
Table of contents
| 1 Introduction to security | 1 | 
| HP ProtectTools features | 2 | 
| HP ProtectTools security product description and common use examples | 4 | 
| Credential Manager for HP ProtectTools | 4 | 
| Drive Encryption for HP ProtectTools | 4 | 
| File Sanitizer for HP ProtectTools | 5 | 
| Device Access Manager for HP ProtectTools | 5 | 
| Privacy Manager for HP ProtectTools | 6 | 
| Computrace for HP ProtectTools (formerly LoJack Pro) | 6 | 
| Embedded Security for HP ProtectTools (select models only) | 6 | 
| Achieving key security objectives | 8 | 
| Protecting against targeted theft | 8 | 
| Restricting access to sensitive data | 8 | 
| Preventing unauthorized access from internal or external locations | 8 | 
| Creating strong password policies | 9 | 
| Additional security elements | 10 | 
| Assigning security roles | 10 | 
| Managing HP ProtectTools passwords | 10 | 
| Creating a secure password | 12 | 
| Backing up and restoring HP ProtectTools credentials | 12 | 
| 2 Getting started with the Setup Wizard | 13 | 
| 3 HP ProtectTools Security Manager Administrative Console | 15 | 
| Opening HP ProtectTools Administrative Console | 16 | 
| Using Administrative Console | 17 | 
| Configuring your system | 18 | 
| Setting up authentication for your computer | 18 | 
| Logon Policy | 18 | 
| Session Policy | 19 | 
| Settings | 19 | 
iii
