HP dc73 Service Reference Guide - HP Compaq dc7800 Business PC - Page 38

HP ProtectTools Security Manager, Device Access Manager for HP ProtectTools

Page 38 highlights

● Remotely configure BIOS and security settings ● Automate processes to quickly resolve hardware problems Tight integration with HP Instant Support tools reduces hardware troubleshooting time. ● Diagnostics-remotely run & view reports on HP desktop, notebook, and workstation models ● System Health Scan-check for known hardware issues in your installed base of HP client systems ● Active Chat-connect to HP customer support to resolve issues ● HP Knowledgebase-link to expert information ● Automated SoftPaq collection and delivery process for fast resolution of hardware problems ● Identify, inventory, and initialize systems with HP ProtectTools embedded security chip ● Option for health alerts to display locally on the client system ● Report basic inventory information for non-HP clients ● Setup and configure TPM security chip ● Centrally schedule client backup and recovery ● Add on support for managing Intel AMT For more information on HP Client Manager, visit http://www.hp.com/go/clientmanager. HP ProtectTools Security Manager HP ProtectTools Security Manager software provides security features that help protect against unauthorized access to the computer, networks, and critical data. Enhanced security functionality is provided by the following modules: ● Embedded Security for HP ProtectTools ● BIOS Configuration for HP ProtectTools ● Credential Manager for HP ProtectTools ● Java Card for HP ProtectTools ● Drive Encryption for HP ProtectTools ● Device Access Manager for HP ProtectTools The modules available for your computer may vary depending on your model. For example, Embedded Security for HP ProtectTools requires that the Trusted Platform Module (TPM) embedded security chip (some models only) be installed on your computer, and Java Card for HP ProtectTools requires an optional smart card keyboard. All HP ProtectTools modules are included on every platform with the exception of Embedded Security and Drive Encryption. Visit http://www.hp.com/products/security for more information. 26 Chapter 4 Desktop Management

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276

Remotely configure BIOS and security settings
Automate processes to quickly resolve hardware problems
Tight integration with HP Instant Support tools reduces hardware troubleshooting time.
Diagnostics—remotely run & view reports on HP desktop, notebook, and workstation models
System Health Scan—check for known hardware issues in your installed base of HP client systems
Active Chat—connect to HP customer support to resolve issues
HP Knowledgebase—link to expert information
Automated SoftPaq collection and delivery process for fast resolution of hardware problems
Identify, inventory, and initialize systems with HP ProtectTools embedded security chip
Option for health alerts to display locally on the client system
Report basic inventory information for non-HP clients
Setup and configure TPM security chip
Centrally schedule client backup and recovery
Add on support for managing Intel AMT
For more information on HP Client Manager, visit
go/clientmanager
.
HP ProtectTools Security Manager
HP ProtectTools Security Manager software provides security features that help protect against
unauthorized access to the computer, networks, and critical data. Enhanced security functionality is
provided by the following modules:
Embedded Security for HP ProtectTools
BIOS Configuration for HP ProtectTools
Credential Manager for HP ProtectTools
Java Card for HP ProtectTools
Drive Encryption for HP ProtectTools
Device Access Manager for HP ProtectTools
The modules available for your computer may vary depending on your model. For example, Embedded
Security for HP ProtectTools requires that the Trusted Platform Module (TPM) embedded security chip
(some models only) be installed on your computer, and Java Card for HP ProtectTools requires an
optional smart card keyboard.
All HP ProtectTools modules are included on every platform with the exception of Embedded Security
and Drive Encryption. Visit
products/security
for more information.
26
Chapter 4
Desktop Management