HP ProBook 6565b HP ProtectTools Getting Started - Windows 7 and Windows Vista - Page 121
Basic User Key password, Drive Encryption for HP
View all HP ProBook 6565b manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 121 highlights
revoking 56 setting a default 55 setting up 54 viewing details 55 Drive Encryption for HP ProtectTools activating 44 backup and recovery 50 deactivating 44 decrypting individual drives 49 encrypting individual drives 49 logging in after Drive Encryption is activated 44 managing Drive Encryption 49 E e-mail message sealing for Trusted Contacts 61 signing 60 viewing sealed message 61 e-mailing encrypted Microsoft Office document 64 Embedded Security for HP ProtectTools backup file, creating 99 basic user account 96 Basic User Key 96 Basic User Key password, changing 98 certification data, restoring 99 enabling TPM chip 94 encrypted e-mail 97 encrypting files and folders 97 initializing chip 95 migrating keys 101 owner password, changing 100 personal secure drive 97 resetting user password 100 setup procedures 94 emergency recovery 95 emergency recovery token password, setting 95 enabling TPM chip 94 encrypted documents, e-mailing 64 encrypting drives 42 encrypting files and folders 97 encrypting hard drive 48, 49 encryption hardware 44, 46 removing 64 software 44, 46, 49 encryption key backing up 50 recovering 50 encryption status, displaying 48 enrolling fingerprints 34 scenes 36 eSATA 90 Excel, adding signature line 62 excluding assets from automatic deleting 75 F face settings 21 features, HP ProtectTools 2 File Sanitizer for HP ProtectTools opening 71 setup procedures 72 fingerprints settings 20 fingerprints, enrolling 34 free space bleaching 72 G General tab, settings 22 getting started 81 group allowing access 84 denying access 84 removing 86 H hardware encryption 44, 45, 46 HP ProtectTools Administrative Console 15 HP ProtectTools Administrative Console, opening 16 HP ProtectTools features 2 HP ProtectTools Security Manager 23 HP ProtectTools Security Manager Backup and Recovery password 10 I icon, using 77 ID card 39 importing, third-party certificate 54 initializing embedded security chip 95 J JITA creating extendable for user or group 87 creating for user or group 87 disabling for user or group 88 JITA Configuration 86 Just-in-time authentication Configuration 86 K key security objectives 8 key sequence 76 L log files, viewing 78 logging in to the computer 46 logons adding 28 categories 30 editing 29 managing 30 menu 30 M management tools 22 managing credentials 33 encrypting or decrypting drives 49 passwords 27, 28 managing passwords 22 managing users 19 manually shredding all selected items 77 one asset 77 messages 22 Microsoft Excel, adding signature line 62 Microsoft Office document e-mailing encrypted 64 encrypting 63 removing encryption 64 signing 62 Index 113