development have gone into bringing this technology to you.

We are very open to user feedback and would appreciate hearing about your comments, suggestions, and experiences with this product.

Feedback:

[email protected]

User Forum:

https://forum.ironkey.com

Page 3: IronKey Workspace W700 User Guide - Kingston Technology › support › ironkey › WS42 › v41 › IronKey_… · IRONKEY WORKSPACE W700 USER GUIDE PAGE 7 1. IronKey Control Panel

PAGE 2IRONKEY WORKSPACE W700 USER GUIDE

CONTENTS

About my device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3IronKey Workspace W700 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3How is it different than a regular flash drive? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3What systems can I use it on? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

Device Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5Product specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5Recommended best practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6About IronKey Control Panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

Start the Control Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

How do I . . .? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8Set up the host computer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

Set the host computer to boot from USB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8Set up the device. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

Activate a managed device. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9Start the secure Workspace for the first time. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

Access the secure Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10Boot from the device to access the secure Workspace . . . . . . . . . . . . . . . . . . . . . . . . . 10

Unlock and lock the device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11Unlock device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11Lock device. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

Unplug the device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12Access my device if I forget my password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12Change my password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13Update my device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13Find information about my device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13Manage my online account settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

Change device nickname . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14Manage account settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

Where can I get Help? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16For more information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16To contact support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

Page 4: IronKey Workspace W700 User Guide - Kingston Technology › support › ironkey › WS42 › v41 › IronKey_… · IRONKEY WORKSPACE W700 USER GUIDE PAGE 7 1. IronKey Control Panel

PAGE 3IRONKEY WORKSPACE W700 USER GUIDE

About my deviceIronKey Workspace W700IIronKey Workspace W700 is a trusted, secure USB flash drive. The Microsoft-certified Windows To Go device, IronKey Workspace W700, allows you to use virtually any computer as your own secure personal workspace, capable of using all host system resources. Your IronKey Workspace W700 device contains a fully functional version of Windows 8.

If your device is managed by IronKey Enterprise Server, you will receive update notifications and policy changes for the device when the device connects to the server. The IronKey Control Panel application lets your device communicate with the IronKey Enterprise Server.

This guide refers to two different device environments:

» Host environment—Also called the “non-boot environment”. Describes the scenario when you are using the operating system of the host computer and the device is just a USB device and is not booted into Windows To Go.

» Secure Workspace—Describes when you boot the Windows To Go operating system on the device.

How is it different than a regular flash drive?Hardware EncryptionInside your device is the IronKey Cryptochip, which protects your data to the same level as highly classified government information. This security technology is always on and cannot be disabled.

Password-ProtectedUnlock the device with a password using the Unlocker software that is carried on the device. Do not share your password with anyone. That way, even if your device is lost or stolen, no one else can access your data.

Self-Destruct SequenceIf the Cryptochip detects physical tampering by a hacker, or if a specified number of consecutive incorrect password attempts have been entered, it initiates a permanent self-destruct sequence that securely erases all onboard data using flash-trash technology—so remember your password.

Page 5: IronKey Workspace W700 User Guide - Kingston Technology › support › ironkey › WS42 › v41 › IronKey_… · IRONKEY WORKSPACE W700 USER GUIDE PAGE 7 1. IronKey Control Panel

PAGE 4IRONKEY WORKSPACE W700 USER GUIDE

Simple Device ManagementYour device includes the IronKey Control Panel, a central management area for editing your preferences, changing your device password and safely locking your device. For more information about the IronKey Control Panel, see “About IronKey Control Panel” on page 6.

Waterproof and Tamper-ResistantDesigned to survive the extremes, IronKey Workspace W700 has a rugged metal encasing that is injected with an epoxy compound that makes it not only tamper-resistant, but waterproof to military specifications (MIL-STD-810F).

What systems can I use it on? » Windows® 8 » Windows® 7

PCs that are certified for use with Windows 7 or Windows 8 can be configured to boot directly from USB, check with the hardware manufacturer if you are unsure of the ability of your PC to boot from USB.

NOTE: The computer must have a USB 3.0 or 2.0 port for high-speed data transfer. A USB 1.1 port or powered hub will also work, but will be slower. Each computer must be configured to allow you to boot an operating system from a USB device. For more information, see “Set up the host computer” on page 8.

How secure is it?IronKey Workspace W700 has been designed from the ground up with security in mind. A combination of advanced security technologies are used to ensure that only you can access your data. Additionally, it is a physically secure device, to prevent hardware-level attacks and tampering, as well as to make the device rugged and long-lasting.

The IronKey Cryptochip is hardened against physical attacks such as power attacks and bus sniffing. It is physically impossible to tamper with its protected data or reset the password counter. If the Cryptochip detects a physical attack from a hacker, it destroys the encryption keys, making the stored encrypted files inaccessible.

We strive to be very open about the security architecture and technology that we use in designing and building this product. We use established cryptographic algorithms, we develop threat models, and we perform security analyses (internal and third party) of our systems all the way through design, development and deployment.

Page 6: IronKey Workspace W700 User Guide - Kingston Technology › support › ironkey › WS42 › v41 › IronKey_… · IRONKEY WORKSPACE W700 USER GUIDE PAGE 7 1. IronKey Control Panel

PAGE 5IRONKEY WORKSPACE W700 USER GUIDE

DEVICE SECURITY

Data Encryption Keys » AES key generated by onboard Random Number Generator » AES key generated at initialization time and encrypted with hash of user password » No backdoors: AES key cannot be decrypted without the user password » AES key never leaves the hardware and is not stored in NAND flash

Data Protection » Windows To Go partition is not accessible until password is verified in hardware » Password try-counter implemented in tamper-resistant hardware » Once password try-count is exceeded, all data is erased by hardware » Secure box architecture accessible only to firmware to store sensitive data and settings

Device Password Protection » USB command channel encryption to protect device communications » Password-in-memory protection to protect against cold-boot and other attacks

The device password is hashed using salted SHA-256 before being transmitted to the device firmware over a secure and unique USB channel. It is stored in an extremely inaccessible location in the protected Cryptochip hardware. The hashed password is validated in hardware (there is no “getPassword” function that can retrieve the hashed password), and only after the password is validated is the AES encryption key decrypted. The password try-counter is also implemented in hardware to prevent memory rewind attacks. Typing your password incorrectly too many times initiates a permanent “flash-trash” self-destruct sequence, which is run in hardware rather than using software, ensuring the ultimate protection for your data.

Product specificationsFor details about your device, see “Device Info” in the IronKey Control Panel settings.

Specification DetailsCapacity* Up to 32GB, 64GB, 128GBDimensions 82mm X 21.1mm X 9.1mmWeight 1.12 oz (32 grams)Operating Temperature 0C, 70COperating Shock 16G rmsHardware Encryption • Data: 256-bit AES (CBC mode)

• Hardware: 256-bit AES • Hashing: 256-bit SHA

Page 7: IronKey Workspace W700 User Guide - Kingston Technology › support › ironkey › WS42 › v41 › IronKey_… · IRONKEY WORKSPACE W700 USER GUIDE PAGE 7 1. IronKey Control Panel

PAGE 6IRONKEY WORKSPACE W700 USER GUIDE

Specification DetailsHardware • USB 3.0 (Super speed) port recommended, USB 2.0 (High-Speed),

USB 1.1• Water-resistant MIL-STD-810F• Dust-resistant• Shock-resistant• Ruggedized

OS Compatibility • Windows 8, Windows 7 (any PC certified for use with Windows 7 or Windows 8)

Accessibility IronKey Control Panel is designed to be Section 508 compliant. Users with disabilities have keyboard navigation and screen reader support.

Designed and Assembled in the U.S.A.* Advertised capacity is approximate. Some space is required for Windows To Go software.

Recommended best practices » Never unplug the device when the LED is on » Never share your device password » Perform a computer anti-virus scan before setting up the device

In the host environment:

» Lock the device:• when not in use• before unplugging it• before the system enters sleep mode

In the secure Workspace (Windows To Go):

» Do NOT unplug the device while you are booted into WTG as it can result in loss of data. or possibly cause irreparable damage to the operating system.

» If your WTG operating system is in Hibernate mode, do not unplug the device and move it to another computer. Hibernate mode does not support roaming between computers and could corrupt your device.

About IronKey Control PanelIronKey Control Panel connects a managed device to the IronKey Enterprise Server. It also allows you to modify device settings, for example, you can change your password. There are two IronKey Control Panel applications on your device. Some IronKey Control Panel operations are only available in one of the device environments.

Page 8: IronKey Workspace W700 User Guide - Kingston Technology › support › ironkey › WS42 › v41 › IronKey_… · IRONKEY WORKSPACE W700 USER GUIDE PAGE 7 1. IronKey Control Panel

PAGE 7IRONKEY WORKSPACE W700 USER GUIDE

1. IronKey Control Panel on the USB drive (in the host environment)• This application is accessible only from the USB drive.• Connects to the server to receive and allow you to download device updates and policy

changes.• Allows you to unlock and lock your USB device in the host environment.• Opens automatically after you Activate the device.

2. IronKey Control Panel on your Windows To Go operating system (in the secure Workspace environment)• This application opens automatically and is accessible in the taskbar only when the device

is booted in Windows To Go.• Connects to the server to receive device update notifications and policy changes. You can

download device software updates only in the Control Panel in the host environment.• Does not have a “lock device” option.

You can use the Control Panel in either environment to do the following:

» Change device password » View device information » Modify “Unlock Message” that displays when you unlock the device » View notifications about device software updates » Access the Admin Console (if you are an Admin user)

START THE CONTROL PANEL

In the host environment1. Double-click the “IronKey.exe” file from the IronKey Workspace drive on the device.

2. Type your device password and click “Unlock”. The IronKey Control Panel will open auto-matically.

In the secure WorkspaceThe Control Panel starts automatically when you boot into your Windows To Go secure Workspace. You can access it from the Windows taskbar.

• Click the IronKey icon in the taskbar and choose IronKey Control Panel.

Page 9: IronKey Workspace W700 User Guide - Kingston Technology › support › ironkey › WS42 › v41 › IronKey_… · IRONKEY WORKSPACE W700 USER GUIDE PAGE 7 1. IronKey Control Panel

PAGE 8IRONKEY WORKSPACE W700 USER GUIDE

How do I...?Set up the host computerBefore you plug in your device, you must make sure that the host computer is able to boot from a USB device. You should check the boot setting for each computer on which you want to use your device. The host computer must use either a Windows 7 or Windows 8 operating system (or be certified for use with Windows 7 or Windows 8).

Once the computer is configured to boot from a USB device, you can plug in your IronKey Workspace W700 device. If this is the first time booting the device into the secure Workspace, you may have to set up some Windows installation settings.

NOTE: If your administrator has already configured the boot setting for the host computer, you can skip this step and set up the device.

SET THE HOST COMPUTER TO BOOT FROM USB

1. Shut down the host computer if it is not already turned off.

2. Turn on the computer and enter the BIOS/UEFI. This is a very fast step. You have only a few seconds to press the correct key to access the BIOS/UEFI. An on-screen message will indicate the key sequence, for example, “Press the Esc key”, or “Press F1 to enter setup”.

3. Configure the system to boot from USB by turning on USB BOOT and moving the setting USB MassStorage to the first position in the boot order.

4. Save the new BIOS/UEFI settings and shut down the computer.

5. You can now plug in your device and follow the steps in the section “Set up the device” on page 8.

Set up the deviceBefore you can access your Windows To Go Workspace, you must activate the device. During the activation process, the device policy from IronKey Enterprise Server is applied to the device. Device activation is done in the host environment before you boot into the secure Workspace.

You will need the activation code that was sent to you in an e-mail message from an administrator. During the activation procedure, you will have to set a device password. After you activate the device, you can start up the secure Workspace on the device.

Page 10: IronKey Workspace W700 User Guide - Kingston Technology › support › ironkey › WS42 › v41 › IronKey_… · IRONKEY WORKSPACE W700 USER GUIDE PAGE 7 1. IronKey Control Panel

PAGE 9IRONKEY WORKSPACE W700 USER GUIDE

The first time you start the Windows To Go operating system on the device, you might be required to complete some Windows installation settings. Some administrators may configure these settings before they give you the device.

NOTE: If your device is not managed by IronKey Enterprise Server, you do not need to activate it. Follow the steps to start the secure Workspace. You will be asked for a device password. This is the password your administrator gave to you. You should change the password from the default one, see “Change my password” on page 13.

ACTIVATE A MANAGED DEVICE

1. In the host environment, plug the IronKey device into the host computer’s USB port.

2. Double-click the “IronKey.exe” file from the IronKey Workspace drive.

3. Type the Activation Code. You should have received the code in an e-mail message sent from your Administrator.

4. Type a device password and confirm it, and then click the “Continue” button.Your password is case-sensitive and must comply with the password policy set by the administrator.

5. If you are prompted to provide an e-mail address for an online account, enter it now and click the “Continue” button. (Online accounts are required for admin users).• A message prompt will appear indicating that an e-mail has been sent to you. Follow the

instructions in the e-mail to set up your online account; this includes creating a “secret question”.

• Once you have set up your online account, click OK in the message prompt to proceed with the device setup.

6. The device initializes. During this process, it applies the policy for the device as configured in IronKey Enterprise Server.

7. When the initialization is complete, the IronKey Control Panel appears.

Page 11: IronKey Workspace W700 User Guide - Kingston Technology › support › ironkey › WS42 › v41 › IronKey_… · IRONKEY WORKSPACE W700 USER GUIDE PAGE 7 1. IronKey Control Panel

PAGE 10IRONKEY WORKSPACE W700 USER GUIDE

• If you want to add or modify the message that displays on the Unlocker screen, see “Create a message that displays in the Unlocker” on page 11.

8. Safely eject the device and unplug it, then power off the host computer. The device is now ready to boot into the secure Workspace.

START THE SECURE WORKSPACE FOR THE FIRST TIME

1. Ensure that the host computer is powered off, and then insert the W700 device into the USB port.

2. Turn on the computer and wait for the IronKey Workspace Preboot Environment to start.

3. Type the device password (if the device is not managed by IronKey Enterprise Server, your administrator will give this to you, otherwise, type the password that you set when you acti-vated the device) and click Unlock.

4. The computer will reboot into the secure Windows To Go workspace.

5. Follow the on-screen instructions to configure settings for the Windows installation on the device. This is only required the first time you boot into the secure Workspace.

NOTE: When you start the secure portable Workspace on different computers, Windows To Go will adapt to the hardware of the local system to use its unique set of hardware components. This hardware adaptation process will not be performed with each subsequent startup on the same computer. The device stores information for each system from which it has been booted. It applies the hardware profile for that system as the computer boots.

Access the secure WorkspaceAfter you set up the device you are ready to use it as your secure portable Workspace. Each time you boot from the device, you must provide the device password to unlock the operating system so Windows To Go can start. The steps are almost identical to starting the secure Workspace for the first time except that you do not have to customize the Windows Installation.

BOOT FROM THE DEVICE TO ACCESS THE SECURE WORKSPACE

1. Ensure that the host computer is powered off, and then insert the W700 device into the USB port.

2. Turn on the computer and wait for the IronKey Workspace Preboot Environment to start.

3. Type the device password and click the “Unlock” button.

4. The computer will reboot into the secure Windows To Go workspace.

Page 12: IronKey Workspace W700 User Guide - Kingston Technology › support › ironkey › WS42 › v41 › IronKey_… · IRONKEY WORKSPACE W700 USER GUIDE PAGE 7 1. IronKey Control Panel

PAGE 11IRONKEY WORKSPACE W700 USER GUIDE

Unlock and lock the deviceWhen you unlock the device in the host environment, the IronKey Control Panel starts from the USB device. You should always lock the device before you unplug it from the host environment.

When you boot the device in Windows To Go, you unlock the device during the Preboot Environment. You cannot lock the device from the Control Panel in Windows To Go.

UNLOCK DEVICE

1. In the host environment, plug in your device to the host computer and start the Unlocker window by opening the “IronKey Workspace” device drive and double-clicking the “IronKey.exe” file.

2. Type your device password and click “Unlock”. The IronKey Control Panel will appear.• Entering the wrong password a consecutive number of times—depends on the password

settings defined by the administrator—will permanently destroy the device and all your onboard data.

• As a security precaution, you must unplug and reinsert the device after every three failed password attempts.

TIP: If you want to boot into the secure Workspace, see “Access the secure Workspace” on page 10.

Create a message that displays in the UnlockerThis feature, if enabled by the System Admin, allows you to create a message that appears on the IronKey Unlocker window . For example, you can provide contact information so that if you lose your device someone will know how to return it to you.

1. In the host environment, unlock your device and click the “Settings” button in the menu bar of the Control Panel.

2. Click the “Preferences” button in the left sidebar.

3. Enter text in the “Unlock Message” field.Your message text must fit the space provided (approximately 7 lines and 200 characters).

LOCK DEVICE• In the host environment, click the “Lock” button in the bottom left of the Control

Panel to safely lock your device. You can also use the keyboard shortcut: CTRL + L. If you want the device to automatically lock when not in use, see “Set device to automatically lock” on page 12.

CAUTION: Once the device is locked, you can perform a safe removal operation to safely unplug it. However, do not unplug the device when it is unlocked.

Page 13: IronKey Workspace W700 User Guide - Kingston Technology › support › ironkey › WS42 › v41 › IronKey_… · IRONKEY WORKSPACE W700 USER GUIDE PAGE 7 1. IronKey Control Panel

PAGE 12IRONKEY WORKSPACE W700 USER GUIDE

NOTE: You cannot lock a device from the Control Panel in the secure Workspace. You must shut down the Windows operating system to safely remove the device. For more information, see “Unplug the device” on page 12.

Set device to automatically lock If enabled by your System Admin, you can set a device time-out to automatically lock your device after a specified period of inactivity. This will help prevent others from accessing your secure files. This is only available in the host environment and not while you are booted into the secure Workspace.

1. In the host environment, access the IronKey Control Panel on your device from the USB drive of the host computer.

2. Click the “Settings” button in the menu bar.

3. Click the “Preferences” button in the left sidebar.

4. Click the checkbox for auto-locking the device and set the time-out for either 5, 15, 30, 60, 120, or 180 minutes.

Unplug the device In host environment » Lock the device and perform a safe removal operation of the USB drive then unplug the

device.

In the secure Workspace » After you are finished using your secure Workspace, you must properly shut down the

operating system on the device before you unplug it. Follow the procedure in the Windows documentation to shut down the Windows To Go operating system.

IMPORTANT: DO NOT unplug the device without first shutting down Windows To Go; this can result in loss of data and potentially cause irreparable damage to the operating system.

Access my device if I forget my passwordIf you forget your password, you must contact your administrator. Your administrator can reset your password and you can then follow the steps in the Change my password procedure to set it again.

Page 14: IronKey Workspace W700 User Guide - Kingston Technology › support › ironkey › WS42 › v41 › IronKey_… · IRONKEY WORKSPACE W700 USER GUIDE PAGE 7 1. IronKey Control Panel

PAGE 13IRONKEY WORKSPACE W700 USER GUIDE

Change my passwordPassword policy settings are determined by an administrator. Sometimes you may be required to change your password to comply with new corporate password policies. When a change is required, the Password Change screen will appear the next time your device connects to IronKey Enterprise Server (either when you unlock the device in the host environment or after you boot into the secure Workspace environment).

It is also good security practice to regularly change your password. However, be especially careful to remember your device password. You can change your password in the host environment using the IronKey Control Panel on the device or in the Control Panel in the secure Workspace environment.

1. From the Control Panel, click the “Settings” button in the menu bar.

2. Click the “Password” button in the left sidebar.

3. Enter your current password in the field provided.

4. Enter your new password and confirm it in the fields provided.

5. Click the “Change Password” button.

Update my device In the host environment, you can securely update software and firmware on your device through signed updates that are verified in hardware. Keeping your device up-to-date helps protect you from future malware and online threats.

If you are in the secure Workspace, you will be notified that your device has updates available, however, you can only update the device from the host environment.

1. In the host environment, unlock your device and click the “Settings” button on the menu bar of the IronKey Control Panel.

2. Click the “Tools” sidebar and in the Updates section, click the “Check for Updates” button.

3. If an update is available, click “Download” to install it.

TIP: In the host environment, you can check for updates automatically by clicking the “Automatically check for updates” checkbox. The device will check for updates every 7 days. If your administrator has already set this option, the check box will appear enabled and dimmed.

Find information about my device 1. In the Control Panel, click the “Settings” button in the menu bar.

2. Click the “Device Info” button in the left sidebar.

Page 15: IronKey Workspace W700 User Guide - Kingston Technology › support › ironkey › WS42 › v41 › IronKey_… · IRONKEY WORKSPACE W700 USER GUIDE PAGE 7 1. IronKey Control Panel

PAGE 14IRONKEY WORKSPACE W700 USER GUIDE

On this screen you can view details about your device, including: • Model number• Serial number• Software and firmware versions

TIP: You can also click the “Copy” button to copy the device information to the clipboard for pasting in an e-mail, forum posting or support request.

Manage my online account settingsNOTE: You may not have an online account if your System Administrator has not enabled this feature. An online account is required for Admin users. Online accounts are typically created during device setup.

Your device supports advanced cryptographic authentication using strong PKI key pairs generated in the Cryptochip. When you log into your online account from your device, it uses these unique keys as your digital identity credentials. This locks down your account so that you must have both your device and your password in order to gain access.

To log on to your online account1. In the host environment, Unlock your device and click the “Settings” button on the menu bar

of the Control Panel.

2. Click the “Account” button in the left sidebar.

3. Click the “Manage Account Settings” button. The Admin Console displays.

CHANGE DEVICE NICKNAMEIf you own more than one IronKey Workspace W700 device, you can create nicknames for each device. Names help you tell the devices apart from each other.

1. Log on to your online account.

2. On the “My IronKeys” tab, click the “Edit” button beside the device whose nickname you want to change.

3. Type a new nickname in the box and click the “Save” button.

MANAGE ACCOUNT SETTINGS The following table describes some tasks you can perform when you log on to your online account.

• Access your online account and then follow the steps in the table below.

Task DescriptionReview account activity Click “Account Dashboard” to monitor recent events such as logins, failed

password attempts and so on.

Page 16: IronKey Workspace W700 User Guide - Kingston Technology › support › ironkey › WS42 › v41 › IronKey_… · IRONKEY WORKSPACE W700 USER GUIDE PAGE 7 1. IronKey Control Panel

PAGE 15IRONKEY WORKSPACE W700 USER GUIDE

Set up email alerts Click “Account Alerts” to have e-mail alert notices sent to you when specific activities occur, such as an incorrect secret question attempt. You can also sign up to be notified of new Ironkey product announcements.

Edit Secret Questions and Answers

Click the “Edit” button to modify your Secret Question responses that you provided during the setup of your online account. You can also edit time zone data.

NOTE: You cannot update e-mail addresses in your online profile unless you are a System Administrator.

Page 17: IronKey Workspace W700 User Guide - Kingston Technology › support › ironkey › WS42 › v41 › IronKey_… · IRONKEY WORKSPACE W700 USER GUIDE PAGE 7 1. IronKey Control Panel

PAGE 16IRONKEY WORKSPACE W700 USER GUIDE

Where can I get Help? For more information

forum.ironkey.com Online forum with thousands of users and security expertssupport.ironkey.com Support information, knowledgebase and video [email protected] Product feedback and feature requestshttps://www.ironkey.com General information

To contact support For support, please contact your Help desk or System Administrator.

http://support.ironkey.com

[email protected]

910 E. Hamilton Ave. Suite 410

Campbell, CA 95008 UNITED STATES

Monday - Friday, 6am - 5pm PST

NOTE: Imation is not liable for technical or editorial errors and/or omissions contained herein; nor for incidental or consequential damages resulting from the furnishing or use of this material. The information provided herein is subject to change without notice.

The information contained in this document represents the current view of Imation on the issue discussed as of the date of publication. Imation cannot guarantee the accuracy of any information presented after the date of publication. This document is for information purposes only. Imation makes no warranties, expressed or implied, in this document. Imation, the Imation logo, IronKey and the IronKey logo are trademarks of Imation Corp. and its subsidiaries. All other trademarks are the property of their respective owners.

© 2013 Imation Corp. All rights reserved.