Table of contents
1
Introduction to security
..................................................................................................................................
1
HP ProtectTools features
.....................................................................................................................
2
HP ProtectTools security products description and common use examples
........................................
3
Credential Manager (Password Manager) for HP ProtectTools
..........................................
3
Embedded Security for HP ProtectTools
.............................................................................
4
Drive Encryption for HP ProtectTools
..................................................................................
4
File Sanitizer for HP ProtectTools
........................................................................................
5
Device Access Manager for HP ProtectTools
......................................................................
5
Privacy Manager for HP ProtectTools
.................................................................................
5
Computrace for HP ProtectTools (formerly known as LoJack Pro)
.....................................
6
Accessing HP ProtectTools Security
....................................................................................................
6
Achieving key security objectives
.........................................................................................................
6
Protecting against targeted theft
..........................................................................................
7
Restricting access to sensitive data
.....................................................................................
7
Preventing unauthorized access from internal or external locations
...................................
8
Creating strong password policies
.......................................................................................
8
Additional security elements
.................................................................................................................
9
Assigning security roles
.......................................................................................................
9
Managing HP ProtectTools passwords
................................................................................
9
Creating a secure password
.............................................................................
10
Backing up credentials and settings
..................................................................................
11
2
HP ProtectTools Security Manager Administrative Console
....................................................................
12
About HP ProtectTools Administrative Console
.................................................................................
12
Using the Administrative Console
......................................................................................................
12
Getting Started - Setup Wizard
..........................................................................................................
13
Configuring your system
.....................................................................................................................
13
Enabling security features
.................................................................................................
14
Defining Security Manager authentication policies
............................................................
14
Logon tab
..........................................................................................................
14
Session tab
.......................................................................................................
14
Defining Settings
................................................................................................................
15
Managing Users
.................................................................................................................
15
Adding a user
....................................................................................................
15
Removing a user
...............................................................................................
16
Checking user status
.........................................................................................
16
ENWW
v