HP Dc7100 HP ProtectTools Embedded Security Guide - Page 11

Policies, Machine Policies, User Policies

Page 11 highlights

HP ProtectTools Embedded Security required to access the archive. The access to the Emergency Recovery Token is protected by a password. This password is required in case the Embedded Security system needs to be restored. Policies Policies are rules that govern the behavior of a computer or software. The system administrator generally specifies security policies to ensure consistent use of Embedded Security within an organization. The two types of security policies are machine policies and user policies. Machine Policies Machine policies are rules governing the overall behavior of Embedded Security as it relates to a specific computer. User Policies User policies are rules governing the rights of the user of Embedded Security. For more information on machine and user security policies, refer to the HP ProtectTools Embedded Security Help. HP ProtectTools Embedded Security Guide www.hp.com 7

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28

HP ProtectTools Embedded Security Guide
www.hp.com
7
HP ProtectTools Embedded Security
required to access the archive. The access to the Emergency Recovery
Token is protected by a password. This password is required in case
the Embedded Security system needs to be restored.
Policies
Policies are rules that govern the behavior of a computer or software.
The system administrator generally specifies security policies to
ensure consistent use of Embedded Security within an organization.
The two types of security policies are machine policies and user
policies.
Machine Policies
Machine policies are rules governing the overall behavior of
Embedded Security as it relates to a specific computer.
User Policies
User policies are rules governing the rights of the user of Embedded
Security.
For more information on machine and user security policies, refer to
the HP ProtectTools Embedded Security Help.