Table of contents

1 Introduction to security ..................................................................................................................................

1

HP ProtectTools features .....................................................................................................................

2

HP ProtectTools security products description and common use examples ........................................

3

Credential Manager (Password Manager) for HP ProtectTools ..........................................

3

Embedded Security for HP ProtectTools .............................................................................

4

Drive Encryption for HP ProtectTools ..................................................................................

4

File Sanitizer for HP ProtectTools ........................................................................................

5

Device Access Manager for HP ProtectTools ......................................................................

5

Privacy Manager for HP ProtectTools .................................................................................

5

Computrace for HP ProtectTools (formerly known as LoJack Pro) .....................................

6

Accessing HP ProtectTools Security ....................................................................................................

6

Achieving key security objectives .........................................................................................................

6

Protecting against targeted theft ..........................................................................................

7

Restricting access to sensitive data .....................................................................................

7

Preventing unauthorized access from internal or external locations ...................................

8

Creating strong password policies .......................................................................................

8

Additional security elements .................................................................................................................

9

Assigning security roles .......................................................................................................

9

Managing HP ProtectTools passwords ................................................................................

9

Creating a secure password .............................................................................

10

Backing up credentials and settings ..................................................................................

11

2 HP ProtectTools Security Manager Administrative Console ....................................................................

12

About HP ProtectTools Administrative Console .................................................................................

12

Using the Administrative Console ......................................................................................................

12

Getting Started - Setup Wizard ..........................................................................................................

13

Configuring your system .....................................................................................................................

13

Enabling security features .................................................................................................

14

Defining Security Manager authentication policies ............................................................

14

Logon tab ..........................................................................................................

14

Session tab .......................................................................................................

14

Defining Settings ................................................................................................................

15

Managing Users .................................................................................................................

15

Adding a user ....................................................................................................

15

Removing a user ...............................................................................................

16

Checking user status .........................................................................................

16

ENWW

v