HP ProtectTools features

The following table details the key features of HP ProtectTools modules:

Module

Key features

 

 

HP ProtectTools Security Manager Administrative

The Security Manager setup wizard is used by administrators to

Console

set up and configure levels of security and security logon

 

methods.

 

Configure options hidden from basic users.

 

Activate Drive Encryption and configure user access.

 

Configure Device Access Manager configurations and user

 

access.

 

Administrator tools are used to add and remove

 

HP ProtectTools users and view user status.

 

 

HP ProtectTools Security Manager (for general

Configure and change File Sanitizer Shred, Bleaching, and

users)

Settings.

 

View settings for Encryption Status and Device Access

 

Manager.

 

Use Privacy Manager to increase security of e-mails and

 

documents.

 

Activate Computrace for HP ProtectTools

 

Configure Preferences and Backup and Restore options.

 

 

Credential Manager for HP ProtectTools (part of

Organize, set up and change user names and passwords.

Security Manager)

Configure and change user credentials such as Windows

 

 

password and Smart Card.

 

Acts as a personal password vault, streamlining the logon

 

process with the Single Sign On feature, which automatically

 

remembers and applies user credentials.

 

Create and Organize single sign on user names and passwords.

 

 

Drive Encryption for HP ProtectTools

Provides complete, full-volume hard drive encryption.

 

Forces pre-boot authentication in order to decrypt and access

 

the data on the hard drive.

 

Offers the option to activate SED drives (Self Encrypting

 

Drives), if equipped.

 

 

Privacy Manager for HP ProtectTools

Used to obtain Certificates of Authority, which verify the source,

 

integrity, and security of communication when using Microsoft e-

 

mail and Microsoft Office documents.

 

 

File Sanitizer for HP ProtectTools

Allows you to securely shred digital assets (securely delete

 

sensitive information including application files, historical or

 

Web-related content, or other confidential data) on your

 

computer and periodically bleach the hard drive (write over data

 

that has been previously deleted but is still present on the hard

 

drive in order to make recovery of the data more difficult).

 

 

2 Chapter 1 Introduction to security

ENWW