HP 8530p HP ProtectTools - Windows Vista and Windows XP - Page 6

Device Access Manager for HP ProtectTools select models only, Troubleshooting, Glossary, Index - reset

Page 6 highlights

Setup procedures ...69 Enabling the embedded security chip 69 Initializing the embedded security chip 70 Setting up the basic user account 70 General tasks ...71 Using the Personal Secure Drive 71 Encrypting files and folders 71 Sending and receiving encrypted e-mail 71 Changing the Basic User Key password 72 Advanced tasks ...72 Backing up and restoring 72 Creating a backup file 72 Restoring certification data from the backup file 72 Changing the owner password 73 Resetting a user password 73 Enabling and disabling Embedded Security 73 Permanently disabling Embedded Security 73 Enabling Embedded Security after permanent disable 73 Migrating keys with the Migration Wizard 74 8 Device Access Manager for HP ProtectTools (select models only) Starting background service ...75 Simple configuration ...76 Device class configuration (advanced 77 Adding a user or a group 77 Removing a user or a group 77 Denying access to a user or group 77 Allowing access to a device class for one user of a group 77 Allowing access to a specific device for one user of a group 78 9 Troubleshooting Credential Manager for HP ProtectTools 79 Embedded Security for HP ProtectTools (select models only 82 Device Access Manager for HP ProtectTools 88 Miscellaneous ...89 Glossary ...92 Index ...96 vi

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106

Setup procedures
...............................................................................................................................
69
Enabling the embedded security chip
...............................................................................
69
Initializing the embedded security chip
.............................................................................
70
Setting up the basic user account
......................................................................................
70
General tasks
.....................................................................................................................................
71
Using the Personal Secure Drive
.......................................................................................
71
Encrypting files and folders
................................................................................................
71
Sending and receiving encrypted e-mail
............................................................................
71
Changing the Basic User Key password
..........................................................................
72
Advanced tasks
..................................................................................................................................
72
Backing up and restoring
...................................................................................................
72
Creating a backup file
......................................................................................
72
Restoring certification data from the backup file
...............................................
72
Changing the owner password
..........................................................................................
73
Resetting a user password
................................................................................................
73
Enabling and disabling Embedded Security
......................................................................
73
Permanently disabling Embedded Security
......................................................
73
Enabling Embedded Security after permanent disable
.....................................
73
Migrating keys with the Migration Wizard
..........................................................................
74
8
Device Access Manager for HP ProtectTools (select models only)
Starting background service
...............................................................................................................
75
Simple configuration
...........................................................................................................................
76
Device class configuration (advanced)
...............................................................................................
77
Adding a user or a group
...................................................................................................
77
Removing a user or a group
..............................................................................................
77
Denying access to a user or group
....................................................................................
77
Allowing access to a device class for one user of a group
................................................
77
Allowing access to a specific device for one user of a group
............................................
78
9
Troubleshooting
Credential Manager for HP ProtectTools
...........................................................................................
79
Embedded Security for HP ProtectTools (select models only)
...........................................................
82
Device Access Manager for HP ProtectTools
....................................................................................
88
Miscellaneous
.....................................................................................................................................
89
Glossary
.............................................................................................................................................................
92
Index
...................................................................................................................................................................
96
vi