HP ProBook 4525s HP ProtectTools User Guide - Windows XP, Windows Vista, Windo - Page 20

Configuring your system, Set up, manage, and register users of this computer.

Page 20 highlights

4 Configuring your system The System group is accessed from the Tools menu panel on the left side of the HP ProtectTools Administrative Console screen. You can use the applications in this group to manage the policies and settings for the computer, its users, and its devices. The following applications are included in the System group: ● Security-Manage features, authentication, and settings governing how users interact with this computer. ● Users-Set up, manage, and register users of this computer. ● Devices-Manage settings for security devices built into or attached to the computer. 12 Chapter 4 Configuring your system

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103

4
Configuring your system
The System group is accessed from the Tools menu panel on the left side of the HP ProtectTools
Administrative Console screen. You can use the applications in this group to manage the policies and
settings for the computer, its users, and its devices.
The following applications are included in the System group:
Security
—Manage features, authentication, and settings governing how users interact with this
computer.
Users
—Set up, manage, and register users of this computer.
Devices
—Manage settings for security devices built into or attached to the computer.
12
Chapter 4
Configuring your system