HP 610 G1 manual Achieving key security objectives

Page 10

of USB devices, network connections, and so on. An example would be a situation where outside vendors need access to company computers but should not be able to copy the data to a USB drive.

Example 1: A manager of a medical supply company often works with personal medical records along with his company information. The employees need access to this data, however, it is extremely important that the data is not removed from the computer by a USB drive or any other external storage media. The network is secure, but the computers have CD burners and USB ports that could allow the data to be copied or stolen. The Manager uses Device Access Manager to disable the USB ports and CD burners so they cannot be used. Even though the USB ports are blocked, mouse and keyboards will continue to function.

Example 2: An insurance company does not want its employees to install or load personal software or data from home. Some employees need access to the USB port on all computers. The IT manager uses Device Access Manager to enable access for some employees while blocking external access for others.

Computrace for HP ProtectTools (formerly LoJack Pro) (purchased separately)

Computrace for HP ProtectTools (purchased separately) is a service that can track the location of a stolen computer whenever the user accesses the Internet. Computrace for HP ProtectTools can also help remotely manage and locate computers, as well as monitor computer usage and applications.

Example 1: A school principal instructed the IT department to keep track of all the computers at his school. After the inventory of the computers was made, the IT administrator registered all the computers with Computrace so they could be traced in case they were ever stolen. Recently, the school realized several computers were missing, so the IT administrator alerted the authorities and Computrace officials. The computers were located and were returned to the school by the authorities.

Example 2: A real estate company needs to manage and update computers all over the world. They use Computrace to monitor and update the computers without having to send an IT person to each computer.

Achieving key security objectives

The HP ProtectTools modules can work together to provide solutions for a variety of security issues, including the following key security objectives:

Protecting against targeted theft

Restricting access to sensitive data

Preventing unauthorized access from internal or external locations

Creating strong password policies

4

Chapter 1 Introduction to security

Image 10
Contents HP ProtectTools First Edition August Document Part Number Table of contents PIN Drive Encryption for HP ProtectTools select models only Device Access Manager for HP ProtectTools select models only HP ProtectTools features Introduction to securityModule Key features Password Manager Drive Encryption for HP ProtectTools select models onlyAchieving key security objectives Creating strong password policies Restricting access to sensitive dataProtecting against targeted theft Additional security elements Managing HP ProtectTools passwordsAssigning security roles Creating a secure password Backing up credentials and settingsHP Client Security Setup Wizard Getting startedHP ProtectTools Security Manager Setup Wizard HP Client Security DashboardPassword Manager Easy Setup Guide for Small BusinessGetting started Device Access Manager for HP ProtectTools Drive Encryption for HP ProtectTools HP ProtectTools Security Manager Administrative Console HP Client Security Setup WizardHP ProtectTools Security Manager Setup Wizard HP Client Security DashboardUsing Administrative Console Opening HP ProtectTools Administrative ConsoleSecurity Users Credentials Setting up authentication for your computer Configuring your systemLogon Policy Credentials SettingsManaging users Session PolicySpareKey FingerprintsSmart card Launch HP ProtectTools Administrative ConsoleFace Initializing the smart cardConfiguring the smart card Click Setup WizardEnable security features page, click Next Be sure that Initialize the smart card is selectedContactless card BluetoothApplications Proximity cardGeneral tab DataComputer Applications tabHP ProtectTools Security Manager Using the Security Manager User ConsoleOpening Security Manager Your personal ID card My LogonsPassword Strength tab Manage tabAdding logons Editing logons Using the Password Manager Quick Links menuOrganizing logons into categories Assessing your password strength Managing your logonsCredential Manager Password Manager icon settingsSettings Click Add LogonChanging your Windows password Setting up your SpareKeyEnrolling your fingerprints Enrolling scenes for face logonAuthentication Dark modeLearning Setting up a smart cardAdvanced User Settings Deleting a sceneChanging the smart card PIN Click Credential Manager, and then click Smart cardSelect Change smart card PIN Advanced AdministrationSetting your preferences Fingerprint tabShow scan quality feedback Backing up and restoring your dataClick Back up data Click Restore data Drive Encryption for HP ProtectTools select models only Opening Drive EncryptionActivating Drive Encryption for self-encrypting drives General tasksActivating Drive Encryption for standard hard drives Software encryptionHardware encryption Single user logon Deactivating Drive EncryptionLogging in after Drive Encryption is activated Multiple user logonAdvanced tasks Managing Drive Encryption administrator taskClick Settings Protect your data by encrypting your hard driveUsing Enhanced Security with TPM select models only Backup and recovery administrator taskBacking up encryption keys Click Recovery Performing an HP SpareKey RecoveryClick Backup Keys Click Backing up Encryption KeysClick SpareKey Displaying encryption statusUnder My Data, click Drive Encryption Device Access Manager for HP ProtectTools select models only Opening Device Access ManagerPage Device Class Configuration Starting the background serviceDenying access to a user or group Device class All devices Individual deviceAllowing access for a user or a group Select Users or Groups dialog box opensRemoving settings for a user or a group Jita ConfigurationResetting the configuration Creating a Jita for a user or group Creating an extendable Jita for a user or groupAdvanced Settings Disabling a Jita for a user or groupESATA Device Support Device Administrators groupUnmanaged Device Classes Page Theft recovery select models only Go to https//cc.absolute.comLocalized password exceptions What to do when a password is rejectedBios Special key handlingBios Glossary Domain Emergency recovery archiveHP SpareKey Recovery Drive EncryptionRestore Power-on authenticationReboot Revocation passwordAccess IndexPassword Jita
Related manuals
Manual 48 pages 11.46 Kb

610 G1 specifications

The HP ProBook 610 G1 is a robust, enterprise-grade laptop designed primarily for business professionals who demand reliability and performance in their everyday computing tasks. Introduced as part of HP’s ProBook series, the 610 G1 balances usability, durability, and security features, making it suitable for mobile workforces and corporate environments.

One of the standout features of the HP 610 G1 is its powerful performance capabilities. The device is equipped with Intel’s 4th generation Core processors, ranging from the i3 to i7 options, offering versatile configurations tailored to meet various performance needs. With options for up to 16GB of RAM, the laptop ensures smooth multitasking and efficient handling of demanding applications.

The build quality of the 610 G1 is commendable, featuring a sturdy chassis that meets military-standard durability tests. This ensures that the laptop can withstand the rigors of travel and daily use without compromising functionality. The spill-resistant keyboard further adds to its longevity, allowing users to maintain productivity even in challenging conditions.

In terms of display, the ProBook 610 G1 comes with a 15.6-inch screen, available in both HD and Full HD resolutions. This offers ample screen real estate for productivity tasks, while anti-glare technology ensures that users can work effectively in various lighting conditions. Furthermore, the laptop includes integrated Intel HD Graphics, allowing for adequate visuals for business presentations and multimedia tasks.

Connectivity is another strength of the HP 610 G1. It features multiple USB ports, including USB 3.0 for high-speed data transfer, alongside HDMI and VGA ports for connecting to external displays. The device also offers options for Wi-Fi and Bluetooth, enabling seamless connection to networks and peripherals.

Security is a top priority in business environments, and the HP ProBook 610 G1 does not fall short. It includes features such as a fingerprint reader for biometric authentication, TPM (Trusted Platform Module) for secure storage of encryption keys, and HP’s Sure Start technology, which protects the BIOS from attacks and ensures system integrity.

In summary, the HP ProBook 610 G1 is a well-rounded laptop that combines performance, durability, and security features tailored for the business professional. With its solid build, powerful processing options, and robust connectivity, it provides a reliable solution for productivity-driven users. Whether in the office or on the go, the ProBook 610 G1 stands out as a capable workhorse in the competitive business laptop market.