HP ProBook 4540s HP ProtectTools Getting Started - Page 113

Embedded Security for HP ProtectTools (select models only), Setup procedures, Enabling the embedded

Page 113 highlights

11 Embedded Security for HP ProtectTools (select models only) NOTE: The integrated Trusted Platform Module (TPM) embedded security chip must be installed in your computer to use Embedded Security for HP ProtectTools. Embedded Security for HP ProtectTools protects against unauthorized access to user data or credentials. This software module provides the following security features: ● Enhanced Microsoft® Encryption File System (EFS) file and folder encryption ● Creation of a personal secure drive (PSD) for protecting user data ● Data management functions, such as backing up and restoring the key hierarchy ● Support for third-party applications (such as Microsoft Outlook and Internet Explorer) for protected digital certificate operations when using the Embedded Security software The TPM embedded security chip enhances and enables other HP ProtectTools Security Manager security features. For example, Credential Manager can use the embedded chip as an authentication factor when the user logs on to Windows. Setup procedures CAUTION: To reduce security risk, it is highly recommended that your IT administrator immediately initialize the embedded security chip. Failure to initialize the embedded security chip could result in an unauthorized user, a computer worm, or a virus taking ownership of the computer and gaining control over the owner tasks, such as handling the emergency recovery archive and configuring user access settings. Follow the steps in the following sections to enable and initialize the embedded security chip. Enabling the embedded security chip in Computer Setup The embedded security chip must be enabled in the Quick Initialization Wizard or in the Computer Setup utility. NOTE: The process of entering the ROM and setting up the TPM chip may vary, depending on your computer model. Setup procedures 103

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138

11
Embedded Security for HP
ProtectTools (select models only)
NOTE:
The integrated Trusted Platform Module (TPM) embedded security chip must be installed in
your computer to use Embedded Security for HP ProtectTools.
Embedded Security for HP ProtectTools protects against unauthorized access to user data or
credentials. This software module provides the following security features:
Enhanced Microsoft® Encryption File System (EFS) file and folder encryption
Creation of a personal secure drive (PSD) for protecting user data
Data management functions, such as backing up and restoring the key hierarchy
Support for third-party applications (such as Microsoft Outlook and Internet Explorer) for
protected digital certificate operations when using the Embedded Security software
The TPM embedded security chip enhances and enables other HP ProtectTools Security Manager
security features. For example, Credential Manager can use the embedded chip as an authentication
factor when the user logs on to Windows.
Setup procedures
CAUTION:
To reduce security risk, it is highly recommended that your IT administrator immediately
initialize the embedded security chip. Failure to initialize the embedded security chip could result in an
unauthorized user, a computer worm, or a virus taking ownership of the computer and gaining control
over the owner tasks, such as handling the emergency recovery archive and configuring user access
settings.
Follow the steps in the following sections to enable and initialize the embedded security chip.
Enabling the embedded security chip in Computer Setup
The embedded security chip must be enabled in the Quick Initialization Wizard or in the Computer
Setup utility.
NOTE:
The process of entering the ROM and setting up the TPM chip may vary, depending on your
computer model.
Setup procedures
103