Additional security elements
Assigning security rolesIn managing computer security, one important practice is to divide responsibilities and rights among various types of administrators and users.
NOTE: In a small organization or for individual use, these roles may all be held by the same person.
For HP ProtectTools, the security duties and privileges can be divided into the following roles:
●Security
●IT
●
Most of the HP ProtectTools Security Manager features are secured by passwords. The following table lists the commonly used passwords, the software module where the password is set, and the password function.
The passwords that are set and used by IT administrators only are indicated in this table as well. All other passwords may be set by regular users or administrators.
HP ProtectTools password | Set in this | Function | |
|
| HP ProtectTools module |
|
|
|
| |
Password Manager logon | Password Manager | This password offers 2 options: | |
password |
| ● It can be used in a separate logon to | |
|
|
| |
|
|
| access Password Manager after |
|
|
| logging on to Windows. |
|
|
| ● It can be used in place of the |
|
|
| Windows logon process, allowing |
|
|
| access to Windows and Password |
|
|
| Manager simultaneously. |
|
|
| |
Basic User Key password | Embedded Security | Used to access Embedded Security | |
NOTE: | Also known as: |
| features, such as secure |
| folder encryption. When used for | ||
Embedded Security password |
| authentication, also protects access to the | |
|
|
| |
|
|
| computer contents when the computer is |
|
|
| turned on, restarted, or restored from |
|
|
| hibernation. |
|
|
| |
Emergency Recovery Token | Embedded Security, by IT | Protects access to the Emergency | |
password | administrator | Recovery Token, which is a backup file for | |
NOTE: | Also known as: |
| the embedded security chip. |
|
| ||
Emergency Recovery Token Key |
|
| |
password |
|
| |
|
|
| |
Owner password | Embedded Security, by IT | Protects the system and the TPM chip from | |
|
| administrator | unauthorized access to all owner functions |
|
|
| of Embedded Security. |
|
|
|
|
ENWW | Additional security elements 9 |