HP ProtectTools features
The following table details the key features of HP ProtectTools modules:
Module | Key features |
|
|
HP ProtectTools Security Manager Administrative | ● The Security Manager setup wizard is used by administrators to |
Console | set up and configure levels of security and security logon |
| methods. |
| ● Configure options hidden from basic users. |
| ● Activate Drive Encryption and configure user access. |
| ● Configure Device Access Manager configurations and user |
| access. |
| ● Administrator tools are used to add and remove |
| HP ProtectTools users and view user status. |
|
|
HP ProtectTools Security Manager (for general | ● Configure and change File Sanitizer Shred, Bleaching, and |
users) | Settings. |
| ● View settings for Encryption Status and Device Access |
| Manager. |
| ● Use Privacy Manager to increase security of |
| documents. |
| ● Activate Computrace for HP ProtectTools |
| ● Configure Preferences and Backup and Restore options. |
|
|
Credential Manager for HP ProtectTools (part of | ● Organize, set up and change user names and passwords. |
Security Manager) | ● Configure and change user credentials such as Windows |
| |
| password and Smart Card. |
| ● Acts as a personal password vault, streamlining the logon |
| process with the Single Sign On feature, which automatically |
| remembers and applies user credentials. |
| ● Create and Organize single sign on user names and passwords. |
|
|
Drive Encryption for HP ProtectTools | ● Provides complete, |
| ● Forces |
| the data on the hard drive. |
| ● Offers the option to activate SED drives (Self Encrypting |
| Drives), if equipped. |
|
|
Privacy Manager for HP ProtectTools | ● Used to obtain Certificates of Authority, which verify the source, |
| integrity, and security of communication when using Microsoft e- |
| mail and Microsoft Office documents. |
|
|
File Sanitizer for HP ProtectTools | ● Allows you to securely shred digital assets (securely delete |
| sensitive information including application files, historical or |
| |
| computer and periodically bleach the hard drive (write over data |
| that has been previously deleted but is still present on the hard |
| drive in order to make recovery of the data more difficult). |
|
|
2 Chapter 1 Introduction to security | ENWW |