Compaq dc7900 HP ProtectTools User Guide - Page 5

Table of contents

Page 5 highlights

Table of contents 1 Introduction to security HP ProtectTools features ...2 Accessing HP ProtectTools Security ...4 Achieving key security objectives ...4 Protecting against targeted theft 5 Restricting access to sensitive data 5 Preventing unauthorized access from internal or external locations 5 Creating strong password policies 6 Additional security elements ...7 Assigning security roles ...7 Managing HP ProtectTools passwords 7 Creating a secure password 9 Backing up and restoring HP ProtectTools credentials 9 Backing up credentials and settings 9 2 HP ProtectTools Security Manager for Administrators About HP ProtectTools Security Manager for Administrators 10 Getting Started - Configuring HP ProtectTools Security Manager for Administrators 11 Getting Started - Configuring user security login methods 13 Logging in after Security Manager is configured 14 Administrator Tools - Managing users (administrator task 15 Adding a user ...15 Removing a user ...15 Checking user status ...16 Backup and Restore ...16 Using the Backup wizard ...17 Security Modules ...17 File Location ...17 Backup Complete ...18 Using the Restore wizard ...18 File Location ...18 Security Modules ...18 Confirmation ...19 Restore Complete ...19 ENWW v

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110

Table of contents
1
Introduction to security
HP ProtectTools features
.....................................................................................................................
2
Accessing HP ProtectTools Security
....................................................................................................
4
Achieving key security objectives
.........................................................................................................
4
Protecting against targeted theft
..........................................................................................
5
Restricting access to sensitive data
.....................................................................................
5
Preventing unauthorized access from internal or external locations
...................................
5
Creating strong password policies
.......................................................................................
6
Additional security elements
.................................................................................................................
7
Assigning security roles
.......................................................................................................
7
Managing HP ProtectTools passwords
................................................................................
7
Creating a secure password
...............................................................................
9
Backing up and restoring HP ProtectTools credentials
.......................................................
9
Backing up credentials and settings
....................................................................
9
2
HP ProtectTools Security Manager for Administrators
About HP ProtectTools Security Manager for Administrators
............................................................
10
Getting Started - Configuring HP ProtectTools Security Manager for Administrators
........................
11
Getting Started - Configuring user security login methods
.................................................................
13
Logging in after Security Manager is configured
................................................................................
14
Administrator Tools - Managing users (administrator task)
................................................................
15
Adding a user
.....................................................................................................................
15
Removing a user
................................................................................................................
15
Checking user status
.........................................................................................................
16
Backup and Restore
...........................................................................................................................
16
Using the Backup wizard
....................................................................................................................
17
Security Modules
...............................................................................................................
17
File Location
......................................................................................................................
17
Backup Complete
..............................................................................................................
18
Using the Restore wizard
...................................................................................................................
18
File Location
......................................................................................................................
18
Security Modules
...............................................................................................................
18
Confirmation
......................................................................................................................
19
Restore Complete
..............................................................................................................
19
ENWW
v