HP ProBook 6360b HP ProtectTools Getting Started - Windows 7 and Windows Vista - Page 7

Device Access Manager for HP ProtectTools select models only, Theft recovery - specification

Page 7 highlights

8 Device Access Manager for HP ProtectTools (select models only 79 Opening Device Access Manager ...80 Setup Procedures ...81 Configuring device access 81 Simple Configuration 81 Starting the background service 82 Device Class Configuration 82 Denying access to a user or group 84 Allowing access for a user or a group 84 Allowing access to a class of devices for one user of a group ......... 85 Allowing access to a specific device for one user of a group 85 Removing settings for a user or a group 86 Resetting the configuration 86 JITA Configuration 86 Creating a JITA for a user or group 87 Creating an extendable JITA for a user or group 87 Disabling a JITA for a user or group 88 Advanced Settings ...89 Device Administrators group 89 eSATA Support ...90 Unmanaged Device Classes 90 9 Theft recovery ...92 10 Embedded Security for HP ProtectTools (select models only 93 Setup procedures ...94 Enabling the embedded security chip in Computer Setup 94 Initializing the embedded security chip 95 Setting up the basic user account 96 General tasks ...97 Using the personal secure drive 97 Encrypting files and folders 97 Sending and receiving encrypted e-mail 97 Changing the Basic User Key password 98 Advanced tasks ...99 Backing up and restoring 99 Creating a backup file 99 Restoring certification data from the backup file 99 Changing the owner password 100 Resetting a user password 100 vii

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124

8
Device Access Manager for HP ProtectTools (select models only)
.........................................................
79
Opening Device Access Manager
......................................................................................................
80
Setup Procedures
...............................................................................................................................
81
Configuring device access
.................................................................................................
81
Simple Configuration
.........................................................................................
81
Starting the background service
.......................................................
82
Device Class Configuration
...............................................................................
82
Denying access to a user or group
...................................................
84
Allowing access for a user or a group
..............................................
84
Allowing access to a class of devices for one user of a group
.........
85
Allowing access to a specific device for one user of a group
...........
85
Removing settings for a user or a group
..........................................
86
Resetting the configuration
...............................................................
86
JITA Configuration
............................................................................................
86
Creating a JITA for a user or group
..................................................
87
Creating an extendable JITA for a user or group
.............................
87
Disabling a JITA for a user or group
.................................................
88
Advanced Settings
.............................................................................................................................
89
Device Administrators group
..............................................................................................
89
eSATA Support
..................................................................................................................
90
Unmanaged Device Classes
.............................................................................................
90
9
Theft recovery
...............................................................................................................................................
92
10
Embedded Security for HP ProtectTools (select models only)
..............................................................
93
Setup procedures
...............................................................................................................................
94
Enabling the embedded security chip in Computer Setup
.................................................
94
Initializing the embedded security chip
..............................................................................
95
Setting up the basic user account
......................................................................................
96
General tasks
.....................................................................................................................................
97
Using the personal secure drive
........................................................................................
97
Encrypting files and folders
................................................................................................
97
Sending and receiving encrypted e-mail
............................................................................
97
Changing the Basic User Key password
...........................................................................
98
Advanced tasks
..................................................................................................................................
99
Backing up and restoring
...................................................................................................
99
Creating a backup file
.......................................................................................
99
Restoring certification data from the backup file
...............................................
99
Changing the owner password
........................................................................................
100
Resetting a user password
..............................................................................................
100
vii