Kingston KC300 Security Toolbox



Similar documents
Technical Note. Installing Micron SEDs in Windows 8 and 10. Introduction. TN-FD-28: Installing Micron SEDs in Windows 8 and 10.

SSD Firmware Update Utility Guide

Strategies for Firmware Support of Self-Encrypting Drives

Network Attached Storage System Recovery Procedure


Current Cost Data Cable User Guide. Installing and configuring the data cable

TE100-P21/TEW-P21G Windows 7 Installation Instruction

UCO_SECURE Wireless Connection Guide: Windows 8

How to downgrade Samsung Galaxy Tab 2 back to original V4.1.1 Android OS

BIOS Update SOP. Updating BIOS under Windows Mode for Intel Series (PXX/ZXX/X79)... 2

Working with SQL Server Integration Services

Connecticut Hazardous Waste Manifests Database

1 Intel Smart Connect Technology Installation Guide:

Installing SQL Express. For CribMaster 9.2 and Later

SSD Guru. Installation and User Guide. Software Version 1.4

TECHNICAL BULLETIN. Configuring Wireless Settings in an i-stat 1 Wireless Analyzer

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The

Cautions When Using BitLocker Drive Encryption on PRIMERGY

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

Intel Unite Solution. Standalone User Guide

Paragon Backup Retention Wizard

MFC6490CW Windows Network Connection Repair Instructions

Plena Voice Alarm System Firmware update

BASLER ACE QUICK INSTALLATION GUIDE

SATO Network Interface Card Configuration Instructions

Java Remote Desktop. Java Remote Desktop. The Manual of Java Remote Desktop J3PSoftware Revision 2.0 1

Administering FileVault 2 on OS X Lion with the Casper Suite. Technical Paper July 2012

Intel Rapid Storage Technology

ThinkServer RD350 and RD450 Operating System Installation Guide

HDD Password Tool. User s Manual. English

Wireless Network Configuration Guide

How to configure Linksys SPA for VOIP Connections

Instrument Software Update Instructions. Keysight X-Series Signal Analyzers (PXA/MXA/EXA/CXA) Upgrading an older version to A.12.

Image Backup and Recovery Procedures

Colorfly Tablet Upgrade Guide

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7

RAID User Guide. Edition. Trademarks V1.0 P/N: C51GME0-00

AMT Implementation on a UTC RETAIL 3170 POS

How To Install And Set Up The Database For Quicdoc And Office Therapy (The Applications)

Important Notes for WinConnect Server ES Software Installation:

Quick Note 32. Using Digi RealPort with a Digi TransPort Router. UK Support September 2012

Guide to Installing BBL Crystal MIND on Windows 7

Tutorial How to upgrade firmware on Phison S5 controller MyDigitalSSD

Using GIGABYTE Notebook for the First Time

StarMOBILE Network Configuration Guide. A guide to configuring your StarMOBILE system for networking

How To Set Up A Macintosh With A Cds And Cds On A Pc Or Macbook With A Domain Name On A Macbook (For A Pc) For A Domain Account (For An Ipad) For Free

OPERATION MANUAL. MV-410RGB Layout Editor. Version 2.1- higher

Update Instructions

1 of 10 1/31/2014 4:08 PM

Contents. VPN Instructions. VPN Instructions... 1

This user guide describes features that are common to most models. Some features may not be available on your computer.

Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.

Computer Setup User Guide

How to Install Microsoft Windows Server 2008 R2 in VMware ESXi

Exchange Server Backup and Restore

Samsung Magician v.4.5 Introduction and Installation Guide

Version 3. Installation Guide for SQL Server 2008 R2 Express Advanced Services

OnDemand Version 1.7. Installation Manual and User s Guide. AST Technology. Sophienstrasse Herford Germany

MiraCosta College now offers two ways to access your student virtual desktop.

Cognos 10 Getting Started with Internet Explorer and Windows 7

RAID Manual. Edition. Trademarks V1.0 P/N: CK8-A5-0E

Full Disk Encryption Agent Reference

NTL Studio SQL Database Installation & Configuration

NHSmail mobile configuration guide Android mobile devices

1. Navigate to Control Panel and click on User Accounts and Family Safety. 2. Click on User Accounts

SATA+Ultra ATA RAID CONTROLLER RC212. User Manual

Using GIGABYTE Notebook for the First Time

BackupAssist v6 quickstart guide

Tutorial How to upgrade firmware on Phison S8 controller MyDigitalSSD using a Windows PE environment

Installing the VPN Client for Microsoft Windows OS

Using GIGABYTE Notebook for the First Time

Docufide Client Installation Guide for Windows

PCI Express SATA / esata 6Gb/s RAID Card User Manual

Ethernet Interface Manual Thermal / Label Printer. Rev Metapace T-1. Metapace T-2 Metapace L-1 Metapace L-2

e-gate USB Smart Card Driver Install Notes (Windows 98/98SE/Me)

LOCKSS on LINUX. CentOS6 Installation Manual 08/22/2013

ACP ThinManager Tech Notes ThinManager and PXE Boot

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my ? Q. How do I change or reset a password for an account?

Using AORUS Notebook for the First Time

DSA-1000 / PRT-1000 Device Server / Thermal Printer

How do I configure the wireless printer using a USB or Ethernet cable and install the printer driver in Windows?

Configuring ThinkServer RAID 100 on the Lenovo TS130

Image Backup and Recovery Procedures

Secure Outgoing Mail (SMTP) Setup Guide

DUKANE Intelligent Assembly Solutions

How to configure your Desktop Computer and Mobile Devices post migrating to Microsoft Office 365

Printer Support Guide. FedEx Ship Manager Software

USER MANUAL DataLocker Enterprise

To perform Ethernet setup and communication verification, first perform RS232 setup and communication verification:

DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS

Configuring NXT Hardware with Mercury Inside into Doors.NET TM Application Note

Getting Started with WebEx Access Anywhere

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown

Contents. Hardware Configuration Uninstalling Shortcuts Black...29

The Wireless LAN (Local Area Network) USB adapter can be operated in one of the two following networking configurations :

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Intel ESB2 SATA RAID Setup Guidelines

Voyager Reporting System (VRS) Installation Guide. Revised 5/09/06

How To Use Mview On A Powerline 2.2 (Powerline) On A Pc Or Macbook 2 (Powerplst) On An Iphone Or Ipa 2 (Aldo) On Your Iphon 2 (

Transcription:

Intended for: SKC300S37A/60G SKC300S37A/120G SKC300S37A/180G SKC300S37A/240G SKC300S37A/480G Firmware Rev. 600ABBF0 The PSID Revert and the Enable/Disable IEEE1667 (or Microsoft edrive) operations described in this document will only work on Kingston KC300 drives that support TCG Opal 2.0 and IEEE1667. Please check the KC300 SSD label to ensure that it includes the 32-character PSID value (Older KC300 drives that do not include the PSID number do not support these features). System Requirements Platform OS Support PC with SATA II or SATA III interface Kingston SandForce-based SSD Windows 8, 8.1 Windows 7 (SP1) System Preparation The SSD MUST be mounted as a secondary drive not as a boot drive You must be running Windows 8.1, 8, or 7 SP1 in AHCI mode in BIOS Intel RST driver and AMD AHCI users must switch to the standard Microsoft AHCI driver Use only native SATA ports for connecting the SSD Document No. SKC3-TCGT1.A00 01/21/15 Page 1

Contents: 1. Revert Utility 3 2. Enable/Disable IEEE 1667 6 Document No. SKC3-TCGT1.A00 01/21/15 Page 2

Revert Utility About The Revert Utility is used when the KC300 SSD is in a locked state and it is unable to communicate with the system in order to unlock the drive and access the data. In this scenario, the Administrator must use the Revert Utility to reset the drive back to its factory state. In doing so, ALL DATA on the drive is lost and no data recovery can be completed; this is for security reasons and is normal behavior. Getting Started These instructions are designed to walk you through the revert procedure. Step 1: Write Down the 32 Character PSID Value You can find this information on the SSD label. See image provided. Step 2: Launching the Utility First, locate your download, double-click the zip file then extract it to your preferred location. You will see the security toolbox, the instructions in.pdf form and a.dll file. Document No. SKC3-TCGT1.A00 01/21/15 Page 3

If you are using Windows 8 or 7 SP1 right click the Kingston KC300 Security Toolbox and select "Run as Administrator" to launch the application. The toolbox application interface will appear and default to the "Drives" window. Note: If your drive does not appear within the window, confirm that you have adhered to the requirements located within the "System Preparation" section at the start of this document. Step 3: Identifying your Secondary Drive to be Reverted Select the drive you wish to Revert from "Secondary Drive". Once you have selected the drive you wish to revert, the drive information including Model Number, Capacity, Serial Number, Firmware, WWN, and Config ID will appear on the right. Note: If you attempt to Revert on your PRIMARY DRIVE, the utility will display a popup box stating, Operation cannot be done on a primary drive. Step 4: Selecting the Security" Window and Reverting your SSD Select the "Security" tab located at the top of the application interface. Document No. SKC3-TCGT1.A00 01/21/15 Page 4

Proceed to the "TCG OPAL Revert" section. If you are ready to revert your drive, click in the box and type the 32-character value following the PSID label. This is the value you should have written down in Step 1. Press the Enter key once you have entered in your PSID value. Note: All data will be wiped from drive when the revert process completes. If you are ready to revert, click Yes to continue. When the revert is successful, "TCG Revert Complete" will appear in the lower left corner of the application window. If the TCG OPAL Revert screen is greyed out, it means the LockingEnabled flag is not active and you will not be able to perform a Revert. Note: The LockingEnabled flag is active when a drive has been authenticated by via 3 rd party ISV (ex: Wave, WinMagic, McAfee etc). Document No. SKC3-TCGT1.A00 01/21/15 Page 5

Enable/Disable IEEE1667 Kingston KC300 Security Toolbox About The Enable/Disable IEEE 1667 section will allow you to set the Word 69 bit to 0 or 1. 0 represents that it is set to Disable and 1 represents that it is set to Enable. If Enable is set, the LockingEnabled flag is automatically switched from N to Y during the fresh install of Windows 8, 8.1, or Server 2012 R2. This will prevent the drive from being managed or initialized with other 3 rd party ISV (ex: Wave, WinMagic, McAfee etc). It is to be used with Windows edrive (Bitlocker) during activation to utilize AES 256 Hardware Encryption Engine from the SSD controller to improve performance. Getting Started Step 1: Launching the Utility First, locate your download, double-click the zip file, then extract it to your preferred location. You will see the security toolbox, the instructions in.pdf form and a.dll file. If you are using Windows 8 or 7 SP1 right click the Kingston KC300 Security Toolbox and select "Run as Administrator" to launch the application. The toolbox application interface will appear and default to the "Drives" window. Note: If your drive does not appear within the window, confirm that you have adhered to the requirements located within the "System Preparation" section at the start of this document. Document No. SKC3-TCGT1.A00 01/21/15 Page 6

Step 2: Identifying your Secondary Drive Select the "Secondary Drive". Once you have selected the drive, the drive information including Model Number, Capacity, Serial Number, Firmware, WWN, and Config ID will appear on the right. Step 3: Selecting the Security" Window Select the "Security" tab located at the top of the application interface. At the bottom of the screen, you will see a section for the Enable/Disable IEEE 1667. The following shows that it is currently Enabled. Click on the lock and you will be presented with the following screen. After selecting OK, the Word 69 bit will now be changed from 1 to 0. To confirm this, proceed to Step 5. Note: If the IEEE1667 box is greyed out, it means the Locking Enabled flag is active. You will need to perform a PSID Revert before attempting this process. To do this, please review the revert procedure at the top of this document. Document No. SKC3-TCGT1.A00 01/21/15 Page 7

Step 5: Selecting the Details Screen to Verify Select the "Details" tab located at the top of the application interface. Click the Identify Data button as seen in the image and look for the following screen image below. Scroll down to find Word 69. The first numerical value right of the red arrow (as depicted in the image) should show 0 for Disabled. For additional support information, please contact Kingston Technical Support @ http://www.kingston.com/support Document No. SKC3-TCGT1.A00 01/21/15 Page 8