Setting a shred schedule ...................................................................................................

44

Selecting or creating a shred profile ..................................................................................

44

Selecting a predefined shred profile ..................................................................................

44

Customizing an advanced security shred profile ...............................................................

45

Customizing a simple delete profile ...................................................................................

45

General tasks .....................................................................................................................................

46

Using a key sequence to initiate shredding .......................................................................

46

Using the File Sanitizer icon ..............................................................................................

46

Manually shredding one asset ...........................................................................................

47

Manually shredding all selected items ...............................................................................

47

Manually activating free space bleaching ..........................................................................

47

Aborting a shred or free space bleaching operation ..........................................................

48

Viewing the log files ...........................................................................................................

48

8 Embedded Security for HP ProtectTools ....................................................................................................

49

Setup procedures ...............................................................................................................................

49

Installing Embedded Security for HP ProtectTools (if necessary) .....................................

49

Enabling the embedded security chip in Computer Setup .................................................

49

Initializing the embedded security chip ..............................................................................

50

Setting up the basic user account ......................................................................................

50

General tasks .....................................................................................................................................

51

Using the Personal Secure Drive .......................................................................................

51

Encrypting files and folders ................................................................................................

51

Sending and receiving encrypted e-mail ............................................................................

51

Advanced tasks ..................................................................................................................................

52

Backing up and restoring ...................................................................................................

52

Creating a backup file .......................................................................................

52

Restoring certification data from the backup file ...............................................

52

Changing the owner password ..........................................................................................

52

Resetting a user password ................................................................................................

52

Migrating keys with the Migration Wizard ..........................................................................

52

9 Device Access Manager for HP ProtectTools ............................................................................................

53

Starting background service ...............................................................................................................

53

Simple configuration ...........................................................................................................................

53

Device class configuration (advanced) ...............................................................................................

54

Adding a user or a group ...................................................................................................

54

Removing a user or a group ..............................................................................................

54

Denying or allowing access to a user or group ..................................................................

54

Just In Time Authentication (JITA) Configuration ...............................................................................

54

Creating a JITA for a user or group ...................................................................................

55

viii

ENWW