Additional security elements
Assigning security roles
In managing computer security (particularly for large organizations), one important practice is to divide responsibilities and rights among various types of administrators and users.
NOTE: In a small organization or for individual use, these roles may all be held by the same person.
For HP ProtectTools, the security duties and privileges can be divided into the following roles:
●Security
NOTE: Many of the features in HP ProtectTools can be customized by the security officer in cooperation with HP. For more information, see the HP Web site at http://www.hp.com.
●IT
●
Managing HP ProtectTools passwords
Most of the HP ProtectTools Security Manager features are secured by passwords. The following table lists the commonly used passwords, the software module where the password is set, and the password function.
The passwords that are set and used by IT administrators only are indicated in this table as well. All other passwords may be set by regular users or administrators.
HP ProtectTools password | Set in this HP ProtectTools | Function | |
|
| module |
|
|
|
| |
Credential Manager logon | Credential Manager | This password offers 2 options: | |
password |
| ● It can be used in a separate logon to | |
|
|
| |
|
|
| access Credential Manager after |
|
|
| logging on to Windows. |
|
|
| ● It can be used in place of the Windows |
|
|
| logon process, allowing access to |
|
|
| Windows and Credential Manager |
|
|
| simultaneously. |
|
|
| |
Credential Manager recovery file | Credential Manager, by IT | Protects access to the Credential Manager | |
password | administrator | recovery file. | |
|
|
| |
Basic User Key password | Embedded Security | Used to access Embedded Security | |
NOTE: | Also known as: |
| features, such as secure |
| folder encryption. When used for | ||
Embedded Security password |
| authentication, also protects access to the | |
|
|
| computer contents when the computer is |
|
|
| turned on, restarted, or restored from |
|
|
| hibernation. |
|
|
| |
Emergency Recovery Token | Embedded Security, by IT | Protects access to the Emergency Recovery | |
password | administrator | Token, which is a backup file for the | |
NOTE: | Also known as: |
| embedded security chip. |
|
| ||
Emergency Recovery Token Key |
|
| |
password |
|
| |
|
|
|
|
6 Chapter 1 Introduction to security | ENWW |