HP Dx5150 HP ProtectTools Embedded Security Guide - Page 11
Emergency Recovery, Policies, Machine Policies, User Policies
UPC - 882780485433
View all HP Dx5150 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 11 highlights
HP ProtectTools Embedded Security Emergency Recovery The Emergency Recovery Archive, created by the administrator during Embedded Security setup, is a file that stores sensitive information about the computer, its users, and the private keys used to protect encrypted or private data. In the case of a system failure, this sensitive information is required to restore access to protected data. An Emergency Recovery Token, also created by the administrator during Embedded Security setup, is a file that stores the keys used to protect the data in the Emergency Recovery Archive. The token is required to access the archive. The access to the Emergency Recovery Token is protected by a password. This password is required in case the Embedded Security system needs to be restored. Policies Policies are rules that govern the behavior of a computer or software. The system administrator generally specifies security policies to ensure consistent use of Embedded Security within an organization. The two types of security policies are machine policies and user policies. Machine Policies Machine policies are rules governing the overall behavior of Embedded Security as it relates to a specific computer. User Policies User policies are rules governing the rights of the user of Embedded Security. For more information on machine and user security policies, refer to the HP ProtectTools Embedded Security Help. HP ProtectTools Embedded Security Guide www.hp.com 7