HP 2 Base Model manual Achieving key security objectives, Protecting against targeted theft

Page 16

Achieving key security objectives

The HP ProtectTools modules can work together to provide solutions for a variety of security issues, including the following key security objectives:

Protecting against targeted theft

Restricting access to sensitive data

Preventing unauthorized access from internal or external locations

Creating strong password policies

Protecting against targeted theft

An example of targeted theft would be the theft of a computer containing confidential data and customer information at an airport security checkpoint. The following features help protect against targeted theft:

The pre-boot authentication feature, if enabled, helps prevent access to the operating system. Refer to the following chapters:

Security Manager for HP ProtectTools

Embedded Security for HP ProtectTools

Drive Encryption for HP ProtectTools

The Personal Secure Drive feature, provided by the Embedded Security for HP ProtectTools module, encrypts sensitive data to help ensure that it cannot be accessed without authentication. Refer to the following chapter:

Embedded Security for HP ProtectTools

Computrace can track the computer's location after a theft. Refer to the following chapter:

Computrace for HP ProtectTools

Restricting access to sensitive data

Suppose a contract auditor is working onsite and has been given computer access to review sensitive financial data; you do not want the auditor to be able to print the files or save them to a writable device such as a CD. The following feature helps restrict access to data:

Device Access Manager for HP ProtectTools allows IT managers to restrict access to writable devices so sensitive information cannot be printed or copied from the hard drive onto removable media.

Preventing unauthorized access from internal or external locations

Unauthorized access to an unsecured business computer presents a very real risk to corporate network resources such as information from financial services, an executive, or the R&D team, and to

8

Chapter 1 Introduction to security

Image 16
Contents HP ProtectTools First Edition January Document Part Number Table of contents HP ProtectTools Security Manager Drive Encryption for HP ProtectTools select models only File Sanitizer for HP ProtectTools 100 107 102112 Application Features Introduction to securityHP ProtectTools features Module Key featuresHP ProtectTools features Credential Manager for HP ProtectTools Drive Encryption for HP ProtectToolsDevice Access Manager for HP ProtectTools File Sanitizer for HP ProtectToolsComputrace for HP ProtectTools formerly LoJack Pro Privacy Manager for HP ProtectToolsEmbedded Security for HP ProtectTools select models only Page Achieving key security objectives Restricting access to sensitive dataProtecting against targeted theft Creating strong password policies Additional security elements Managing HP ProtectTools passwordsAssigning security roles Additional security elements Creating a secure password Backing up and restoring HP ProtectTools credentialsGetting started with the Setup Wizard Page HP ProtectTools Security Manager Administrative Console Opening HP ProtectTools Administrative Console Using Administrative Console Security Users CredentialsSetting up authentication for your computer Configuring your systemLogon Policy Managing users SettingsSession Policy SpareKey CredentialsFingerprints Smart card FaceConfiguring your applications Updates and MessagesGeneral tab Applications tabHP ProtectTools Security Manager Opening Security Manager Using the Security Manager dashboard HP ProtectTools desktop gadget Security Applications StatusBlue-OK Password Manager My LogonsAdding logons Editing logons Organizing logons into categories Using the Logons menuManaging your logons Assessing your password strength Password Manager icon settingsClick Add Logon VeriSign Identity Protection VIPClick Continue Changing your Windows password SettingsCredential Manager Setting up your SpareKey Enrolling your fingerprintsSetting up a smart card Click the Administration tabUnder Central Management, click Setup Wizard Initializing the smart cardConfiguring the smart card Enrolling scenes for face logonAdvanced User Settings Click Create PINClick OK HP ProtectTools Security Manager Your personal ID card Setting your preferencesFingerprint tab Show scan quality feedback Backing up and restoring your dataClick Back up data Click Restore data Drive Encryption for HP ProtectTools select models only Opening Drive Encryption Click Features General tasksActivating Drive Encryption for standard hard drives Activating Drive Encryption for self-encrypting drivesSoftware encryption Hardware encryptionDeactivating Drive Encryption Logging in after Drive Encryption is activatedPcmcia readers Smart cardsUSB readers Click Settings Protect your data by encrypting your hard driveDisplaying encryption status Under My Data, click Drive EncryptionManaging Drive Encryption administrator task Advanced tasksRecovering encryption keys Backup and recovery administrator taskBacking up encryption keys Privacy Manager for HP ProtectTools select models only Opening Privacy Manager Setup procedures Managing Privacy Manager CertificatesRequesting a Privacy Manager Certificate Click Request a Privacy Manager CertificateSetting up a Privacy Manager Certificate Importing a third-party certificateSetting a default Privacy Manager Certificate Viewing Privacy Manager Certificate detailsRenewing a Privacy Manager Certificate Click Certificate detailsDeleting a Privacy Manager Certificate Restoring a Privacy Manager CertificateRevoking your Privacy Manager Certificate Click AdvancedAdding Trusted Contacts Managing Trusted ContactsAdding a Trusted Contact Adding Trusted Contacts using Microsoft Outlook contacts Deleting a Trusted Contact Viewing Trusted Contact detailsChecking revocation status for a Trusted Contact Configuring Privacy Manager for Microsoft Outlook Using Privacy Manager in Microsoft OutlookSigning and sending an e-mail message Sealing and sending an e-mail message Using Privacy Manager in a Microsoft Office 2007 documentViewing a sealed e-mail message Configuring Privacy Manager for Microsoft Office Signing a Microsoft Office documentEncrypting a Microsoft Office document Adding a suggested signers signature lineSending an encrypted Microsoft Office document Removing encryption from a Microsoft Office documentViewing a signed Microsoft Office document Viewing an encrypted Microsoft Office document Backing up Privacy Manager Certificates and Trusted Contacts Restoring Privacy Manager Certificates and Trusted ContactsCentral administration of Privacy Manager File Sanitizer for HP ProtectTools Shredding Free space bleaching Opening File Sanitizer Setting a shred schedule Setting a free space bleaching scheduleSelecting or creating a shred profile Selecting a predefined shred profileCustomizing a shred profile High Security Medium Security Low SecurityCustomizing a simple delete profile Page Using a key sequence to initiate shredding Manually shredding one asset Using the File Sanitizer iconManually shredding all selected items Manually activating free space bleaching Aborting a shred or free space bleaching operationViewing the log files Click Bleach NowDevice Access Manager for HP ProtectTools select models only Opening Device Access Manager Configuring device access Simple ConfigurationDevice Class Configuration Starting the background servicePage Allowing access for a user or a group Denying access to a user or groupDevice class All devices Individual device Allowing access to a specific device for one user of a group Removing settings for a user or a group Jita ConfigurationResetting the configuration Creating a Jita for a user or group Creating an extendable Jita for a user or groupDisabling a Jita for a user or group Advanced Settings Device Administrators groupESATA Support Unmanaged Device ClassesPage Theft recovery Go to https//cc.absolute.comEmbedded Security for HP ProtectTools select models only Enabling the embedded security chip in Computer Setup Initializing the embedded security chip Setting up the basic user account Encrypting files and folders Using the personal secure driveSending and receiving encrypted e-mail Changing the Basic User Key password Restoring certification data from the backup file Creating a backup fileBacking up and restoring Changing the owner password Resetting a user passwordMigrating keys with the Migration Wizard Localized password exceptions Page Bios Special key handlingBios What to do when a password is rejected Glossary Cryptographic service provider CSP Device access control policyEmergency recovery archive CryptographyPower-on authentication Encryption File System EFSFingerprint Free space bleachingReboot RestoreRevocation password Sata device modeWindows administrator Suggested signerToken Trusted ContactIndex Jita FacePage
Related manuals
Manual 87 pages 16.32 Kb