Setting a shred schedule ...................................................................................................
44
Selecting or creating a shred profile ..................................................................................
Selecting a predefined shred profile ..................................................................................
Customizing an advanced security shred profile ...............................................................
45
Customizing a simple delete profile ...................................................................................
General tasks .....................................................................................................................................
46
Using a key sequence to initiate shredding .......................................................................
Using the File Sanitizer icon ..............................................................................................
Manually shredding one asset ...........................................................................................
47
Manually shredding all selected items ...............................................................................
Manually activating free space bleaching ..........................................................................
Aborting a shred or free space bleaching operation ..........................................................
48
Viewing the log files ...........................................................................................................
8 Embedded Security for HP ProtectTools ....................................................................................................
49
Setup procedures ...............................................................................................................................
Installing Embedded Security for HP ProtectTools (if necessary) .....................................
Enabling the embedded security chip in Computer Setup .................................................
Initializing the embedded security chip ..............................................................................
50
Setting up the basic user account ......................................................................................
51
Using the Personal Secure Drive .......................................................................................
Encrypting files and folders ................................................................................................
Sending and receiving encrypted e-mail ............................................................................
Advanced tasks ..................................................................................................................................
52
Backing up and restoring ...................................................................................................
Creating a backup file .......................................................................................
Restoring certification data from the backup file ...............................................
Changing the owner password ..........................................................................................
Resetting a user password ................................................................................................
Migrating keys with the Migration Wizard ..........................................................................
9 Device Access Manager for HP ProtectTools ............................................................................................
53
Starting background service ...............................................................................................................
Simple configuration ...........................................................................................................................
Device class configuration (advanced) ...............................................................................................
54
Adding a user or a group ...................................................................................................
Removing a user or a group ..............................................................................................
Denying or allowing access to a user or group ..................................................................
Just In Time Authentication (JITA) Configuration ...............................................................................
Creating a JITA for a user or group ...................................................................................
55
viii
ENWW