IronKey Enterprise Admin Guide
IronKey Enterprise Admin Guide
IronKey Enterprise Admin Guide
IronKey Enterprise
Management Service
IRONKEY ADMIN GUIDE PAGE 1
Thank you for choosing IronKey.
IronKey is committed to creating and developing
the best security technologies and making
them simple-to-use, affordable, and available
to everyone. Years of research and millions of
dollars of development have gone into bringing
this technology to you in the IronKey.
We are very open to user feedback and would
greatly appreciate hearing about your comments,
suggestions, and experiences with the IronKey.
Standard Feedback:
[email protected]
Anonymous Feedback:
https://www.ironkey.com/feedback
User Forum:
https://forum.ironkey.com
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Meet IronKey Enterprise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
IronKey Enterprise Administrative Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Enterprise Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Technical Support for System Administrators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Product Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Contact Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
IronKey Enterprise consists of three interrelated elements that provide overall USB flash drive
security and device management:
This guide informs you about how to get the most out of IronKey Enterprise, as well as best
practices for deploying and managing IronKey devices in your enterprise environment.
When employees leave the organization, their IronKey devices can be safely recommissioned
to new users. This process requires Admin authentication and authorization using IronKey
Enterprise’s secure online services.
IMPORTANT: After this device has been initialized, it is very important that you activate a
second System Admin device, otherwise there is no way to manage your Enterprise account if
something happens to the 1st System Admin device.
NOTE: The process for activating the 2nd System Admin device and all addition Admin devices
is slightly different than the process used to activate the 1st System Admin device.
Enter user’s:
• Name (optional)
• Email (highly recommended)
Select:
• Role*
• Access Level Summary**
• Policy for the user’s device
• If Activation Code should be
emailed to user
4a Click on the “Save” button. The
user will then be added to the
Enterprise Account.
1b. Admin: If the user has an Enterprise account, add a device to the user and email them an
Activation Code
2. User: Insert and unlock the Basic device
3. User: In the IronKey Control Panel, go to “Settings: IronKey Enterprise
4. User: Click the “Start Activation” button
5. User: Enter the Activation code, click “Continue”
6. User:Verifies the organization and system administrator information, then clicks “Continue”
7. User: Enters their password to complete Enterprise Activation.
There are three basic ways of deploying IronKey devices to your organization. You can decide
which one is right for your organization based on your security, privacy, and IT considerations.
Step Description
Make sure to clear the checkbox that would send the
user an email with his Activation Code.
Add a user to the Enterprise
Account. Review the detailed IMPORTANT: Even if you do not want the user
1 emailed, we strongly recommend providing their email
instruction earlier in this
document for more information. address to avoid problems during activation and online
account setup.
Deployment Method 3
User Roles
There are six user roles, differentiated by the user’s privileges:
»» System Admin: Can manage all users and system settings, including adding
Admins, approving Admins, changing user roles, and deleting users.
Only System Admins »» Custom Admin: Has a assignable privileges, such as User or Policy management
can add Admin users,
»» Admin: Can manage Standard Users
delete users and
change user roles. »» Help Desk Admin: Can assist existing users with devices.
»» Auditor: Can view the Admin Console with read-only access
»» Standard User: A normal end user without administrative capabilities.
All Admins and Auditors will have online IronKey accounts, as this is needed to access
the web-based Admin Console.
GROUPS
By default, all users are created as members of a single group. Admins can manage users more
effectively by organizing users into different groups. Every user, including administrators, can be a
member of only one group.
Groups are created using a tree-based structure, where every group has a parent / higher
level group, and every group may have children / lower level groups. Every child group can have
its own children. This enables delegated administration by creating sets of users that can be
managed by specific admins.
Admins can manage Standard Users in their group and in any child Groups . Admins can also
manage any child Groups.
System Admins can manage any Standard User or Admin User regardless of which Group
System Admin belongs.
Device Properties
IronKey devices include the following properties that are visible in Admin Console:
»» Device Name, useful for inventorying the Case ID
»» Device Status, similar to user statuses
Users can have »» The Policy the device is using
more than one »» The hardware model number of the device
IronKey device
»» The capacity of the drive (in GB)
»» The version of software it is running
»» The serial number. For x200 devices and higher, this matches the barcode on the
outer case of the IronKey device. It also appears as the USB serial number visible to
host computer operating systems. For S100 devices, it displays the eight right most
digits of the Cryptochip inside the device.
Consistent, unique serial numbers for enhanced asset inventory management and
endpoint security control are in these locations:
»» Laser etched onto the device, including a barcode
»» Printed on the product packaging
»» On the “About IronKey” pane of the IronKey Control Panel
»» On the IronKey Admin Console, with the device’s model number
»» Integrated into the USB standard field name, so that it is available to Windows and
other operating systems for security white listing and inventory management by other
products
For large-scale deployments, you can export IronKey Admin Console information
including the serial number to a .CSV file for electronic transfer to another system.
»» Product identification numbers (PIDs) for S200 and D200 models are useful for
inventory management and security control (Basic: 0×0201; Personal: 0×0202;
Enterprise: 0×0203).
»» The policy to which this device is adhering
»» The date on which this device was activated
»» The date and user for when the device was created and last modified
Devices also include a comments section, in which you may write information as
needed. For example, you could enter information regarding your own inventory data,
the device’s case serial ID, or information regarding the use or purpose of this device.
ADMIN CONSOLE
The Admin Console is a web-based interface for overall administration of the IronKey
Enterprise Management Service (EMS).
Access: my.ironkey.com
Features:
»» Managing users, groups, & devices
»» Managing policies
»» Managing updates
»» Monitoring events
»» Enterprise Support materials
ADMIN TOOLS
The Admin Tools enable Admin management of IronKey Enterprise devices:
Events are shown in the Enterprise Dashboard of the Admin Console. Examples of some of the
logged events include:
»» When Secure Device Recovery is performed
»» When a device is recommissioned
»» When a policy is created or modified
»» When a user is added into the IronKey Enterprise Account
»» When a device is added to a user
»» When a user is deleted or a device is disabled
»» When a device has detonated using the Silver Bullet Service
»» When a user or device profile has been modified
»» When an Admin is approved
»» Login activities, such as when Admins log into the Admin Console
If the user is not connected to the Internet, the device will not be able to check for
authorization. In this case, it will abide by the maximum threshold of permitted Silver Bullet
attempts. This number, pre-defined in policy, may be 0 (Deny) through 200, meaning that the
device would allow up to 200 unlock attempts before disabling itself until it can connect to the
Internet and check for authorization.
Additionally:
• You can select which events to view in the map by clicking the + menu icon
on the right
• Hovering over an event will bring up details on the event
• Clicking an item in the table will center and zoom in on the event in the map,
displaying additional data on the event
• You can zoom on the map by clicking the +/- icons on the left or dragging the
zoom sidebar
• You can move the geographic areas being viewed by dragging the map with
your mouse
• Columns can be sorted by clicking the column title
• You can change the time period for events using the “View” dropdown menu
• You can download the list of events by clicking the “Download” icon
• You can change the number of items listed per page and which page you are
viewing
• If there are pending users in your Enterprise Account, a list of their
information and Activation Codes can be downloaded from using the
“Download List” button
Dashboard Charts
Details regarding the IronKey Charts on the Enterprise Dashboard:
»» IronKey Charts use the Adobe Flash Player. If Flash Player is not installed on your
computer, you will see text-based versions of the charts.
»» You can download the data in the chart by clicking the Download icon
»» Each chart is interactive. Moving your mouse over the chart will bring up contextual
data.
»» Right-click the chart to for additional options, including viewing a Full Screen version
of the chart and printing the chart.
»» Chart data can be updated approximately every five minutes.
ADMIN ACTIVITIES
This chart displays a timeline of important Admin
activities, including Secure Device Recovery,
Password Assistance, and Admin Approval. The
vertical axis is the frequency of events, while the
horizontal axis is the timeline.
DEVICE ACTIVITIES
This chart displays how long it has been since:
» A device’s password was last backed up
» The last recorded device activity
The vertical axis is the number of devices, while
the horizontal axis is the number of weeks since
the specific event has occurred for each device.
NOTE: To change the default time zone from GMT, click “Account Settings” in the left sidebar.
You can also change time and date formats.
Toggle between Group and List view by clicking the Group or List Icons.
View
»» User Management displays only “Current” users, which filters out those with an Account
Status is Disabled(Inactive) or Deleted. Filtering is not applied based on Device Status
»» To view Disabled and Deleted users, click on the User Options button and change
the “View” pulldown menu to “All Users”.
User Deletion
»» To Delete the user, click the “Delete User” button (available for System Admins only)
»» When a user is deleted all of their devices are disabled, however the devices can be
Recommissioned then activated by another user.
»» They system maintains all the Account & Device activity of Deleted users for audit purposes.
IMPORTANT: Deletion of a user is not reversible.
Click “Manage Devices” in the left sidebar to view the IronKey Device List.
NOTE: Disabled devices can only be re-enabled from the “Device Profile” page.
»» To find a device, enter a device name or serial number in the search box in the upper-right
of the header, and click the search button. Suggested matches appear as you type. You can
also click the options icon in the search box to include searching within comments fields or
for deleted devices.
NOTE:You can also manage devices from the “Groups” view.
»» Click a device to view the device’s profile page.
Every time an existing policy is modified, a new version of that policy is created (e.g. Policy 2.001,
Policy 2.002, Policy 2.003).
All devices will update to the most current version of the policy assigned to that device.
Checking for policy updates and downloading the latest policy happens automatically shortly
after the device is unlocked. Policy changes are then enforced the next time the device is
unlocked. Clicking the “Check for Updates” button in the IronKey Control Panel will check for
policy updates immediately.
For example, if the password requirements for the organization change, an Admin can update
the appropriate items in an IronKey policy. The policy status for the affected devices is now
in a pending state. The next time the affected devices are unlocked, they will check to see if
they have the latest policy. In this case they do not, so they will automatically download the
latest policy. The next time the device is unlocked, the new policy will be enforced. Since the
password policy has changed, the user will be forced to change his device password before being
able to access his files.
In the example below, the Default policy is assigned version number 1.000. The next policy
created is named Sales and its version number is 2.000. The policy named Testing, has been
updated once. Notice this version number is updated to 3.001.
»» The displayed list of policies can be changed between “Active Policies”, “Retired & Deleted
Policies”, and “All Policies” via the “View” dropdown menu.
»» Download the list of policies by clicking the “Download” button.
Edit Policy Page
Details regarding the Edit Policy page:
»» Some items are dependent on others. Review the IronKey Policies section below in this
document for more information.
»» Clicking the “Save Version” button will save the policy as a new version, if you have made
changes to it.
»» While in edit mode, clicking the “Save As New” button will save the policy as a new policy, if
you change the policy name.
»» While in edit mode, clicking the “Cancel” button will not save any changes to the policy
»» Editing the Policy Name will require the policy to be saved as a new policy
»» It is possible to delete a policy, if it is not being used by any Active devices. Deleting a Policy
cannot be undone, and deletes all Policy Versions. Deleted policies are still visible and can be
viewed, but its not possible to create a new Policy from a deleted Policy.
NOTE: Only a System Admin can delete a Policy.
Password Policy - Set the number of failed password entry attempts before the device self-
destructs. Configure password strength and syntax.
Silver Bullet Services - Remotely disable, enable, or destroy an IronKey. Also support
restricting unlocking to White Listed IP ranges.
Control Panel - Configure IronKey Control Panel behavior such as a custom Unlock Screen
Message and Automatic Device Locking.
Advanced - Enable online accounts for all users, configure automatic or manual device policy
updates.
GENERAL SETTINGS
• Edit Policy Name
The Policy Name can be edited. Doing so requires saving as a new policy and you will be unable
to save as a Version.
Password Policy
Policy Item Description
PASSWORD POLICY
• Set the number of failed
password entry attempts before
the device self-destructs
• Configure password syntax
options
ONBOARD SOFTWARE
Choose from the available
onboard software applications.
WARNING: Set this policy with caution as being too restrictive may prevent trusted users
from being able to access their data.
»» This feature depends on Silver Bullet being enabled
»» This feature does not apply to System Admins.
»» Default: Disabled
»» Examples of Valid Input (Internal IP Addresses should not be used):
•
To allow a specific IP address, just enter it in:
From: 192.168.0.1
• To allow a block of IP addresses, use the * character:
From: 192.168.0.*
• To allow a range of IP addresses, use both the From and To fields:
From: 192.168.0.1 To: 192.186.0.12
• To add additional IP addresses, click the “Add More” button.
• To delete an entry, click the “X” button next to that row.
IK CONTROL PANEL
• Unlock Screen Message -
Display a custom message on
the IronKey Unlock screen.
• Automatic Locking - If the
IronKey is idle a period of time.
MANAGING LICENSES
Click “Manage Policies” in the left sidebar. Below the IronKey Policy list, you can view your
IronKey Licenses list. Services must be enabled for the list to appear.
»» You can view a list of enabled services, number of available seats, and number of total seats
»» If you try to add a new user or device that exceeds the number of licensed seats, or if your
license has expired, a message prompts you to update or renew your license
UPDATE MANAGEMENT
Update Management enables a System Admin to approve which Device Update is available when a user checks
for updates from the IronKey Control Panel. All device Updates available to Enterprise customers are listed on
this page. As a convenience to admins, the release notes for each update are available inline.
Each IronKey device update may contain newer firmware and/or software run from an IronKey device’s CD-
ROM volume.
The default settings make the most recent device update available to all users, which maintains the traditional
behavior the IronKey update capability.
»» Different Device Update versions can be approved for Admins and Standard users, which allows
administrators to be updated first so they can be prepared to answer questions.
»» The Update Version approved for Admins must be greater than or equal to the version approved for
Standard Users.
It is possible to test the latest device update on a limited set of devices before generally approving it for all
Standard or Admin Users. Testing can be accomplished by assigning a policy as the Update Testing policy. Any
device using that policy, either Standard User or Admin User bypasses the approval list and is able to update to
the laster update.
NOTE: Recovering a device that is not from your Enterprise Account, not yet activated, or not
an IronKey Enterprise Secure Drive is not possible. If an error appears, check if this is the issue.
Step Description
Step Description
Step Description
The import process uses IronKey’s PKCS#11 interface and requires Mozilla Firefox.
NOTE: Space for only one additional private key exists in the IronKey Cryptochip, though
it will receive the benefits of the Cryptochip’s tamper proof hardware and self-destruct
mechanisms.
IronKey’s certificate is
4 available here. To add your ow
click the “Import” button.
NOTE: When deleting certificates, you must restart Firefox for the action to take effect.You cannot delete
the IronKey certificate that was pre-packaged with your device.
F:\IronKey-System-Files\Reports\IKMalwareScanner_Report.txt
Where “F” is the IronKey’s Secure Files volume (where the user stores his data). Malware Scanner Reports
are written in Apache Common Log format with tab-delimited data:
[ip address] [timestamp] [event] [status code] [data size or file count]
In the event of an infection, users are instructed to send the report to their administrator to diagnose and
resolve the issue. Here are some details on interpreting important events:
EVENT DESCRIPTION
Infection events include
»» The name of the malware
»» The type of malware (e.g. virus, trojan, etc.)
INFECTION »» The location the malware was found
»» The result of trying to repair or delete the infected file. Usually the
file will be repaired or deleted, though in rare cases the file cannot be
altered and is left on the device. The status in that case is “Unresolved”.
»» The Malware Scanner will attempt to update before each scan. The
most common failure is when the device cannot connect to the Internet.
UPDATE »» Some users may experience issues installing the update if they do not
have enough space available on their IronKey. It is recommended that
users allocate 135 MBs of space for the signature file database.
Add a User
Enter the following user information:”
»» Name
»» Email
»» Role
»» Policy
Activate the checkbox to notify the user via email and activate the appropriate Access
Level Checkbox.
Step Description
Plug a new IronKey Enterprise Your IronKey must be activated on a Windows (2000,
1 Secure Flash Drive into the XP, or Vista) or Mac computer. To use the full speed of
computer USB port. the IronKey, plug it into a USB 2.0 port.
The IronKey autoruns as a virtual CD-ROM.
Step Description
In the Admin Console, go to the
user profile page for the user
1 See “Using the Admin Console” for more information.
for whom you want to add an
additional device.
2 Click the “Add Device” button.
A new device with a pending
3 status is added. The Activation
Code for that device appears.
»» See the release notes at support.ironkey.com for known issues specific to a release..
DIMENSIONS
75mm X 19mm X 9mm
WEIGHT
0.8 oz
WATERPROOF
MIL-STD-810F
OPERATING TEMPERATURE
0C, 70C
OPERATING SHOCK
16G rms
ENCRYPTION
Hardware: 256-bit AES (Models S200, D200), 128-bit AES (Model S100)
Hashing: 256-bit SHA
PKI: 2048-bit RSA
FIPS CERTIFICATIONS
See www.ironkey.com for details.
HARDWARE
USB 2.0 (High-Speed) port recommended, USB 1.1
OS COMPATIBILITY
Windows 2000 (SP4), XP (SP2+), Vista, or Windows 7
IronKey Unlocker for Linux (2.6+, x86)
IronKey Unlocker for Mac (10.4+, Intel)
Note: IronKey is not liable for technical or editorial errors and/or omissions contained herein; nor for
incidental or consequential damages resulting from the furnishing or use of this material. The information
provided herein is subject to change without notice.
The information contained in this document represents the current view of IronKey on the issue discussed as of the date of publication. IronKey
cannot guarantee the accuracy of any information presented after the date of publication. This document is for information purposes only. IronKey
makes no warranties, expressed or implied, in this document. IronKey and the IronKey logo are trademarks of IronKey, Inc. in the United States and
other countries. All other trademarks are the properties of their respective owners. © 2010 IronKey, Inc. All rights reserved. IK0900196