Table of contents
1 Introduction to security | 1 |
HP ProtectTools features | 2 |
HP ProtectTools security product description and common use examples | 4 |
Credential Manager for HP ProtectTools | 4 |
Drive Encryption for HP ProtectTools | 4 |
File Sanitizer for HP ProtectTools | 5 |
Device Access Manager for HP ProtectTools | 5 |
Privacy Manager for HP ProtectTools | 6 |
Computrace for HP ProtectTools (formerly LoJack Pro) | 6 |
Embedded Security for HP ProtectTools (select models only) | 6 |
Achieving key security objectives | 8 |
Protecting against targeted theft | 8 |
Restricting access to sensitive data | 8 |
Preventing unauthorized access from internal or external locations | 8 |
Creating strong password policies | 9 |
Additional security elements | 10 |
Assigning security roles | 10 |
Managing HP ProtectTools passwords | 10 |
Creating a secure password | 12 |
Backing up and restoring HP ProtectTools credentials | 12 |
2 Getting started with the Setup Wizard | 13 |
3 HP ProtectTools Security Manager Administrative Console | 15 |
Opening HP ProtectTools Administrative Console | 16 |
Using Administrative Console | 17 |
Configuring your system | 18 |
Setting up authentication for your computer | 18 |
Logon Policy | 18 |
Session Policy | 19 |
Settings | 19 |
iii