User guide
PAGE 16IRONKEY USER GUIDE
Step Description
1 Creating, editing, deleting secure
les
When you click “Secure Files” in the IronKey Control
Panel, the default browser on your computer opens
directly to your secure volume.
All les on your IronKey are strongly encrypted with
military-grade AES encryption. Encrypting les is
as simple as moving them into the secure volume.
Dragging les onto your desktop decrypts them
on-the-y in hardware. The IronKey gives you the
convenience of working as you normally would with a
regular ash drive, while providing strong and “always-
on” security.
3. Permissions
You must have permissions to mount external/usb/ash devices
» You must have permissions to run executables off the IronKey CD-ROM in order to
launch the IronKey Unlocker
» You might need root user permissions
4. Supported distributions
Not all distributions of Linux are supported. Please visit https://support.ironkey.com/linux for the
latest list of supported distributions.
5. The IronKey Unlocker for Linux only supports x86 systems at this time.
See https://support.ironkey.com/linux for more information.
USING THE IRONKEY CONTROL PANEL (WINDOWS AND MAC)
The IronKey Control Panel is a central
location for:
» Launching secure applications
» Securely logging into my.ironkey.com
» Conguring your IronKey settings
» Updating your device
» Changing your IronKey password
» Safely locking your device
» Getting online help
Most of the Control Panel’s options
are located in the “Settings” menu.
NOTE: The Windows version of the
IronKey Control Panel is shown.










