User guide

PAGE 16IRONKEY USER GUIDE
Step Description
1 Creating, editing, deleting secure
les
When you click “Secure Files” in the IronKey Control
Panel, the default browser on your computer opens
directly to your secure volume.
All les on your IronKey are strongly encrypted with
military-grade AES encryption. Encrypting les is
as simple as moving them into the secure volume.
Dragging les onto your desktop decrypts them
on-the-y in hardware. The IronKey gives you the
convenience of working as you normally would with a
regular ash drive, while providing strong and “always-
on” security.
3. Permissions
You must have permissions to mount external/usb/ash devices
» You must have permissions to run executables off the IronKey CD-ROM in order to
launch the IronKey Unlocker
» You might need root user permissions
4. Supported distributions
Not all distributions of Linux are supported. Please visit https://support.ironkey.com/linux for the
latest list of supported distributions.
5. The IronKey Unlocker for Linux only supports x86 systems at this time.
See https://support.ironkey.com/linux for more information.
USING THE IRONKEY CONTROL PANEL (WINDOWS AND MAC)
The IronKey Control Panel is a central
location for:
» Launching secure applications
» Securely logging into my.ironkey.com
» Conguring your IronKey settings
» Updating your device
» Changing your IronKey password
» Safely locking your device
» Getting online help
Most of the Control Panel’s options
are located in the “Settings” menu.
NOTE: The Windows version of the
IronKey Control Panel is shown.