Ensure Technologies MK Desktop Computer Security Lock User Manual Manual

Ensure Technologies Inc Desktop Computer Security Lock Manual

Manual

 © Ensure Technologies, 1998-2000. All rights reserved. Read Me First XyLoc Solo Quick Start  Please refer to the following Quick Start instructions to get up and running with your XyLoc Solo without reading the entire User’s Guide. The numbers in parentheses refer to the page of the User’s Guide that provides more details for that step. Note: Windows NT users must have local Administrator privileges to complete the installation. To get up and running with your XyLoc Solo without reading through the entire User’s Guide, please refer to the following Quick Start instructions. Installing the XyLoc Lock (USB) 95B, 98 and 2000 1.  Close all open applications. 2.  Install the USB plug into an open USB port. Windows will respond with a message, indicating new hardware was found, followed by an Add New Hardware wizard.  3.  Click the Next button to begin the Add New Hardware Wizard. 4.  Select Search for the best driver for your device and click Next. 5.  Install the XyLoc CD into the CD drive. 6.  Select the CD drive by clicking on the CD ROM check box. The CD ROM check box must be the only box selected.  NOTE: (If the Auto Run function starts the CD, please ignore it at this time). 7.  Click Next to install the USB driver. 8.  Click Finish. 9.  Install the XyLoc System Software . If the Auto Run does not start the CD, please Explore the CD and click on the “Install.exe” file and follow the instructions.   USB Plug Installing the XyLoc Lock (USB) NT 4 Only 1.  Close all open applications. 2.  Install the USB plug into an open USB port.. 3.  Install the XyLoc CD into the CD drive. 4.  Install the XyLoc System Software . If the Auto Run does not start the CD, please Explore the CD and click on the “Install.exe” file and follow the instructions.   USB Plug
XyLoc Solo Quick Start ·  Page 2 Installing the XyLoc Lock (Keyboard)-95,98,NT 4 ONLY  Female PS/2 Plug 1.  Shut down your computer and turn off the power. 2.  Unplug the keyboard cable from the PC and plug it into the red female PS/2 plug on the XyLoc Lock cable.  3.  Plug the red male PS/2 plug into the keyboard port of your computer. Note: Ignore the gray male plug: it is not used with the Keyboard version. 4.  Turn on your computer.  Male PS/2 Plug Installing the XyLoc Lock (Serial)-95,98,NT 4 and 2000  Female PS/2 Plug  Male PS/2 Plug (Red)  Male PS/2 Plug (Gray) 1.  Shut down your computer and turn off the power. 2.  Unplug the keyboard cable from the PC and plug it into the red female PS/2 plug on the XyLoc Lock cable.  3.  Plug the red male PS/2 plug into the keyboard port of your computer. 4.  Plug the serial port plug into the gray male PS/2 plug on the XyLoc Lock cable. 5.  Plug the serial port plug into an available and unused serial port on your computer. 6.  Turn on your computer.  Serial Plug (Gray)  Placement of the XyLoc Lock XyLoc uses advanced wireless technology to make PC security more convenient for the user. The proper placement of the XyLoc Lock will ensure that users get the best performance from XyLoc. Ideal placement is with the face of the Key parallel to the LED on the front of the Lock. The best performance of the system will be achieved by trying to maintain this positioning while you are seated at your PC doing your work. The primary factor in deciding where to place the XyLoc Lock is to determine where the user will wear the XyLoc Key the majority of the time. The Key can be clipped to a shirt pocket or belt or worn on a lanyard around the user’s neck.
3 Once you’ve identified where the Key will be worn, place the Lock at the same height as where the Key will be when the user is at the PC. You should also make sure that the path between the Lock and Key is unobstructed (such as obstruction caused by your arm that might occur while using your mouse or keyboard). For example, if the user will wear the Key on the left side of his shirt, use the Velcro strip to secure the Lock to the left side of the user’s monitor at the same height as the Key will be when the user is seated. If the user will wear the Key on the right side of her belt, use the Velcro strip to secure the Lock to the underside of the user’s desk at the same height as the Key will be when the user is seated and keeping the face of the Key pointing at the LED. If the user will wear the Key on the right side of her belt, use the Velcro strip to secure the Lock to the underside of the user’s desk at the same height as the Key will be when the user is seated and keeping the face of the Key pointing at the LED (see Figure 1).  Ideal Lock Placement Figure 1 Less Desirable Lock Placement
XyLoc Solo Quick Start ·  Page 4 Installing the XyLoc Software Note: Windows NT/2000 users must have local Administrator privileges to complete the installation. 1.  Exit any applications that are currently running. 2.  Place the XyLoc CD-ROM into the CD-ROM drive. 3.  If the installer does not automatically launch, use either My Computer or Windows Explorer to select the CD-ROM drive, and run install.exe  to run the Installation Wizard and then follow the Wizard’s instructions. 4.  Login Account Selection: select the desired user name from the list (this list is gathered from the Users database on your PC, if none exists, you must first add a user in the Users control panel). 5.  Turn your XyLoc Key on by depressing the “X” button on the front panel. A green LED will flash confirming that the Key is on and the battery is good.  6.  Port Selection: XyLoc will attempt to find the port to which the Lock is attached. Please confirm that the correct port has been selected and correct it if necessary. 7.  Confirm XyLoc Key ID: XyLoc will attempt to identify the closest Key and insert that Key ID into this field. Refer to the label on your XyLoc Key and verify that it matches the Key ID shown. If no Key ID is shown, or if it is not the correct Key ID, please enter it manually. 8.  Personal Name Identification: Enter the user’s full name to further identify the Key owner. 9.  XSS IP Configuration: If your installation is to be managed by the XyLoc Security Server (XSS), enter the IP address for the XSS Server 10.  XyLoc Configuration Summary.  This screen provides a summary of the features you just selected.  Choose Finish to complete the Installation Wizard. 11.  Restart your computer when prompted. 12.  If your installation was successful, upon restart you will see the XyLoc logon window.  You will be prompted to enter your standard logon password by your Windows or Novell logon client.  If you have set up your XyLoc system for AutoLogon (Keystroke Confirm) or Hands -Free Unlock, this will be the last time you will need to enter your password. 13.  Test your XyLoc system by stepping away from your PC and watching to see if it secures. If it does, you’re all set and ready to go! You can also adjust the range at which the XyLoc locks and unlocks your PC. NOTE:  The XyLoc system is disabled when the XyLoc Configuration Manager is running. To ensure maximum protection, please make sure you exit the Configuration Manager when you are done using it.
XyLoc Solo Quick Start ·  Page 5 The XyLoc Lock Status Light The LED indicator light (see Figure 2) on the XyLoc Lock has three possible states: 1.  Green – The indicator light is green when the computer is unlocked and available for access. 2.  Red – The indicator light is red when the computer is locked or disabled. 3.  Off – The indicator light is off if the XyLoc system is not receiving power.  Figure 2 Using the XyLoc Key The XyLoc Key is a low power radio transceiver with a unique non-volatile and non-cloneable user identification code.  LED Status Light LED Status Light OFF Button ON Button
XyLoc Solo Quick Start ·  Page 6 The KeyCard is powered by single coin cell that lasts approximately twelve to twenty-four months. The KeyCard has two switches on its front panel marked “X” and “O”. The “X” turns the Key ON and “O” manually turns the Key OFF. The Status LED flashes green when the system is turned ON and red when it is turned OFF. The OFF action requires an extend depression of the “O” button to turn the Key OFF.  The KeyCard uses sophisticated power management technology and will automatically turn OFF approximately 9 hours after it was first turned ON. You may extend this automatic turn OFF time up to 4 additional hours by pressing the “X” button one time for each additional hour any time after the Key has been turned ON. An upcoming software update will provide the user an advanced screen notification that the Key will shortly active its power saving mode. The Status LED also functions as a battery tester. As long as the LED functions, the KeyCard has sufficient battery power.  The XyLoc software will soon incorporate a Battery Life Meter with which the user may check the battery life through the XyLoc configuration software or the XyLoc Security Server (XSS) at any time. The Key must be in the possession of the user at all times. The XyLoc system provides tools to help ensure user compliance.  The XyLoc is capable of identifying a Key which has been left unattended and stationary. The administrator can specify a range of actions varying from reporting to automatically securing the workstation should a Key be left unattended. NOTE:  To insert the batteries into the KeyCard, place the KeyCard with the XyLoc logo face down, remove the two retaining screws and slide open the lid. Replace the CR 3032 coin cell with the “+” up.  Troubleshooting Please refer to the solutions to common setup problems on page 8 of the users manual. The complete Users Guide is provided on the XyLoc Systems Software CD and is also available on Ensure Technologies’ website. If you still cannot resolve the proble m, please call Ensure Technologies Technical Support at (734) 668-8800 or send email to support@ensuretech.com.  FCC and Industry Canada Information for the Xyloc Lock and Key  This device complies with Part 15 of the FCC Rules and with RSS-210 of Industry Canada.  Operation is subject to the following two conditions:  (1) This device may not cause harmful interference, and  (2) This device must accept any interference received, including interference that may cause undesirable information. WARNING: Changes or modifications not expressly approved by the party responsible for compliance could void user’s authority to operate the equipment.

Navigation menu