HP dx2030 manual Embedded Security for HP ProtectTools, Drive Encryption for HP ProtectTools

Page 14

Example 1: A Purchasing Agent for a large manufacturer makes most of her corporate transactions over the Internet. She also frequently visits several popular web sites that require login information. She is keenly aware of security so does not use the same password on every account. The Purchasing Agent has decided to use Credential Manager to match web links with different user names and passwords. When she goes to a web site to log in, Credential Manager presents the credentials automatically. If she wants to view the user names and password, Credential Manager can be configured to reveal them.

Credential Manager can also be used to manage and organize the authentications. This tool will allow a user to select what web or network asset they choose and directly access the link. The user can also view the user names and passwords when necessary.

Example 2: A hard working CPA has been promoted and will now manage the entire accounting department. The team must log into a large number of client web accounts with each account using different login information. This login information needs to be shared with other workers so confidentiality is an issue. The CPA decides to organize all the web links, company user names, and passwords within Credential Manager for HP ProtectTools. Once complete, the CPA deploys Credential Manager to the employees so they can work on the web accounts and never know the login credentials that they are using.

Embedded Security for HP ProtectTools

Embedded Security for HP ProtectTools provides the ability to create a Personal Secure Drive. This capability allows the user to create a virtual drive partition on the PC that is completely hidden until accessed. Embedded Security could be used anywhere data needs to be secretly protected while the rest of the data is not encrypted.

Example 1: A Warehouse Manager has a computer that multiple workers access intermittently throughout the day. The Manager wants to encrypt and hide confidential warehouse data on the computer. He wants the data to be so secure that even if someone steals the hard drive, they cannot decrypt the data or read it. The Warehouse Manager decides to activate Embedded Security and moves the confidential data to the Personal Secure Drive. The Warehouse Manager can enter a password and access the confidential data just like another hard drive. When he logs off or reboots the Personal Secure Drive, it cannot be seen or opened without the proper password. The workers never see the confidential data when they access the computer.

Embedded Security protects encryption keys within a hardware TPM (Trusted Computing Module) chip located on the motherboard. It is the only encryption tool that meets the minimum requirements to resist password attacks where someone would attempt to guess the decryption password. Embedded Security can also encrypt the entire drive and e-mail.

Example 2: A Stock Broker wants to transport extremely sensitive data to another computer using a portable drive. She wants to make sure that only these two computers can open the drive, even if the password is compromised. The Stock Broker uses Embedded Security TPM migration to allow a second computer to have the necessary encryption keys to decrypt the data. During the transport process, even with the password, only the two physical computers can decrypt the data.

Drive Encryption for HP ProtectTools

Drive Encryption is most often used to restrict access to the data on the entire computer hard drive or a secondary hard drive. Drive Encryption can also manage SED (Self Encrypting Drive) drives.

Example 1: A Doctor wants to make sure only he can access any data on his computer hard drive. The Doctor activates Drive Encryption which enables preboot or requiring authentication before Windows login. Once set up, the hard drive cannot be opened without a password before it even boots to the operating system. The Doctor could further enhance drive security by choosing to encrypt the data with the SED (Self Encrypting Drive) option.

4 Chapter 1 Introduction to security

ENWW

Image 14
Contents HP ProtectTools Security Software, Version HP ProtectTools Security Software User Guide About This Book Iv About This Book Table of contents HP ProtectTools Security Manager Vii Embedded Security for HP ProtectTools Computrace for HP ProtectTools Glossary Index Enww Function Features Introduction to securityHP ProtectTools features Module Key featuresCredential Manager Password Manager for HP ProtectTools Embedded Security for HP ProtectTools Drive Encryption for HP ProtectToolsPrivacy Manager for HP ProtectTools Device Access Manager for HP ProtectToolsFile Sanitizer for HP ProtectTools Computrace for HP ProtectTools formerly known as LoJack Pro Accessing HP ProtectTools SecurityAchieving key security objectives Restricting access to sensitive data Protecting against targeted theftCreating strong password policies Password Manager for HP ProtectTools onAssigning security roles Managing HP ProtectTools passwordsAdditional security elements Creating a secure password BiosBacking up credentials and settings Using the Administrative Console HP ProtectTools Security Manager Administrative ConsoleAbout HP ProtectTools Administrative Console Getting Started Setup Wizard Configuring your systemLogon tab Enabling security featuresDefining Security Manager authentication policies Session tabAdding a user Defining SettingsManaging Users Removing a user Configuring Applications SettingsSpecifying device settings Checking user statusManaging Device Access Encrypting DrivesLogging in after Security Manager is configured HP ProtectTools Security ManagerChanging your Windows password Managing passwordsSetting credentials Setting up a Smart CardInitializing the Smart Card Enable security features window, click NextManaging communication privacy Registering the Smart CardShredding or bleaching files Viewing device accessActivating theft recovery Viewing drive encryption statusAdding applications Setting preferencesBackup and Restore Backing up your dataClick Restore data Restoring your dataChanging your Windows user name and picture Password Manager for HP ProtectTools Adding logons Editing logonsUsing the Logons menu Organizing logons into categoriesManaging your logons Assessing your password strengthPassword Manager Icon settings To manage your logonsDrive Encryption for HP ProtectTools Advanced tasks Setup proceduresGeneral tasks Encrypting or decrypting individual drives Backup and recovery administrator taskCreating backup keys Click the Change Encryption buttonOpening Privacy Manager Requesting and installing a Privacy Manager CertificatePrivacy Manager for HP ProtectTools Managing Privacy Manager CertificatesRequesting a Privacy Manager Certificate Installing a Privacy Manager CertificateViewing Privacy Manager Certificate details Click the Request a Privacy Manager certificate buttonDeleting a Privacy Manager Certificate Setting a default Privacy Manager CertificateRenewing a Privacy Manager Certificate Restoring a Privacy Manager CertificateAdding Trusted Contacts Revoking your Privacy Manager CertificateManaging Trusted Contacts Click AdvancedAdding a Trusted Contact Deleting a Trusted Contact Using Privacy Manager in Microsoft OfficeViewing Trusted Contact details Checking revocation status for a Trusted ContactConfiguring Privacy Manager in a Microsoft Office document Signing a Microsoft Office documentAdding a suggested signers signature line Encrypting a Microsoft Office documentViewing a signed Microsoft Office document Removing the encryption from a Microsoft Office documentSending an encrypted Microsoft Office document Viewing an encrypted Microsoft Office documentSigning and sending an e-mail message Using Privacy Manager in Microsoft OutlookConfiguring Privacy Manager for Microsoft Outlook Sealing and sending an e-mail messageClick Export migration file Exporting Privacy Manager Certificates and Trusted ContactsImporting Privacy Manager Certificates and Trusted Contacts Click Import migration fileAbout shredding File Sanitizer for HP ProtectToolsOpening File Sanitizer About free space bleachingSelecting or creating a shred profile Setting a free space bleaching scheduleSetting a shred schedule Selecting a predefined shred profileCustomizing an advanced security shred profile Customizing a simple delete profileUsing a key sequence to initiate shredding Using the File Sanitizer iconManually activating free space bleaching Manually shredding one assetManually shredding all selected items Click Bleach NowAborting a shred or free space bleaching operation Viewing the log filesEnabling the embedded security chip in Computer Setup Embedded Security for HP ProtectToolsInitializing the embedded security chip Setting up the basic user accountSelect Embedded security device state and change to Enable Sending and receiving encrypted e-mail Using the Personal Secure DriveEncrypting files and folders Backing up and restoring Changing the owner passwordResetting a user password Migrating keys with the Migration WizardSimple configuration Device Access Manager for HP ProtectToolsStarting background service Denying or allowing access to a user or group Device class configuration advancedJust In Time Authentication Jita Configuration Adding a user or a groupCreating a Jita for a user or group Creating an extendable Jita for a user or groupAdvanced Settings Disabling a Jita for a user or groupComputrace for HP ProtectTools Go to https//cc.absolute.comGlossary Power-on authentication Drive Encryption key recovery serviceEmergency recovery archive RebootSecurity logon method Revocation passwordSeal for trusted contacts Send Security buttonTrusted Platform Module TPM embedded security chip Windows administratorTrusted message Trusted senderIndex Password Restricting
Related manuals
Manual 8 pages 21.3 Kb