HP Pro 3130 User Guide - HP ProtectTools - Page 10
HP ProtectTools features
View all HP Pro 3130 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 10 highlights
HP ProtectTools features The following table details the key features of HP ProtectTools for Small Business modules: Module HP ProtectTools Security Manager Administrative Console HP ProtectTools Security Manager (for general users) Credential Manager for HP ProtectTools (Password Manager) Drive Encryption for HP ProtectTools Key features ● The Security Manager setup wizard is used by administrators to set up and configure levels of security and security logon methods. ● Configure options hidden from basic users. ● Configure Device Access Manager configurations and user access. ● Administrator tools are used to add and remove HP ProtectTools users and view user status. ● Organize, set up and change user names and passwords. ● Configure and change user credentials such as Windows password and Smart Card. ● Configure and change File Sanitizer Shred, Bleaching, and Settings. ● View settings for Device Access Manager. ● Configure Preferences and Backup and Restore options. ● Is designed to save, organize, and protect your user names and passwords. ● Allows you to set up the logon screens of websites and programs for quick and secure access. ● As you access various websites and you want to save your user name and passwords, enter them into Password Manager so that you won't have to remember them again. The next time you visit this site, Password Manager will fill in and submit the data automatically. ● Allows you to create stronger passwords that you don't have to write down or remember, and keeps your accounts more secure. ● Provides complete, full-volume hard drive encryption. ● Forces pre-boot authentication in order to decrypt and access the data on the hard drive. ● Helps you comply with legal or industry requirements for protecting confidential and sensitive data. ● Protects your data from unauthorized access by encrypting the entire hard drive. If the PC is ever stolen and the drive is removed from the original system and placed in a different system, the data will not be compromised. 2 Chapter 1 Introduction to security ENWW