MXI Security stealth key m200 Manuel utilisateur

Stealth™ Key M200
Quick Start Guide

Copyright ©2011 MXI Security. All rights reserved. This document may not be reproduced or transmitted in any form
(whether now known or hereinafter discovered or developed), in whole or in part, without the express prior written
consent of MXI Security.
Windows is a registered trademark of Microsoft Corporation in the United States and other countries.
All products and company names are trademarks or registered trademarks of their respective owners.
Stealth Key M200 Quick Start Guide
Document Number: MSW1027-M-QSG10-39
Date of Publication: March 17, 2011
Support: techsupport@mxisecurity.com or http://mxisecurity.com/support
Web site: http://www.mxisecurity.com
The following information applies to only EU-member states:
The equipment that you bought required the extraction and use of natural resources for its production. It
may contain hazardous substances that could impact human health and the environment. The crossed-
out wheeled bin symbol indicates that this product may not be treated as household waste. By disposing
of this product using the appropriate take-back systems, you will help prevent the spread of hazardous
substances to our environment and reduce the impact on natural resources. Those systems will reuse or
recycle most of the materials of your end-life equipment in a sound way. If you need more information on
the collection, reuse and recycling systems, please contact your local or regional waste administration. You can also
contact us for more information on the environmental performance of our products.

Stealth Key M200 Quick Start Guide 3
Contents
1: Introducing Stealth Key M200 ................................................................................. 4
Minimum System Requirements ........................................................................................................4
MXI Documentation .............................................................................................................................5
2: Getting Started .......................................................................................................... 6
Opening and closing a device ...........................................................................................................6
Attaching the lanyard loop .................................................................................................................6
Personalizing a device ........................................................................................................................8
3: Accessing data on the device ............................................................................... 10
Logging into and out of the device .................................................................................................10
Saving and opening files ..................................................................................................................11
Disconnecting the device .................................................................................................................11
4: Warranty Information ............................................................................................. 12
5: Troubleshooting ..................................................................................................... 13
Difficulty closing device cap ..........................................................................................................13

Stealth Key M200 Quick Start Guide 4
1Introducing Stealth Key M200
Stealth™ Key M200 is a USB (Universal Serial Bus) portable flash drive with built-in password
security and data encryption.
This guide is designed to help you set up your Stealth Key M200 device with minimal effort.
Figure 1-1: Stealth Key M200 device
Note Stealth Key M200 cannot be used with ACCESS Enterprise.
Minimum System Requirements
Stealth Key M200 comes with built-in ACCESS Standard™ software on its application partition.
The following list describes the requirements you need to use your device with ACCESS
Standard.
• A USB port (Type A)
• An operating system that supports USB 2.0 or 1.1 Mass Storage Devices
Operating systems
• Microsoft Windows 7 Pro
• Windows XP Professional SP3
• Windows XP Professional SP2
• Windows XP Home SP3
• Windows Vista (Home, Business and Enterprise editions SP2)
• Mac OS X 10.5 and 10.6

MXI Documentation
Stealth Key M200 Quick Start Guide 5
MXI Documentation
You can find detailed instructions about using and managing Stealth Key M200 in the ACCESS
Standard User Guide.
Topics include:
• Information about MXI Portable Security Devices
• Personalizing the device
• Accessing the device
• Managing users
• Managing devices
• Protecting the device from viruses
• Troubleshooting
Online Help is also available with ACCESS Standard software.
To view the ACCESS Standard User Guide
•From the root directory of the application partition, double-click the UserGuide.pdf file.
Note You need Adobe®Reader®(http://www.adobe.com/acrobat) to view the documentation.
To view online Help
•When ACCESS Standard is open, click Help on the page for which you want more
information.

Stealth Key M200 Quick Start Guide 6
2Getting Started
This product must be directly connected to the host computer, and must only be connected
using the provided cable or cables, as applicable. Connection through intermediate hardware or
with alternate cables may cause electrical emissions outside the product's original design and
certification.
Opening and closing a device
Stealth Key M200 devices have an integral case that opens by removing a large front cap.
To open the device
•Grasp the front and rear caps and pull apart.
To close the device
•Slide the device into the front cap and squeeze the caps together.
Attaching the lanyard loop
Stealth Key M200 comes with a lanyard loop that allows you to attach it to lanyards or other
objects.

Attaching the lanyard loop
Stealth Key M200 Quick Start Guide 7
To attach the lanyard loop (optional)
1Insert the small bullet end of the lanyard through the hole in the main part of the device.
2Grip both ends of the lanyard loop and bend the ends towards each other in a circle.
3Insert the small end into the larger barrel.
4Turn the larger barrel to thread the parts together.

Getting Started
Stealth Key M200 Quick Start Guide 8
5When the small bullet is completely inside the larger barrel, the loop is secure and ready for
use.
To remove the lanyard loop
1Turn the barrel (counter-clockwise) to loosen the small bullet.
2When the small bullet is completely separated from the larger barrel, pull the lanyard loop
apart.
Personalizing a device
When you plug in a new device, you must personalize it before you can use the authentication
and private partition features. The device uses pre-installed ACCESS Standard software to
guide you through the personalization process. ACCESS Standard starts automatically when
you plug in a new (or recycled) device. If autorun is not configured for your computer, you can
start ACCESS Standard from the application partition on the device.
Personalizing a device involves three main steps:
1 Applying a device profile—The profile sets default preferences for the device. You can
choose the Typical profile, with preconfigured device settings, or the Custom profile that
allows you to configure device settings. The Typical profile contains the following device set-
tings:
• Authentication method: password authentication
• Number of device users: 1 (not including the Administrator)
• Private partition uses the total available disk space
• Minimum password length: 6
• Password Retry Limit: 10
• Password Re-use Threshold: 3
• User Rescue: Enabled
• Data Destruction: Off
• Administrator Account: Enabled
2 Creating the Administrator account—Only the Administrator can perform certain opera-
tions on a device, such as adding, removing, and rescuing users. During the personalization
process, the Administrator account is created automatically when you set the Administrator
password. If you choose a Custom profile and disable the Administrator account, you will not

Personalizing a device
Stealth Key M200 Quick Start Guide 9
be prompted to provide an Administrator password. In this case, you cannot create the
account at a later time.
It is very important that you memorize the Administrator password or store it in a safe place.
3 Creating users—Depending on the device profile, you can create one or more general users
on the device.
To personalize the device
1Plug the device into the USB port of the computer.
If Autorun does not automatically start ACCESS Standard, double-click the Start.exe file from
the root directory on the application partition. (If necessary, in the notification area at the far
right of the taskbar, click the MXI icon, and then click Personalize from the menu.)
2On the main page of ACCESS Standard, click Personalize Device.
3On the Device Personalization page, click one of the device profile options.
4Complete the instructions on the pages that follow to set the Administrator password (if appli-
cable) and create a user.
Note 1 If you do not complete the personalization process you may have to repeat some of the
above steps the next time you connect the device. For more information about the
personalization process, see the ACCESS Standard User Guide.
Note 2 After you successfully complete the Personalization process, you can access your
private partition using a file manager. For more information about logging in and saving files to or
opening files from the private partition, see “Accessing data on the device” on page 10.

Stealth Key M200 Quick Start Guide 10
3Accessing data on the device
After you personalize a device, only registered users can authenticate to it. Authentication
involves logging into the device using a password.
After you successfully log in, you can save files to, and open files from, your private partition. It is
recommended that you log out of your device if you must leave it connected while you are away
from your computer. Otherwise, another user could access your private partition while you are
absent. You can also disconnect the device completely to bring the data with you.
This chapter provides information about the following topics:
•Logging into and out of the device
•Saving and opening files
•Disconnecting the device
Logging into and out of the device
To log into the device
1From the notification area, at the far right of the taskbar, right-click the MXI icon and click
Login.
2If you are using a computer running Mac OS X, open a file manager and click the application
drive for the device. Double-click the ACCESS Standard application.
3On the main page of ACCESS Standard, under Manage Device, click Login. Follow the
prompts in the authentication wizard until the device successfully authenticates you.
To log out of the device
1From the notification area, at the far right of the taskbar, right-click the MXI icon and click
Logout.
2If you are using a computer running Mac OS X, open a file manager and click the application
drive for the device. Double-click the ACCESS Standard application.
3On the main page of ACCESS Standard, under Manage Device, click Logout.
Tip You can also log out of your device by right-clicking the MXI icon, and then clicking Eject
Device.
Table des matières
Manuels Modem populaires d'autres marques

Davicom
Davicom DM562AP Manuel utilisateur

EpiValley
EpiValley TATA indicom SXC-1080 Manuel utilisateur

Zte
Zte WiMAX Manuel utilisateur

Intelimax
Intelimax MA-2060 Manuel utilisateur

SMC Networks
SMC Networks D3CM1604V Manuel d'utilisation et d'entretien

Telstra
Telstra Wi-Fi 4G Advanced Pro X Manuel utilisateur

US Robotics
US Robotics 3453C Manuel utilisateur

MaxTech
MaxTech Plug & Play Internal Voice/FAX/Data/SVD... Manuel utilisateur

Zte
Zte MF823 Manuel utilisateur

Four-Faith
Four-Faith F1403 Manuel utilisateur

Sierra Wireless
Sierra Wireless AIRLINK MP595W Manuel utilisateur

Gemtek
Gemtek WiMAX WIXFBR-103 Manuel utilisateur





