Table of contents
1
Introduction to security
HP ProtectTools features
.....................................................................................................................
2
Accessing HP ProtectTools Security
....................................................................................................
3
Achieving key security objectives
.........................................................................................................
4
Protecting against targeted theft
..........................................................................................
4
Restricting access to sensitive data
.....................................................................................
4
Preventing unauthorized access from internal or external locations
...................................
5
Creating strong password policies
.......................................................................................
5
Additional security elements
.................................................................................................................
6
Assigning security roles
.......................................................................................................
6
Managing HP ProtectTools passwords
................................................................................
6
Creating a secure password
...............................................................................
8
HP ProtectTools Backup and Restore
.................................................................................
8
Backing up credentials and settings
....................................................................
8
Restoring credentials
........................................................................................
10
Configuring settings
..........................................................................................
10
2
Credential Manager for HP ProtectTools
Setup procedures
...............................................................................................................................
12
Logging on to Credential Manger
......................................................................................
12
Using the Credential Manager Logon Wizard
...................................................
12
Logging on for the first time
...............................................................................
13
Registering credentials
......................................................................................................
13
Registering fingerprints
.....................................................................................
13
Setting up the fingerprint reader
.......................................................
14
Using your registered fingerprint to log on to Windows
....................
14
Registering a Java Card, USB eToken, or virtual token
....................................
14
Registering a USB eToken
................................................................................
14
Registering other credentials
............................................................................
14
General tasks
.....................................................................................................................................
15
Creating a virtual token
......................................................................................................
15
Changing the Windows logon password
............................................................................
15
Changing a token PIN
........................................................................................................
15
Managing identity
...............................................................................................................
16
Clearing an identity from the system
.................................................................
16
Locking the computer
........................................................................................................
17
Using Windows Logon
.......................................................................................................
17
Logging on to Windows with Credential Manager
.............................................
17
Adding an account
............................................................................................
18
ENWW
iii