HP Dx5150 HP ProtectTools Embedded Security Guide - Page 11

Emergency Recovery, Policies, Machine Policies, User Policies

Page 11 highlights

HP ProtectTools Embedded Security Emergency Recovery The Emergency Recovery Archive, created by the administrator during Embedded Security setup, is a file that stores sensitive information about the computer, its users, and the private keys used to protect encrypted or private data. In the case of a system failure, this sensitive information is required to restore access to protected data. An Emergency Recovery Token, also created by the administrator during Embedded Security setup, is a file that stores the keys used to protect the data in the Emergency Recovery Archive. The token is required to access the archive. The access to the Emergency Recovery Token is protected by a password. This password is required in case the Embedded Security system needs to be restored. Policies Policies are rules that govern the behavior of a computer or software. The system administrator generally specifies security policies to ensure consistent use of Embedded Security within an organization. The two types of security policies are machine policies and user policies. Machine Policies Machine policies are rules governing the overall behavior of Embedded Security as it relates to a specific computer. User Policies User policies are rules governing the rights of the user of Embedded Security. For more information on machine and user security policies, refer to the HP ProtectTools Embedded Security Help. HP ProtectTools Embedded Security Guide www.hp.com 7

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26

HP ProtectTools Embedded Security Guide
www.hp.com
7
HP ProtectTools Embedded Security
Emergency Recovery
The Emergency Recovery Archive, created by the administrator
during Embedded Security setup, is a file that stores sensitive
information about the computer, its users, and the private keys used to
protect encrypted or private data. In the case of a system failure, this
sensitive information is required to restore access to protected data.
An Emergency Recovery Token, also created by the administrator
during Embedded Security setup, is a file that stores the keys used to
protect the data in the Emergency Recovery Archive. The token is
required to access the archive. The access to the Emergency Recovery
Token is protected by a password. This password is required in case
the Embedded Security system needs to be restored.
Policies
Policies are rules that govern the behavior of a computer or software.
The system administrator generally specifies security policies to
ensure consistent use of Embedded Security within an organization.
The two types of security policies are machine policies and user
policies.
Machine Policies
Machine policies are rules governing the overall behavior of
Embedded Security as it relates to a specific computer.
User Policies
User policies are rules governing the rights of the user of Embedded
Security.
For more information on machine and user security policies, refer to
the HP ProtectTools Embedded Security Help.