HP Omni Pro 110 HP ProtectTools Security Software,Version 6.0 User Guide - Page 8

Embedded Security for HP ProtectTools, Device Access Manager for HP ProtectTools - manual

Page 8 highlights

Setting a shred schedule 44 Selecting or creating a shred profile 44 Selecting a predefined shred profile 44 Customizing an advanced security shred profile 45 Customizing a simple delete profile 45 General tasks ...46 Using a key sequence to initiate shredding 46 Using the File Sanitizer icon 46 Manually shredding one asset 47 Manually shredding all selected items 47 Manually activating free space bleaching 47 Aborting a shred or free space bleaching operation 48 Viewing the log files ...48 8 Embedded Security for HP ProtectTools ...49 Setup procedures ...49 Installing Embedded Security for HP ProtectTools (if necessary 49 Enabling the embedded security chip in Computer Setup 49 Initializing the embedded security chip 50 Setting up the basic user account 50 General tasks ...51 Using the Personal Secure Drive 51 Encrypting files and folders 51 Sending and receiving encrypted e-mail 51 Advanced tasks ...52 Backing up and restoring 52 Creating a backup file 52 Restoring certification data from the backup file 52 Changing the owner password 52 Resetting a user password 52 Migrating keys with the Migration Wizard 52 9 Device Access Manager for HP ProtectTools 53 Starting background service ...53 Simple configuration ...53 Device class configuration (advanced 54 Adding a user or a group 54 Removing a user or a group 54 Denying or allowing access to a user or group 54 Just In Time Authentication (JITA) Configuration 54 Creating a JITA for a user or group 55 viii ENWW

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74

Setting a shred schedule
...................................................................................................
44
Selecting or creating a shred profile
..................................................................................
44
Selecting a predefined shred profile
..................................................................................
44
Customizing an advanced security shred profile
...............................................................
45
Customizing a simple delete profile
...................................................................................
45
General tasks
.....................................................................................................................................
46
Using a key sequence to initiate shredding
.......................................................................
46
Using the File Sanitizer icon
..............................................................................................
46
Manually shredding one asset
...........................................................................................
47
Manually shredding all selected items
...............................................................................
47
Manually activating free space bleaching
..........................................................................
47
Aborting a shred or free space bleaching operation
..........................................................
48
Viewing the log files
...........................................................................................................
48
8
Embedded Security for HP ProtectTools
....................................................................................................
49
Setup procedures
...............................................................................................................................
49
Installing Embedded Security for HP ProtectTools (if necessary)
.....................................
49
Enabling the embedded security chip in Computer Setup
.................................................
49
Initializing the embedded security chip
..............................................................................
50
Setting up the basic user account
......................................................................................
50
General tasks
.....................................................................................................................................
51
Using the Personal Secure Drive
.......................................................................................
51
Encrypting files and folders
................................................................................................
51
Sending and receiving encrypted e-mail
............................................................................
51
Advanced tasks
..................................................................................................................................
52
Backing up and restoring
...................................................................................................
52
Creating a backup file
.......................................................................................
52
Restoring certification data from the backup file
...............................................
52
Changing the owner password
..........................................................................................
52
Resetting a user password
................................................................................................
52
Migrating keys with the Migration Wizard
..........................................................................
52
9
Device Access Manager for HP ProtectTools
............................................................................................
53
Starting background service
...............................................................................................................
53
Simple configuration
...........................................................................................................................
53
Device class configuration (advanced)
...............................................................................................
54
Adding a user or a group
...................................................................................................
54
Removing a user or a group
..............................................................................................
54
Denying or allowing access to a user or group
..................................................................
54
Just In Time Authentication (JITA) Configuration
...............................................................................
54
Creating a JITA for a user or group
...................................................................................
55
viii
ENWW