HP ProBook 4535s HP ProtectTools Getting Started - Windows 7 and Windows Vista - Page 3

Table of contents - 15 6

Page 3 highlights

Table of contents 1 Introduction to security ...1 HP ProtectTools features ...2 HP ProtectTools security product description and common use examples 4 Credential Manager for HP ProtectTools 4 Drive Encryption for HP ProtectTools 4 File Sanitizer for HP ProtectTools 5 Device Access Manager for HP ProtectTools 5 Privacy Manager for HP ProtectTools 6 Computrace for HP ProtectTools (formerly LoJack Pro 6 Embedded Security for HP ProtectTools (select models only 6 Achieving key security objectives ...8 Protecting against targeted theft 8 Restricting access to sensitive data 8 Preventing unauthorized access from internal or external locations 8 Creating strong password policies 9 Additional security elements ...10 Assigning security roles ...10 Managing HP ProtectTools passwords 10 Creating a secure password 12 Backing up and restoring HP ProtectTools credentials 12 2 Getting started with the Setup Wizard ...13 3 HP ProtectTools Security Manager Administrative Console 15 Opening HP ProtectTools Administrative Console 16 Using Administrative Console ...17 Configuring your system ...18 Setting up authentication for your computer 18 Logon Policy ...18 Session Policy 19 Settings ...19 iii

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124

Table of contents
1
Introduction to security
..................................................................................................................................
1
HP ProtectTools features
.....................................................................................................................
2
HP ProtectTools security product description and common use examples
.........................................
4
Credential Manager for HP ProtectTools
.............................................................................
4
Drive Encryption for HP ProtectTools
..................................................................................
4
File Sanitizer for HP ProtectTools
........................................................................................
5
Device Access Manager for HP ProtectTools
......................................................................
5
Privacy Manager for HP ProtectTools
.................................................................................
6
Computrace for HP ProtectTools (formerly LoJack Pro)
.....................................................
6
Embedded Security for HP ProtectTools (select models only)
............................................
6
Achieving key security objectives
.........................................................................................................
8
Protecting against targeted theft
..........................................................................................
8
Restricting access to sensitive data
.....................................................................................
8
Preventing unauthorized access from internal or external locations
...................................
8
Creating strong password policies
.......................................................................................
9
Additional security elements
...............................................................................................................
10
Assigning security roles
.....................................................................................................
10
Managing HP ProtectTools passwords
..............................................................................
10
Creating a secure password
.............................................................................
12
Backing up and restoring HP ProtectTools credentials
.....................................
12
2
Getting started with the Setup Wizard
........................................................................................................
13
3
HP ProtectTools Security Manager Administrative Console
....................................................................
15
Opening HP ProtectTools Administrative Console
.............................................................................
16
Using Administrative Console
............................................................................................................
17
Configuring your system
.....................................................................................................................
18
Setting up authentication for your computer
......................................................................
18
Logon Policy
......................................................................................................
18
Session Policy
...................................................................................................
19
Settings
..............................................................................................................................
19
iii