Signing a Microsoft Office document
................................................................
75
Adding a signature line when signing a Microsoft Word or Microsoft Excel
document
..........................................................................................................
75
Adding suggested signers to a Microsoft Word or Microsoft Excel
document
..........................................................................................
75
Adding a suggested signer's signature line
......................................
76
Encrypting a Microsoft Office document
...........................................................
76
Removing encryption from a Microsoft Office document
..................................
77
Sending an encrypted Microsoft Office document
............................................
77
Viewing a signed Microsoft Office document
....................................................
77
Viewing an encrypted Microsoft Office document
.............................................
78
Advanced tasks
..................................................................................................................................
78
Migrating Privacy Manager Certificates and Trusted Contacts to a different computer
.....
78
Backing up Privacy Manager Certificates and Trusted Contacts
......................
78
Restoring Privacy Manager Certificates and Trusted Contacts
........................
78
Central administration of Privacy Manager
........................................................................
79
8
File Sanitizer for HP ProtectTools (select models only)
...........................................................................
81
Shredding
...........................................................................................................................................
81
Free space bleaching
.........................................................................................................................
81
Opening File Sanitizer
........................................................................................................................
82
Setup procedures
...............................................................................................................................
82
Setting a shred schedule
...................................................................................................
82
Setting a free space bleaching schedule
...........................................................................
83
Selecting or creating a shred profile
..................................................................................
83
Selecting a predefined shred profile
..................................................................
83
Customizing a shred profile
...............................................................................
84
Customizing a simple delete profile
..................................................................
85
General tasks
.....................................................................................................................................
86
Using a key sequence to initiate shredding
.......................................................................
86
Using the File Sanitizer icon
..............................................................................................
87
Manually shredding one asset
...........................................................................................
87
Manually shredding all selected items
...............................................................................
87
Manually activating free space bleaching
..........................................................................
88
Aborting a shred or free space bleaching operation
..........................................................
88
Viewing the log files
...........................................................................................................
88
9
Device Access Manager for HP ProtectTools (select models only)
.........................................................
89
Opening Device Access Manager
......................................................................................................
89
Setup Procedures
...............................................................................................................................
90
Configuring device access
.................................................................................................
90
vii