HP ProBook 4540s HP ProtectTools Getting Started - Page 3

Table of contents - 15 6

Page 3 highlights

Table of contents 1 Introduction to security ...1 HP ProtectTools features ...2 HP ProtectTools security product description and common use examples 4 Password Manager ...4 Embedded Security for HP ProtectTools (select models only 4 Drive Encryption for HP ProtectTools (select models only 5 File Sanitizer for HP ProtectTools (select models only 5 Device Access Manager for HP ProtectTools (select models only 6 Privacy Manager for HP ProtectTools (select models only 6 Computrace for HP ProtectTools (formerly LoJack Pro) (purchased separately 6 Achieving key security objectives ...7 Protecting against targeted theft 7 Restricting access to sensitive data 8 Preventing unauthorized access from internal or external locations 8 Creating strong password policies 8 Additional security elements ...9 Assigning security roles ...9 Managing HP ProtectTools passwords 9 Creating a secure password 10 Backing up credentials and settings 11 2 Getting started with the Setup Wizard ...13 3 Easy Setup Guide for Small Business ...15 Getting started ...16 Password Manager ...17 Viewing and managing the saved authentications in Password Manager 17 File Sanitizer for HP ProtectTools ...18 Device Access Manager for HP ProtectTools 19 Drive Encryption for HP ProtectTools 20 iii

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138

Table of contents
1
Introduction to security
..................................................................................................................................
1
HP ProtectTools features
.....................................................................................................................
2
HP ProtectTools security product description and common use examples
.........................................
4
Password Manager
..............................................................................................................
4
Embedded Security for HP ProtectTools (select models only)
............................................
4
Drive Encryption for HP ProtectTools (select models only)
.................................................
5
File Sanitizer for HP ProtectTools (select models only)
.......................................................
5
Device Access Manager for HP ProtectTools (select models only)
.....................................
6
Privacy Manager for HP ProtectTools (select models only)
................................................
6
Computrace for HP ProtectTools (formerly LoJack Pro) (purchased separately)
................
6
Achieving key security objectives
.........................................................................................................
7
Protecting against targeted theft
..........................................................................................
7
Restricting access to sensitive data
.....................................................................................
8
Preventing unauthorized access from internal or external locations
...................................
8
Creating strong password policies
.......................................................................................
8
Additional security elements
.................................................................................................................
9
Assigning security roles
.......................................................................................................
9
Managing HP ProtectTools passwords
................................................................................
9
Creating a secure password
.............................................................................
10
Backing up credentials and settings
..................................................................
11
2
Getting started with the Setup Wizard
........................................................................................................
13
3
Easy Setup Guide for Small Business
........................................................................................................
15
Getting started
....................................................................................................................................
16
Password Manager
............................................................................................................................
17
Viewing and managing the saved authentications in Password Manager
.........................
17
File Sanitizer for HP ProtectTools
......................................................................................................
18
Device Access Manager for HP ProtectTools
....................................................................................
19
Drive Encryption for HP ProtectTools
.................................................................................................
20
iii