8
Device Access Manager for HP ProtectTools (select models only)
.........................................................
79
Opening Device Access Manager
......................................................................................................
80
Setup Procedures
...............................................................................................................................
81
Configuring device access
.................................................................................................
81
Simple Configuration
.........................................................................................
81
Starting the background service
.......................................................
82
Device Class Configuration
...............................................................................
82
Denying access to a user or group
...................................................
84
Allowing access for a user or a group
..............................................
84
Allowing access to a class of devices for one user of a group
.........
85
Allowing access to a specific device for one user of a group
...........
85
Removing settings for a user or a group
..........................................
86
Resetting the configuration
...............................................................
86
JITA Configuration
............................................................................................
86
Creating a JITA for a user or group
..................................................
87
Creating an extendable JITA for a user or group
.............................
87
Disabling a JITA for a user or group
.................................................
88
Advanced Settings
.............................................................................................................................
89
Device Administrators group
..............................................................................................
89
eSATA Support
..................................................................................................................
90
Unmanaged Device Classes
.............................................................................................
90
9
Theft recovery
...............................................................................................................................................
92
10
Embedded Security for HP ProtectTools (select models only)
..............................................................
93
Setup procedures
...............................................................................................................................
94
Enabling the embedded security chip in Computer Setup
.................................................
94
Initializing the embedded security chip
..............................................................................
95
Setting up the basic user account
......................................................................................
96
General tasks
.....................................................................................................................................
97
Using the personal secure drive
........................................................................................
97
Encrypting files and folders
................................................................................................
97
Sending and receiving encrypted e-mail
............................................................................
97
Changing the Basic User Key password
...........................................................................
98
Advanced tasks
..................................................................................................................................
99
Backing up and restoring
...................................................................................................
99
Creating a backup file
.......................................................................................
99
Restoring certification data from the backup file
...............................................
99
Changing the owner password
........................................................................................
100
Resetting a user password
..............................................................................................
100
vii