HP 2 Base Model manual Privacy Manager for HP ProtectTools

Page 14

Privacy Manager for HP ProtectTools

Privacy Manager for HP ProtectTools is used when Internet e-mail communications need to be secured. The user can create and send e-mail that can only be opened by an authenticated recipient. With Privacy Manager, the information cannot be compromised or intercepted by an imposter.

Example 1: A stock broker wants to make sure that his e-mails only go to specific clients and that no one can fake the e-mail account and intercept it. The stock broker signs himself and his clients up with Privacy Manager. Privacy Manager issues them a Certificate of Authentication (CA) to each user. Using this tool, the stock broker and his clients must authenticate before the e-mail is exchanged.

Privacy Manager for HP ProtectTools makes it easy to send and receive e-mail where the recipient has been verified and authenticated. The mail service can also be encrypted. The encryption process is similar to the one used during general credit card purchases on the Internet.

Example 2: A CEO wants to ensure that only the members of the board of directors can view the information he sends through e-mail. The CEO uses the option to encrypt the e-mail sent and received from the directors. A Privacy Manager Certificate of Authentication allows the CEO and directors to have a copy of the encryption key so only they can decrypt the confidential e-mail.

Computrace for HP ProtectTools (formerly LoJack Pro)

Computrace for HP ProtectTools (purchased separately) is a service that can track the location of a stolen computer whenever the user accesses the Internet.

Example 1: A school principal instructed the IT department to keep track of all the computers at his school. After the inventory of the computers was made, the IT administrator registered all the computers with Computrace so they could be traced in case they were ever stolen. Recently, the school realized several computers were missing, so the IT administrator alerted the authorities and Computrace officials. The computers were located and were returned to the school by the authorities.

Computrace for HP ProtectTools can also help remotely manage and locate computers, as well as monitor computer usage and applications.

Example 2: A real estate company needs to manage and update computers all over the world. They use Computrace to monitor and update the computers without having to send an IT person to each computer.

Embedded Security for HP ProtectTools (select models only)

Embedded Security for HP ProtectTools provides the ability to create a personal secure drive. This capability allows the user to create a virtual drive partition on the PC that is completely hidden until accessed. Embedded Security could be used anywhere data needs to be secretly protected, while the rest of the data is not encrypted.

Example 1: A warehouse manager has a computer that multiple workers access intermittently throughout the day. The manager wants to encrypt and hide confidential warehouse data on the computer. He wants the data to be so secure that even if someone steals the hard drive, they cannot decrypt the data or read it. The warehouse manager decides to activate Embedded Security and moves the confidential data to the personal secure drive. The warehouse manager can enter a password and access the confidential data just like another hard drive. When he logs off or reboots the personal secure drive, it cannot be seen or opened without the proper password. The workers never see the confidential data when they access the computer.

Embedded Security protects encryption keys within a hardware TPM (Trusted Platform Module) chip located on the motherboard. It is the only encryption tool that meets the minimum requirements to

6

Chapter 1 Introduction to security

Image 14
Contents HP ProtectTools First Edition January Document Part Number Table of contents HP ProtectTools Security Manager Drive Encryption for HP ProtectTools select models only File Sanitizer for HP ProtectTools 100 112 102107 Application Features Introduction to securityHP ProtectTools features Module Key featuresHP ProtectTools features Credential Manager for HP ProtectTools Drive Encryption for HP ProtectToolsDevice Access Manager for HP ProtectTools File Sanitizer for HP ProtectToolsEmbedded Security for HP ProtectTools select models only Privacy Manager for HP ProtectToolsComputrace for HP ProtectTools formerly LoJack Pro Page Protecting against targeted theft Restricting access to sensitive dataAchieving key security objectives Creating strong password policies Assigning security roles Managing HP ProtectTools passwordsAdditional security elements Additional security elements Creating a secure password Backing up and restoring HP ProtectTools credentialsGetting started with the Setup Wizard Page HP ProtectTools Security Manager Administrative Console Opening HP ProtectTools Administrative Console Using Administrative Console Security Users CredentialsLogon Policy Configuring your systemSetting up authentication for your computer Session Policy SettingsManaging users Fingerprints CredentialsSpareKey Smart card FaceGeneral tab Configuring your applicationsUpdates and Messages Applications tabHP ProtectTools Security Manager Opening Security Manager Using the Security Manager dashboard Blue-OK Security Applications StatusHP ProtectTools desktop gadget Password Manager My LogonsAdding logons Editing logons Managing your logons Using the Logons menuOrganizing logons into categories Assessing your password strength Password Manager icon settingsClick Continue VeriSign Identity Protection VIPClick Add Logon Credential Manager SettingsChanging your Windows password Setting up your SpareKey Enrolling your fingerprintsUnder Central Management, click Setup Wizard Setting up a smart cardClick the Administration tab Initializing the smart cardConfiguring the smart card Enrolling scenes for face logonAdvanced User Settings Click Create PINClick OK HP ProtectTools Security Manager Fingerprint tab Setting your preferencesYour personal ID card Click Back up data Backing up and restoring your dataShow scan quality feedback Click Restore data Drive Encryption for HP ProtectTools select models only Opening Drive Encryption Activating Drive Encryption for standard hard drives Click FeaturesGeneral tasks Activating Drive Encryption for self-encrypting drivesSoftware encryption Hardware encryptionDeactivating Drive Encryption Logging in after Drive Encryption is activatedUSB readers Smart cardsPcmcia readers Displaying encryption status Click SettingsProtect your data by encrypting your hard drive Under My Data, click Drive EncryptionManaging Drive Encryption administrator task Advanced tasksBacking up encryption keys Backup and recovery administrator taskRecovering encryption keys Privacy Manager for HP ProtectTools select models only Opening Privacy Manager Requesting a Privacy Manager Certificate Setup proceduresManaging Privacy Manager Certificates Click Request a Privacy Manager CertificateSetting up a Privacy Manager Certificate Importing a third-party certificateRenewing a Privacy Manager Certificate Setting a default Privacy Manager CertificateViewing Privacy Manager Certificate details Click Certificate detailsRevoking your Privacy Manager Certificate Deleting a Privacy Manager CertificateRestoring a Privacy Manager Certificate Click AdvancedAdding a Trusted Contact Managing Trusted ContactsAdding Trusted Contacts Adding Trusted Contacts using Microsoft Outlook contacts Checking revocation status for a Trusted Contact Viewing Trusted Contact detailsDeleting a Trusted Contact Signing and sending an e-mail message Using Privacy Manager in Microsoft OutlookConfiguring Privacy Manager for Microsoft Outlook Viewing a sealed e-mail message Using Privacy Manager in a Microsoft Office 2007 documentSealing and sending an e-mail message Configuring Privacy Manager for Microsoft Office Signing a Microsoft Office documentEncrypting a Microsoft Office document Adding a suggested signers signature lineViewing a signed Microsoft Office document Removing encryption from a Microsoft Office documentSending an encrypted Microsoft Office document Viewing an encrypted Microsoft Office document Backing up Privacy Manager Certificates and Trusted Contacts Restoring Privacy Manager Certificates and Trusted ContactsCentral administration of Privacy Manager File Sanitizer for HP ProtectTools Shredding Free space bleaching Opening File Sanitizer Setting a shred schedule Setting a free space bleaching scheduleCustomizing a shred profile Selecting or creating a shred profileSelecting a predefined shred profile High Security Medium Security Low SecurityCustomizing a simple delete profile Page Using a key sequence to initiate shredding Manually shredding all selected items Using the File Sanitizer iconManually shredding one asset Viewing the log files Manually activating free space bleachingAborting a shred or free space bleaching operation Click Bleach NowDevice Access Manager for HP ProtectTools select models only Opening Device Access Manager Configuring device access Simple ConfigurationDevice Class Configuration Starting the background servicePage Device class All devices Individual device Denying access to a user or groupAllowing access for a user or a group Allowing access to a specific device for one user of a group Resetting the configuration Jita ConfigurationRemoving settings for a user or a group Creating a Jita for a user or group Creating an extendable Jita for a user or groupDisabling a Jita for a user or group Advanced Settings Device Administrators groupESATA Support Unmanaged Device ClassesPage Theft recovery Go to https//cc.absolute.comEmbedded Security for HP ProtectTools select models only Enabling the embedded security chip in Computer Setup Initializing the embedded security chip Setting up the basic user account Sending and receiving encrypted e-mail Using the personal secure driveEncrypting files and folders Changing the Basic User Key password Backing up and restoring Creating a backup fileRestoring certification data from the backup file Changing the owner password Resetting a user passwordMigrating keys with the Migration Wizard Localized password exceptions Page Bios Special key handlingBios What to do when a password is rejected Glossary Emergency recovery archive Cryptographic service provider CSPDevice access control policy CryptographyFingerprint Power-on authenticationEncryption File System EFS Free space bleachingRevocation password RebootRestore Sata device modeToken Windows administratorSuggested signer Trusted ContactIndex Jita FacePage
Related manuals
Manual 87 pages 16.32 Kb