Setting a shred schedule
...................................................................................................
44
Selecting or creating a shred profile
..................................................................................
44
Selecting a predefined shred profile
..................................................................................
44
Customizing an advanced security shred profile
...............................................................
45
Customizing a simple delete profile
...................................................................................
45
General tasks
.....................................................................................................................................
46
Using a key sequence to initiate shredding
.......................................................................
46
Using the File Sanitizer icon
..............................................................................................
46
Manually shredding one asset
...........................................................................................
47
Manually shredding all selected items
...............................................................................
47
Manually activating free space bleaching
..........................................................................
47
Aborting a shred or free space bleaching operation
..........................................................
48
Viewing the log files
...........................................................................................................
48
8
Embedded Security for HP ProtectTools
....................................................................................................
49
Setup procedures
...............................................................................................................................
49
Installing Embedded Security for HP ProtectTools (if necessary)
.....................................
49
Enabling the embedded security chip in Computer Setup
.................................................
49
Initializing the embedded security chip
..............................................................................
50
Setting up the basic user account
......................................................................................
50
General tasks
.....................................................................................................................................
51
Using the Personal Secure Drive
.......................................................................................
51
Encrypting files and folders
................................................................................................
51
Sending and receiving encrypted e-mail
............................................................................
51
Advanced tasks
..................................................................................................................................
52
Backing up and restoring
...................................................................................................
52
Creating a backup file
.......................................................................................
52
Restoring certification data from the backup file
...............................................
52
Changing the owner password
..........................................................................................
52
Resetting a user password
................................................................................................
52
Migrating keys with the Migration Wizard
..........................................................................
52
9
Device Access Manager for HP ProtectTools
............................................................................................
53
Starting background service
...............................................................................................................
53
Simple configuration
...........................................................................................................................
53
Device class configuration (advanced)
...............................................................................................
54
Adding a user or a group
...................................................................................................
54
Removing a user or a group
..............................................................................................
54
Denying or allowing access to a user or group
..................................................................
54
Just In Time Authentication (JITA) Configuration
...............................................................................
54
Creating a JITA for a user or group
...................................................................................
55
viii
ENWW