User Guide. IronKey Workspace Models: W700 Updated: September 2013 IRONKEY WORKSPACE W700 USER GUIDE

Similar documents
IRONKEY WORKSPACE PROVISIONING TOOL 1.3. User Guide

Sentry ONE User Guide

DATALOCKER H100 ENCRYPTED HARD DRIVE. User Guide

IRONKEY D300S SECURE USB 3.0 FLASH DRIVE

IronKey EMS Cloud. Quick Start Guide

IRONKEY H80 USER GUIDE

Kanguru Defender V2 Rev.2 User Manual

Kanguru Defender Secure USB Flash Drive

RocIT Defender User s Guide ViSoS TM Virtual System on a Stick

Aegis Padlock DT. User s Manual

This release of the hardware encrypted IronKey Workspace W500 Microsoft Certified Windows to Go drive, adds the following functionality:

DEFENDER F100 & DEFENDER F150 USER GUIDE

Quick Start Guide. IronKey Enterprise Server 5.2

Kanguru Defender Elite200 User Manual. Copyright 2014, All Rights Reserved. Model no: KDFE200

Kanguru Defender HDD & Defender HDD300 User Manual. Copyright 2017, All Rights Reserved. Model no: KDH3B, KDH3B-300F

User Guide. SimpleSafe. Flash Drive Security Software. For SimpleTech flash drives: Bonzai Xpress (STI-UFDBXA/XXX) SimpleTech USB 2.

BitLocker to Go: Encryption for personal USB

Storage Security Software (Version )

Sophos Central Device Encryption. Administrator Guide

Aegis Padlock SSD. User Guide. Remember to save your PIN in a safe place. If lost or forgotten, there is no way to access the drive.

Creating Trust in a Highly Mobile World

IronKey EMS On-Prem 7.1 Quick Start Guide

IronKey EMS Quick Start Guide. version 7.2 DataLocker Inc. June, 2018

User Manual SSD SSD SSD. istorage diskashur SSD Manual v

THUNDERBAY 4 MINI. Assembly Manual & User Guide

ModeChanger

Copyright istorage, Inc All rights reserved.

Kanguru Defender Secure USB Flash Drive

SOFTRAID. Quick Start Guide

User Manual FIPS SSD. Remember to save your PIN in a safe place. If lost or forgotten, there is no way to access the drive.

Check Point GO R75. User Guide. 14 November Classification: [Public]

SafeStick/SafeXs. User Guide. Created by BSO ITS Security Team Version 1.4

Dell Data Security Console. User Guide v2.0

Stealth HD Bio Quick Start Guide

IMPORTANT! Files saved to this USB are NOT automatically encrypted. You must use the SecureLock II software interface to secure your files.

KEYPAD MODEL USER MANUAL

DRIVE DOCK. User Guide

DataTraveler 4000 User Manual

User Manual 3.0. Remember to save your PIN in a safe place. If lost or forgotten, there is no way to access the datashur Pro.

User Guide CipherUSB

Aegis Fortress L3. Remember to save your PIN in a safe place. If lost or forgotten, there is no way to access the drive.

Peerless Drive System User's Manual

Deposit Wizard Panini Installation Guide

IT Essentials v6.0 Windows 10 Software Labs

ALTIRIS SECURITY SOLUTION 6.1 FOR HANDHELDS ADMINISTRATOR GUIDE

OWC Mercury On-The-Go Pro USER GUIDE

DRIVE DOCK. User Guide

Expert Reference Series of White Papers. BitLocker: Is It Really Secure? COURSES.

USB Server User Manual. USB Server Manual (DN-13010)

Veeam Endpoint Backup

Table of Contents. Table of Figures. 2 Wave Systems Corp. Client User Guide

Protecting your data with Windows 10 BitLocker

SOFTRAID FOR THUNDERBAY. Quick Start Guide

ImageMate 12-in-1 Reader/Writer User Guide

Fiery proserver User Guide

Dedicated Security Software for USB Flash Drive

DRIVE DOCK. User Guide

Metalogix Essentials for Office Creating a Backup

TOSHIBA USB Flash Memory U363 / U364

Hiddn SafeDisk. Installation Manual. Version April //

Document # Rev. C 4/10 Cencon 4 Getting Started Guide

U-Storage User s Manual. Version 2.3

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

EZ Drive USB Flash Disk

SafeNet Authentication Manager

SECUDRIVE USB Office

THUNDERBAY 4. Assembly Manual & User Guide

Dell Data Security Console. User Guide v10.0

FUSION F2. User s Guide. Portable 2-Drive RAID SATA Storage System. For Windows

vívohub 2 Installation Instructions Getting Started When using the device for the first time, you must complete these tasks to set up the device.

Deposit Wizard TellerScan Installation Guide

Integral Memory PLC. Crypto Dual (Underlying Steel Chassis) and Crypto Dual Plus (Underlying Steel Chassis) FIPS Security Policy

THUNDERBAY 4. Assembly Manual & User Guide

TABLE OF CONTENTS INTRODUCTION...1 DEVICE SETUP...4 SUPPORT RESOURCES...9

Fiery proserver User Guide

Quick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping.

Encrypted Solutions. Your essential guide to encrypted data storage

BIOS. Chapter The McGraw-Hill Companies, Inc. All rights reserved. Mike Meyers CompTIA A+ Guide to Managing and Troubleshooting PCs

User SSD Manual SSD. Remember to save your PIN in a safe place. If lost or forgotten, there is no way to access the datashur SSD.

Integrating RDX QuikStor into NetJapan ActiveImage Protector

Aegis Secure Key 3.0. User s Manual. Data Security at Your Fingertips

Integrate Sophos Enterprise Console. EventTracker v8.x and above

SafeGuard Easy Demo guide. Product version: 6 Document date: February 2012

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

SecureAPlus User Guide. Version 3.4

BlackBerry Wireless Handheld Getting Started Guide

Ceedo Client Family Products Security

LockState RL 4000 User Guide

SafeGuard Easy Demo guide. Product version: 6.1

THUNDERBAY 4. Assembly Manual & User Guide

Pocket Rocket FLE. File Level Encryption. User Guide. Model: Addonics Pocket Rocket

PGP NetShare Quick Start Guide Version 10.2

60 GHz Wireless Dock Basic Model

PKI Credentialing Handbook

PTZOptics IP Joystick Controller

MITEL. Mobile Extension. Mobile Client Handset User Guide Release 1.7

ZENworks 2017 Full Disk Encryption Pre-Boot Authentication Reference. December 2016

VMware Horizon FLEX Client User Guide. 26 SEP 2017 Horizon FLEX 1.12

SafeNet MobilePKI for BlackBerry V1.2. Administration Guide

ipassconnect for Symbian User s Guide

Transcription:

User Guide IronKey Workspace Models: W700 Updated: September 2013 PAGE 1

Thank you for your interest in IronKey Workspace W700 by Imation. Imation s Mobile Security Group is committed to creating and developing the best security technologies and making them simple-to-use and widely available. Years of research and millions of dollars of development have gone into bringing this technology to you. We are very open to user feedback and would appreciate hearing about your comments, suggestions, and experiences with this product. Feedback: securityfeedback@imation.com User Forum: https://forum.ironkey.com PAGE 1

CONTENTS About my device....3 IronKey Workspace W700...3 How is it different than a regular flash drive?...3 What systems can I use it on?...4 Device Security....5 Product specifications....5 Recommended best practices...6 About IronKey Control Panel....6 Start the Control Panel....7 How do I...?...8 Set up the host computer....8 Set the host computer to boot from USB...8 Set up the device....8 Activate a managed device....9 Start the secure Workspace for the first time....10 Access the secure Workspace...10 Boot from the device to access the secure Workspace...10 Unlock and lock the device...11 Unlock device...11 Lock device....11 Unplug the device...12 Access my device if I forget my password...12 Change my password...13 Update my device...13 Find information about my device....13 Manage my online account settings...14 Change device nickname...14 Manage account settings...14 Where can I get Help?...16 For more information....16 To contact support...16 PAGE 2

About my device IronKey Workspace W700 IIronKey Workspace W700 is a trusted, secure USB flash drive. The Microsoft-certified Windows To Go device, IronKey Workspace W700, allows you to use virtually any computer as your own secure personal workspace, capable of using all host system resources. Your IronKey Workspace W700 device contains a fully functional version of Windows 8. If your device is managed by IronKey Enterprise Server, you will receive update notifications and policy changes for the device when the device connects to the server. The IronKey Control Panel application lets your device communicate with the IronKey Enterprise Server. This guide refers to two different device environments: Host environment Also called the non-boot environment. Describes the scenario when you are using the operating system of the host computer and the device is just a USB device and is not booted into Windows To Go. Secure Workspace Describes when you boot the Windows To Go operating system on the device. How is it different than a regular flash drive? Hardware Encryption Inside your device is the IronKey Cryptochip, which protects your data to the same level as highly classified government information. This security technology is always on and cannot be disabled. Password-Protected Unlock the device with a password using the Unlocker software that is carried on the device. Do not share your password with anyone. That way, even if your device is lost or stolen, no one else can access your data. Self-Destruct Sequence If the Cryptochip detects physical tampering by a hacker, or if a specified number of consecutive incorrect password attempts have been entered, it initiates a permanent self-destruct sequence that securely erases all onboard data using flash-trash technology so remember your password. PAGE 3

Simple Device Management Your device includes the IronKey Control Panel, a central management area for editing your preferences, changing your device password and safely locking your device. For more information about the IronKey Control Panel, see About IronKey Control Panel on page 6. Waterproof and Tamper-Resistant Designed to survive the extremes, IronKey Workspace W700 has a rugged metal encasing that is injected with an epoxy compound that makes it not only tamper-resistant, but waterproof to military specifications (MIL-STD-810F). What systems can I use it on? Windows 8 Windows 7 PCs that are certified for use with Windows 7 or Windows 8 can be configured to boot directly from USB, check with the hardware manufacturer if you are unsure of the ability of your PC to boot from USB. NOTE: The computer must have a USB 3.0 or 2.0 port for high-speed data transfer. A USB 1.1 port or powered hub will also work, but will be slower. Each computer must be configured to allow you to boot an operating system from a USB device. For more information, see Set up the host computer on page 8. How secure is it? IronKey Workspace W700 has been designed from the ground up with security in mind. A combination of advanced security technologies are used to ensure that only you can access your data. Additionally, it is a physically secure device, to prevent hardware-level attacks and tampering, as well as to make the device rugged and long-lasting. The IronKey Cryptochip is hardened against physical attacks such as power attacks and bus sniffing. It is physically impossible to tamper with its protected data or reset the password counter. If the Cryptochip detects a physical attack from a hacker, it destroys the encryption keys, making the stored encrypted files inaccessible. We strive to be very open about the security architecture and technology that we use in designing and building this product. We use established cryptographic algorithms, we develop threat models, and we perform security analyses (internal and third party) of our systems all the way through design, development and deployment. PAGE 4

DEVICE SECURITY Data Encryption Keys AES key generated by onboard Random Number Generator AES key generated at initialization time and encrypted with hash of user password No backdoors: AES key cannot be decrypted without the user password AES key never leaves the hardware and is not stored in NAND flash Data Protection Windows To Go partition is not accessible until password is verified in hardware Password try-counter implemented in tamper-resistant hardware Once password try-count is exceeded, all data is erased by hardware Secure box architecture accessible only to firmware to store sensitive data and settings Device Password Protection USB command channel encryption to protect device communications Password-in-memory protection to protect against cold-boot and other attacks The device password is hashed using salted SHA-256 before being transmitted to the device firmware over a secure and unique USB channel. It is stored in an extremely inaccessible location in the protected Cryptochip hardware. The hashed password is validated in hardware (there is no getpassword function that can retrieve the hashed password), and only after the password is validated is the AES encryption key decrypted. The password try-counter is also implemented in hardware to prevent memory rewind attacks. Typing your password incorrectly too many times initiates a permanent flash-trash self-destruct sequence, which is run in hardware rather than using software, ensuring the ultimate protection for your data. Product specifications For details about your device, see Device Info in the IronKey Control Panel settings. Specification Capacity* Dimensions Weight Operating Temperature Operating Shock Hardware Encryption Details Up to 32GB, 64GB, 128GB 82mm X 21.1mm X 9.1mm 1.12 oz (32 grams) 0C, 70C 16G rms Data: 256-bit AES (CBC mode) Hardware: 256-bit AES Hashing: 256-bit SHA PAGE 5

Specification Details Hardware USB 3.0 (Super speed) port recommended, USB 2.0 (High-Speed), USB 1.1 Water-resistant MIL-STD-810F Dust-resistant Shock-resistant Ruggedized OS Compatibility Windows 8, Windows 7 (any PC certified for use with Windows 7 or Windows 8) Accessibility IronKey Control Panel is designed to be Section 508 compliant. Users with disabilities have keyboard navigation and screen reader support. Designed and Assembled in the U.S.A. * Advertised capacity is approximate. Some space is required for Windows To Go software. Recommended best practices Never unplug the device when the LED is on Never share your device password»» Perform a computer anti-virus scan before setting up the device In the host environment: Lock the device: when not in use before unplugging it before the system enters sleep mode In the secure Workspace (Windows To Go): Do NOT unplug the device while you are booted into WTG as it can result in loss of data. or possibly cause irreparable damage to the operating system. If your WTG operating system is in Hibernate mode, do not unplug the device and move it to another computer. Hibernate mode does not support roaming between computers and could corrupt your device. About IronKey Control Panel IronKey Control Panel connects a managed device to the IronKey Enterprise Server. It also allows you to modify device settings, for example, you can change your password. There are two IronKey Control Panel applications on your device. Some IronKey Control Panel operations are only available in one of the device environments. PAGE 6

1. IronKey Control Panel on the USB drive (in the host environment) This application is accessible only from the USB drive. Connects to the server to receive and allow you to download device updates and policy changes. Allows you to unlock and lock your USB device in the host environment. Opens automatically after you Activate the device. 2. IronKey Control Panel on your Windows To Go operating system (in the secure Workspace environment) This application opens automatically and is accessible in the taskbar only when the device is booted in Windows To Go. Connects to the server to receive device update notifications and policy changes. You can download device software updates only in the Control Panel in the host environment. Does not have a lock device option. You can use the Control Panel in either environment to do the following: Change device password View device information Modify Unlock Message that displays when you unlock the device View notifications about device software updates Access the Admin Console (if you are an Admin user) START THE CONTROL PANEL In the host environment 1. Double-click the IronKey.exe file from the IronKey Workspace drive on the device. 2. Type your device password and click Unlock. The IronKey Control Panel will open automatically. In the secure Workspace The Control Panel starts automatically when you boot into your Windows To Go secure Workspace. You can access it from the Windows taskbar. Click the IronKey icon in the taskbar and choose IronKey Control Panel. PAGE 7

How do I...? Set up the host computer Before you plug in your device, you must make sure that the host computer is able to boot from a USB device. You should check the boot setting for each computer on which you want to use your device. The host computer must use either a Windows 7 or Windows 8 operating system (or be certified for use with Windows 7 or Windows 8). Once the computer is configured to boot from a USB device, you can plug in your IronKey Workspace W700 device. If this is the first time booting the device into the secure Workspace, you may have to set up some Windows installation settings. NOTE: If your administrator has already configured the boot setting for the host computer, you can skip this step and set up the device. SET THE HOST COMPUTER TO BOOT FROM USB 1. Shut down the host computer if it is not already turned off. 2. Turn on the computer and enter the BIOS/UEFI. This is a very fast step. You have only a few seconds to press the correct key to access the BIOS/UEFI. An on-screen message will indicate the key sequence, for example, Press the Esc key, or Press F1 to enter setup. 3. Configure the system to boot from USB by turning on USB BOOT and moving the setting USB MassStorage to the first position in the boot order. 4. Save the new BIOS/UEFI settings and shut down the computer. 5. You can now plug in your device and follow the steps in the section Set up the device on page 8. Set up the device Before you can access your Windows To Go Workspace, you must activate the device. During the activation process, the device policy from IronKey Enterprise Server is applied to the device. Device activation is done in the host environment before you boot into the secure Workspace. You will need the activation code that was sent to you in an e-mail message from an administrator. During the activation procedure, you will have to set a device password. After you activate the device, you can start up the secure Workspace on the device. PAGE 8

The first time you start the Windows To Go operating system on the device, you might be required to complete some Windows installation settings. Some administrators may configure these settings before they give you the device. NOTE: If your device is not managed by IronKey Enterprise Server, you do not need to activate it. Follow the steps to start the secure Workspace. You will be asked for a device password. This is the password your administrator gave to you. You should change the password from the default one, see Change my password on page 13. ACTIVATE A MANAGED DEVICE 1. In the host environment, plug the IronKey device into the host computer s USB port. 2. Double-click the IronKey.exe file from the IronKey Workspace drive. 3. Type the Activation Code. You should have received the code in an e-mail message sent from your Administrator. 4. Type a device password and confirm it, and then click the Continue button. Your password is case-sensitive and must comply with the password policy set by the administrator. 5. If you are prompted to provide an e-mail address for an online account, enter it now and click the Continue button. (Online accounts are required for admin users). A message prompt will appear indicating that an e-mail has been sent to you. Follow the instructions in the e-mail to set up your online account; this includes creating a secret question. Once you have set up your online account, click OK in the message prompt to proceed with the device setup. 6. The device initializes. During this process, it applies the policy for the device as configured in IronKey Enterprise Server. 7. When the initialization is complete, the IronKey Control Panel appears. PAGE 9

If you want to add or modify the message that displays on the Unlocker screen, see Create a message that displays in the Unlocker on page 11. 8. Safely eject the device and unplug it, then power off the host computer. The device is now ready to boot into the secure Workspace. START THE SECURE WORKSPACE FOR THE FIRST TIME 1. Ensure that the host computer is powered off, and then insert the W700 device into the USB port. 2. Turn on the computer and wait for the IronKey Workspace Preboot Environment to start. 3. Type the device password (if the device is not managed by IronKey Enterprise Server, your administrator will give this to you, otherwise, type the password that you set when you activated the device) and click Unlock. 4. The computer will reboot into the secure Windows To Go workspace. 5. Follow the on-screen instructions to configure settings for the Windows installation on the device. This is only required the first time you boot into the secure Workspace. NOTE: When you start the secure portable Workspace on different computers, Windows To Go will adapt to the hardware of the local system to use its unique set of hardware components. This hardware adaptation process will not be performed with each subsequent startup on the same computer. The device stores information for each system from which it has been booted. It applies the hardware profile for that system as the computer boots. Access the secure Workspace After you set up the device you are ready to use it as your secure portable Workspace. Each time you boot from the device, you must provide the device password to unlock the operating system so Windows To Go can start. The steps are almost identical to starting the secure Workspace for the first time except that you do not have to customize the Windows Installation. BOOT FROM THE DEVICE TO ACCESS THE SECURE WORKSPACE 1. Ensure that the host computer is powered off, and then insert the W700 device into the USB port. 2. Turn on the computer and wait for the IronKey Workspace Preboot Environment to start. 3. Type the device password and click the Unlock button. 4. The computer will reboot into the secure Windows To Go workspace. PAGE 10

Unlock and lock the device When you unlock the device in the host environment, the IronKey Control Panel starts from the USB device. You should always lock the device before you unplug it from the host environment. When you boot the device in Windows To Go, you unlock the device during the Preboot Environment. You cannot lock the device from the Control Panel in Windows To Go. UNLOCK DEVICE 1. In the host environment, plug in your device to the host computer and start the Unlocker window by opening the IronKey Workspace device drive and double-clicking the IronKey.exe file. 2. Type your device password and click Unlock. The IronKey Control Panel will appear. Entering the wrong password a consecutive number of times depends on the password settings defined by the administrator will permanently destroy the device and all your onboard data. As a security precaution, you must unplug and reinsert the device after every three failed password attempts. TIP: If you want to boot into the secure Workspace, see Access the secure Workspace on page 10. Create a message that displays in the Unlocker This feature, if enabled by the System Admin, allows you to create a message that appears on the IronKey Unlocker window. For example, you can provide contact information so that if you lose your device someone will know how to return it to you. 1. In the host environment, unlock your device and click the Settings button in the menu bar of the Control Panel. 2. Click the Preferences button in the left sidebar. 3. Enter text in the Unlock Message field. Your message text must fit the space provided (approximately 7 lines and 200 characters). LOCK DEVICE In the host environment, click the Lock button in the bottom left of the Control Panel to safely lock your device. You can also use the keyboard shortcut: CTRL + L. If you want the device to automatically lock when not in use, see Set device to automatically lock on page 12. CAUTION: Once the device is locked, you can perform a safe removal operation to safely unplug it. However, do not unplug the device when it is unlocked. PAGE 11

NOTE: You cannot lock a device from the Control Panel in the secure Workspace. You must shut down the Windows operating system to safely remove the device. For more information, see Unplug the device on page 12. Set device to automatically lock If enabled by your System Admin, you can set a device time-out to automatically lock your device after a specified period of inactivity. This will help prevent others from accessing your secure files. This is only available in the host environment and not while you are booted into the secure Workspace. 1. In the host environment, access the IronKey Control Panel on your device from the USB drive of the host computer. 2. Click the Settings button in the menu bar. 3. Click the Preferences button in the left sidebar. 4. Click the checkbox for auto-locking the device and set the time-out for either 5, 15, 30, 60, 120, or 180 minutes. Unplug the device In host environment Lock the device and perform a safe removal operation of the USB drive then unplug the device. In the secure Workspace After you are finished using your secure Workspace, you must properly shut down the operating system on the device before you unplug it. Follow the procedure in the Windows documentation to shut down the Windows To Go operating system. IMPORTANT: DO NOT unplug the device without first shutting down Windows To Go; this can result in loss of data and potentially cause irreparable damage to the operating system. Access my device if I forget my password If you forget your password, you must contact your administrator. Your administrator can reset your password and you can then follow the steps in the Change my password procedure to set it again. PAGE 12

Change my password Password policy settings are determined by an administrator. Sometimes you may be required to change your password to comply with new corporate password policies. When a change is required, the Password Change screen will appear the next time your device connects to IronKey Enterprise Server (either when you unlock the device in the host environment or after you boot into the secure Workspace environment). It is also good security practice to regularly change your password. However, be especially careful to remember your device password. You can change your password in the host environment using the IronKey Control Panel on the device or in the Control Panel in the secure Workspace environment. 1. From the Control Panel, click the Settings button in the menu bar. 2. Click the Password button in the left sidebar. 3. Enter your current password in the field provided. 4. Enter your new password and confirm it in the fields provided. 5. Click the Change Password button. Update my device In the host environment, you can securely update software and firmware on your device through signed updates that are verified in hardware. Keeping your device up-to-date helps protect you from future malware and online threats. If you are in the secure Workspace, you will be notified that your device has updates available, however, you can only update the device from the host environment. 1. In the host environment, unlock your device and click the Settings button on the menu bar of the IronKey Control Panel. 2. Click the Tools sidebar and in the Updates section, click the Check for Updates button. 3. If an update is available, click Download to install it. TIP: In the host environment, you can check for updates automatically by clicking the Automatically check for updates checkbox. The device will check for updates every 7 days. If your administrator has already set this option, the check box will appear enabled and dimmed. Find information about my device 1. In the Control Panel, click the Settings button in the menu bar. 2. Click the Device Info button in the left sidebar. PAGE 13

On this screen you can view details about your device, including: Model number Serial number Software and firmware versions TIP: You can also click the Copy button to copy the device information to the clipboard for pasting in an e-mail, forum posting or support request. Manage my online account settings NOTE: You may not have an online account if your System Administrator has not enabled this feature. An online account is required for Admin users. Online accounts are typically created during device setup. Your device supports advanced cryptographic authentication using strong PKI key pairs generated in the Cryptochip. When you log into your online account from your device, it uses these unique keys as your digital identity credentials. This locks down your account so that you must have both your device and your password in order to gain access. To log on to your online account 1. In the host environment, Unlock your device and click the Settings button on the menu bar of the Control Panel. 2. Click the Account button in the left sidebar. 3. Click the Manage Account Settings button. The Admin Console displays. CHANGE DEVICE NICKNAME If you own more than one IronKey Workspace W700 device, you can create nicknames for each device. Names help you tell the devices apart from each other. 1. Log on to your online account. 2. On the My IronKeys tab, click the Edit button beside the device whose nickname you want to change. 3. Type a new nickname in the box and click the Save button. MANAGE ACCOUNT SETTINGS The following table describes some tasks you can perform when you log on to your online account. Access your online account and then follow the steps in the table below. Task Review account activity Description Click Account Dashboard to monitor recent events such as logins, failed password attempts and so on. PAGE 14

Set up email alerts Edit Secret Questions and Answers Click Account Alerts to have e-mail alert notices sent to you when specific activities occur, such as an incorrect secret question attempt. You can also sign up to be notified of new Ironkey product announcements. Click the Edit button to modify your Secret Question responses that you provided during the setup of your online account. You can also edit time zone data. NOTE: You cannot update e-mail addresses in your online profile unless you are a System Administrator. PAGE 15

Where can I get Help? For more information forum.ironkey.com support.ironkey.com securityfeedback@imation.com https://www.ironkey.com Online forum with thousands of users and security experts Support information, knowledgebase and video tutorials Product feedback and feature requests General information To contact support For support, please contact your Help desk or System Administrator. http://support.ironkey.com securityts@imation.com 910 E. Hamilton Ave. Suite 410 Campbell, CA 95008 UNITED STATES Monday - Friday, 6am - 5pm PST NOTE: Imation is not liable for technical or editorial errors and/or omissions contained herein; nor for incidental or consequential damages resulting from the furnishing or use of this material. The information provided herein is subject to change without notice. The information contained in this document represents the current view of Imation on the issue discussed as of the date of publication. Imation cannot guarantee the accuracy of any information presented after the date of publication. This document is for information purposes only. Imation makes no warranties, expressed or implied, in this document. Imation, the Imation logo, IronKey and the IronKey logo are trademarks of Imation Corp. and its subsidiaries. All other trademarks are the property of their respective owners. 2013 Imation Corp. All rights reserved. PAGE 16