HP 6930p ProtectTools (Select Models Only) - Windows 7 - Page 3

Table of contents

Page 3 highlights

Table of contents 1 Introduction to security HP ProtectTools features ...2 Accessing HP ProtectTools Security ...4 Achieving key security objectives ...6 Protecting against targeted theft 6 Restricting access to sensitive data 6 Preventing unauthorized access from internal or external locations 6 Creating strong password policies 7 Additional security elements ...8 Assigning security roles ...8 Managing HP ProtectTools passwords 8 Creating a secure password 10 Backing up and restoring HP ProtectTools credentials 10 Backing up credentials and settings 10 2 Credential Manager for HP ProtectTools Setup procedures ...12 Logging on to Credential Manager 12 Using the Credential Manager Logon Wizard 12 Registering credentials ...12 Registering fingerprints 12 Setting up the fingerprint reader 13 Using your registered fingerprint to log on to Windows 13 Registering a Smart Card or Token 13 Registering other credentials 14 General tasks ...15 Creating a virtual token ...15 Changing the Windows logon password 15 Changing a token PIN ...15 Locking the computer (workstation 17 Using Windows Logon ...17 Logging on to Windows with Credential Manager 17 Using Single Sign On ...18 Registering a new application 18 Using automatic registration 18 Using manual (drag and drop) registration 19 Managing applications and credentials 19 Modifying application properties 19 Removing an application from Single Sign On 19 iii

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108

Table of contents
1
Introduction to security
HP ProtectTools features
.....................................................................................................................
2
Accessing HP ProtectTools Security
....................................................................................................
4
Achieving key security objectives
.........................................................................................................
6
Protecting against targeted theft
..........................................................................................
6
Restricting access to sensitive data
.....................................................................................
6
Preventing unauthorized access from internal or external locations
...................................
6
Creating strong password policies
.......................................................................................
7
Additional security elements
.................................................................................................................
8
Assigning security roles
.......................................................................................................
8
Managing HP ProtectTools passwords
...............................................................................
8
Creating a secure password
.............................................................................
10
Backing up and restoring HP ProtectTools credentials
.....................................................
10
Backing up credentials and settings
..................................................................
10
2
Credential Manager for HP ProtectTools
Setup procedures
...............................................................................................................................
12
Logging on to Credential Manager
....................................................................................
12
Using the Credential Manager Logon Wizard
..................................................
12
Registering credentials
......................................................................................................
12
Registering fingerprints
....................................................................................
12
Setting up the fingerprint reader
.......................................................
13
Using your registered fingerprint to log on to Windows
....................
13
Registering a Smart Card or Token
..................................................................
13
Registering other credentials
............................................................................
14
General tasks
.....................................................................................................................................
15
Creating a virtual token
......................................................................................................
15
Changing the Windows logon password
............................................................................
15
Changing a token PIN
........................................................................................................
15
Locking the computer (workstation)
...................................................................................
17
Using Windows Logon
.......................................................................................................
17
Logging on to Windows with Credential Manager
.............................................
17
Using Single Sign On
.........................................................................................................
18
Registering a new application
..........................................................................
18
Using automatic registration
............................................................
18
Using manual (drag and drop) registration
......................................
19
Managing applications and credentials
.............................................................
19
Modifying application properties
......................................................
19
Removing an application from Single Sign On
.................................
19
iii