Compaq 6910p ProtectTools - Windows Vista and Windows XP - Page 3

Table of contents - fingerprint

Page 3 highlights

Table of contents 1 Introduction to security HP ProtectTools features ...2 Accessing HP ProtectTools Security ...3 Achieving key security objectives ...4 Protecting against targeted theft 4 Restricting access to sensitive data 4 Preventing unauthorized access from internal or external locations 5 Creating strong password policies 5 Additional security elements ...6 Assigning security roles ...6 Managing HP ProtectTools passwords 6 Creating a secure password 8 HP ProtectTools Backup and Restore 8 Backing up credentials and settings 8 Restoring credentials 10 Configuring settings 10 2 Credential Manager for HP ProtectTools Setup procedures ...12 Logging on to Credential Manger 12 Using the Credential Manager Logon Wizard 12 Logging on for the first time 13 Registering credentials ...13 Registering fingerprints 13 Setting up the fingerprint reader 14 Using your registered fingerprint to log on to Windows 14 Registering a Java Card, USB eToken, or virtual token 14 Registering a USB eToken 14 Registering other credentials 14 General tasks ...15 Creating a virtual token ...15 Changing the Windows logon password 15 Changing a token PIN ...15 Managing identity ...16 Clearing an identity from the system 16 Locking the computer ...17 Using Windows Logon ...17 Logging on to Windows with Credential Manager 17 Adding an account 18 ENWW iii

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90

Table of contents
1
Introduction to security
HP ProtectTools features
.....................................................................................................................
2
Accessing HP ProtectTools Security
....................................................................................................
3
Achieving key security objectives
.........................................................................................................
4
Protecting against targeted theft
..........................................................................................
4
Restricting access to sensitive data
.....................................................................................
4
Preventing unauthorized access from internal or external locations
...................................
5
Creating strong password policies
.......................................................................................
5
Additional security elements
.................................................................................................................
6
Assigning security roles
.......................................................................................................
6
Managing HP ProtectTools passwords
................................................................................
6
Creating a secure password
...............................................................................
8
HP ProtectTools Backup and Restore
.................................................................................
8
Backing up credentials and settings
....................................................................
8
Restoring credentials
........................................................................................
10
Configuring settings
..........................................................................................
10
2
Credential Manager for HP ProtectTools
Setup procedures
...............................................................................................................................
12
Logging on to Credential Manger
......................................................................................
12
Using the Credential Manager Logon Wizard
...................................................
12
Logging on for the first time
...............................................................................
13
Registering credentials
......................................................................................................
13
Registering fingerprints
.....................................................................................
13
Setting up the fingerprint reader
.......................................................
14
Using your registered fingerprint to log on to Windows
....................
14
Registering a Java Card, USB eToken, or virtual token
....................................
14
Registering a USB eToken
................................................................................
14
Registering other credentials
............................................................................
14
General tasks
.....................................................................................................................................
15
Creating a virtual token
......................................................................................................
15
Changing the Windows logon password
............................................................................
15
Changing a token PIN
........................................................................................................
15
Managing identity
...............................................................................................................
16
Clearing an identity from the system
.................................................................
16
Locking the computer
........................................................................................................
17
Using Windows Logon
.......................................................................................................
17
Logging on to Windows with Credential Manager
.............................................
17
Adding an account
............................................................................................
18
ENWW
iii