Table of contents
1
Introduction to security
HP ProtectTools features
.....................................................................................................................
2
Accessing HP ProtectTools Security
....................................................................................................
4
Achieving key security objectives
.........................................................................................................
5
Protecting against targeted theft
..........................................................................................
5
Restricting access to sensitive data
.....................................................................................
5
Preventing unauthorized access from internal or external locations
...................................
6
Creating and using strong passwords
.................................................................................
6
Additional security elements
.................................................................................................................
7
Assigning security roles
.......................................................................................................
7
Managing HP ProtectTools passwords
................................................................................
7
Creating a secure password
...............................................................................
8
HP ProtectTools Backup and Restore
.................................................................................
9
Backing up credentials and settings
....................................................................
9
Restoring credentials
........................................................................................
10
Configuring settings
..........................................................................................
10
2
Credential Manager for HP ProtectTools
Setup procedures
...............................................................................................................................
12
Logging on to Credential Manager
....................................................................................
12
Using the Credential Manager Logon Wizard
...................................................
12
Logging on for the first time
...............................................................................
12
Registering credentials
......................................................................................................
12
Registering fingerprints
.....................................................................................
12
Setting up the fingerprint reader
.......................................................
13
Using your registered fingerprint to log on to Windows
....................
13
Registering a Java Card, USB eToken, or virtual token
....................................
13
Registering a USB eToken
................................................................................
13
Registering other credentials
............................................................................
13
General tasks
.....................................................................................................................................
14
Creating a virtual token
......................................................................................................
14
Changing the Windows logon password
............................................................................
14
Changing a token PIN
........................................................................................................
14
Managing identity
...............................................................................................................
15
Clearing an identity from the system
.................................................................
15
Locking the computer
........................................................................................................
15
Using Windows Logon
.......................................................................................................
15
Logging on to Windows with Credential Manager
.............................................
15
Adding an account
............................................................................................
16
Removing an account
.......................................................................................
16
Using Single Sign On
.........................................................................................................
16
Registering a new application
...........................................................................
16
Using automatic registration
.............................................................
16
iii