1 Introduction to security ..................................................................................................................................
1
HP ProtectTools features .....................................................................................................................
2
HP ProtectTools security products description and common use examples ........................................
3
Credential Manager (Password Manager) for HP ProtectTools ..........................................
Embedded Security for HP ProtectTools .............................................................................
4
Drive Encryption for HP ProtectTools ..................................................................................
File Sanitizer for HP ProtectTools ........................................................................................
5
Device Access Manager for HP ProtectTools ......................................................................
Privacy Manager for HP ProtectTools .................................................................................
Computrace for HP ProtectTools (formerly known as LoJack Pro) .....................................
6
Accessing HP ProtectTools Security ....................................................................................................
Achieving key security objectives .........................................................................................................
Protecting against targeted theft ..........................................................................................
7
Restricting access to sensitive data .....................................................................................
Preventing unauthorized access from internal or external locations ...................................
8
Creating strong password policies .......................................................................................
Additional security elements .................................................................................................................
9
Assigning security roles .......................................................................................................
Managing HP ProtectTools passwords ................................................................................
Creating a secure password .............................................................................
10
Backing up credentials and settings ..................................................................................
11
2 HP ProtectTools Security Manager Administrative Console ....................................................................
12
About HP ProtectTools Administrative Console .................................................................................
Using the Administrative Console ......................................................................................................
Getting Started - Setup Wizard ..........................................................................................................
13
Configuring your system .....................................................................................................................
Enabling security features .................................................................................................
14
Defining Security Manager authentication policies ............................................................
Logon tab ..........................................................................................................
Session tab .......................................................................................................
Defining Settings ................................................................................................................
15
Managing Users .................................................................................................................
Adding a user ....................................................................................................
Removing a user ...............................................................................................
16
Checking user status .........................................................................................
ENWW
v