HP 5850 HP Protect Tools Guide - Page 3

Table of contents

Page 3 highlights

Table of contents 1 Introduction to security HP ProtectTools features ...2 Accessing HP ProtectTools Security ...4 Achieving key security objectives ...5 Protecting against targeted theft 5 Restricting access to sensitive data 5 Preventing unauthorized access from internal or external locations 6 Creating and using strong passwords 6 Additional security elements ...7 Assigning security roles ...7 Managing HP ProtectTools passwords 7 Creating a secure password 8 HP ProtectTools Backup and Restore 9 Backing up credentials and settings 9 Restoring credentials 10 Configuring settings 10 2 Credential Manager for HP ProtectTools Setup procedures ...12 Logging on to Credential Manager 12 Using the Credential Manager Logon Wizard 12 Logging on for the first time 12 Registering credentials ...12 Registering fingerprints 12 Setting up the fingerprint reader 13 Using your registered fingerprint to log on to Windows 13 Registering a Java Card, USB eToken, or virtual token 13 Registering a USB eToken 13 Registering other credentials 13 General tasks ...14 Creating a virtual token ...14 Changing the Windows logon password 14 Changing a token PIN ...14 Managing identity ...15 Clearing an identity from the system 15 Locking the computer ...15 Using Windows Logon ...15 Logging on to Windows with Credential Manager 15 Adding an account 16 Removing an account 16 Using Single Sign On ...16 Registering a new application 16 Using automatic registration 16 iii

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72

Table of contents
1
Introduction to security
HP ProtectTools features
.....................................................................................................................
2
Accessing HP ProtectTools Security
....................................................................................................
4
Achieving key security objectives
.........................................................................................................
5
Protecting against targeted theft
..........................................................................................
5
Restricting access to sensitive data
.....................................................................................
5
Preventing unauthorized access from internal or external locations
...................................
6
Creating and using strong passwords
.................................................................................
6
Additional security elements
.................................................................................................................
7
Assigning security roles
.......................................................................................................
7
Managing HP ProtectTools passwords
................................................................................
7
Creating a secure password
...............................................................................
8
HP ProtectTools Backup and Restore
.................................................................................
9
Backing up credentials and settings
....................................................................
9
Restoring credentials
........................................................................................
10
Configuring settings
..........................................................................................
10
2
Credential Manager for HP ProtectTools
Setup procedures
...............................................................................................................................
12
Logging on to Credential Manager
....................................................................................
12
Using the Credential Manager Logon Wizard
...................................................
12
Logging on for the first time
...............................................................................
12
Registering credentials
......................................................................................................
12
Registering fingerprints
.....................................................................................
12
Setting up the fingerprint reader
.......................................................
13
Using your registered fingerprint to log on to Windows
....................
13
Registering a Java Card, USB eToken, or virtual token
....................................
13
Registering a USB eToken
................................................................................
13
Registering other credentials
............................................................................
13
General tasks
.....................................................................................................................................
14
Creating a virtual token
......................................................................................................
14
Changing the Windows logon password
............................................................................
14
Changing a token PIN
........................................................................................................
14
Managing identity
...............................................................................................................
15
Clearing an identity from the system
.................................................................
15
Locking the computer
........................................................................................................
15
Using Windows Logon
.......................................................................................................
15
Logging on to Windows with Credential Manager
.............................................
15
Adding an account
............................................................................................
16
Removing an account
.......................................................................................
16
Using Single Sign On
.........................................................................................................
16
Registering a new application
...........................................................................
16
Using automatic registration
.............................................................
16
iii