HP ProBook 4525s HP ProtectTools User Guide - Windows XP, Windows Vista, Windo - Page 3

Table of contents - 15 6

Page 3 highlights

Table of contents 1 Introduction to security HP ProtectTools features ...2 Achieving key security objectives ...3 Protecting against targeted theft 3 Restricting access to sensitive data 3 Preventing unauthorized access from internal or external locations 3 Creating strong password policies 4 Additional security elements ...5 Assigning security roles ...5 Managing HP ProtectTools passwords 5 Creating a secure password 6 Backing up and restoring HP ProtectTools credentials 6 2 Getting started with the Setup Wizard 3 HP ProtectTools Security Manager Administrative Console Opening the Administrative Console 10 Using the Administrative Console ...11 4 Configuring your system Setting up authentication for your computer 13 Logon Policy ...13 Session Policy ...13 Settings ...14 Managing users ...15 Specifying device settings ...16 Fingerprints ...16 Smart card ...16 Face ...16 Advanced settings 17 5 Configuring your applications General tab ...19 iii

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103

Table of contents
1
Introduction to security
HP ProtectTools features
.....................................................................................................................
2
Achieving key security objectives
.........................................................................................................
3
Protecting against targeted theft
..........................................................................................
3
Restricting access to sensitive data
.....................................................................................
3
Preventing unauthorized access from internal or external locations
...................................
3
Creating strong password policies
.......................................................................................
4
Additional security elements
.................................................................................................................
5
Assigning security roles
.......................................................................................................
5
Managing HP ProtectTools passwords
...............................................................................
5
Creating a secure password
...............................................................................
6
Backing up and restoring HP ProtectTools credentials
.......................................................
6
2
Getting started with the Setup Wizard
3
HP ProtectTools Security Manager Administrative Console
Opening the Administrative Console
..................................................................................................
10
Using the Administrative Console
......................................................................................................
11
4
Configuring your system
Setting up authentication for your computer
.......................................................................................
13
Logon Policy
......................................................................................................................
13
Session Policy
...................................................................................................................
13
Settings
..............................................................................................................................................
14
Managing users
..................................................................................................................................
15
Specifying device settings
..................................................................................................................
16
Fingerprints
........................................................................................................................
16
Smart card
.........................................................................................................................
16
Face
...................................................................................................................................
16
Advanced settings
.............................................................................................
17
5
Configuring your applications
General tab
.........................................................................................................................................
19
iii