Microsoft, Windows, and Windows Vista are
either trademarks or registered trademarks
of Microsoft Corporation in the United States
and/or other countries.
The only warranties for HP products and
services are set forth in the express warranty
statements accompanying such products
and services. Nothing herein should be
construed as constituting an additional
warranty. HP shall not be liable for technical
or editorial errors or omissions contained
herein.
This document contains proprietary
information that is protected by copyright. No
part of this document may be photocopied,
reproduced, or translated to another
language without the prior written consent of
Hewlett-Packard Company.
HP ProtectTools User Guide
HP Compaq Business PC
First Edition: July 2008
Document Part Number: 491163-001
About This Book
This guide provides basic information for upgrading this computer model.
WARNING! Text set off in this manner indicates that failure to follow directions could result in bodily
harm or loss of life.
CAUTION: Text set off in this manner indicates that failure to follow directions could result in damage
to equipment or loss of information.
NOTE: Text set off in this manner provides important supplemental information.
ENWWiii
iv About This BookENWW
Table of contents
1 Introduction to security
HP ProtectTools features ..................................................................................................................... 2
Accessing HP ProtectTools Security .................................................................................................... 4
Power ................................................................................................................................................. 70
Index ................................................................................................................................................................... 97
ENWWix
xENWW
1Introduction to security
HP ProtectTools Security Manager for Administrators software provides security features that help
protect against unauthorized access to the computer, networks, and critical data. Enhanced security
functionality is provided by the following software modules:
Credential Manager for HP ProtectTools
●
Drive Encryption for HP ProtectTools
●
Privacy Manager for HP ProtectTools
●
File Sanitizer for HP ProtectTools
●
Java Card Security for HP ProtectTools
●
BIOS Configuration for HP ProtectTools
●
Embedded Security for HP ProtectTools
●
Device Access Manager for HP ProtectTools
●
NOTE: Credential Manager, Java Card Security, and Drive Encryption are configured using the
Security Manager setup wizard.
HP ProtectTools software modules may be preinstalled, preloaded, or available as a configurable option
or as an after market option. Visit
NOTE: The instructions in this guide are written with the assumption that you have already installed
the applicable HP ProtectTools software modules.
http://www.hp.com for more information.
ENWW1
HP ProtectTools features
The following table details the key features of HP ProtectTools modules:
ModuleKey features
HP ProtectTools Security Manager for Administrators
Credential Manager for HP ProtectTools
Drive Encryption for HP ProtectTools
The Security Manager setup wizard is used by administrators to
●
set up and configure levels of security and security logon methods.
Users can also use the setup wizard to configure their logon
●
methods.
Administrator tools are used to add and remove ProtectTools
●
users and view user status.
Backs up and restores security modules from installed
●
HP ProtectTools modules.
Credential Manager acts as a personal password vault,
●
streamlining the logon process with the Single Sign On feature,
which automatically remembers and applies user credentials.
Single Sign On also offers additional protection by requiring
●
combinations of different security technologies, such as a Java™
Card and biometrics, for user authentication.
Password storage is protected through software encryption and
●
can be enhanced through the use of a TPM embedded security
chip and/or security device authentication, such as Java Cards or
biometrics.
Drive Encryption provides complete, full-volume hard drive
●
encryption.
Drive Encryption forces pre-boot authentication in order to decrypt
●
and access the data on the hard drive.
Privacy Manager for HP ProtectTools
File Sanitizer for HP ProtectTools
Java Card Security for HP ProtectTools
Privacy Manager is a tool used to obtain Certificates of Authority,
●
which verify the source, integrity, and security of communication
when using Microsoft mail, Microsoft Office documents, and Live
Messenger.
File Sanitizer allows you to securely shred digital assets (securely
●
delete sensitive information including application files, historical
or Web-related content, or other confidential data) on your
computer and periodically bleach the hard drive (write over data
that has been previously deleted but is still present on the hard
drive in order to make recovery of the data more difficult).
Java Card Security is a management software interface for Java
●
Card. Java Card is a personal security device that protects
authentication data requiring both the card and a PIN number to
grant access. The Java Card can be used to access Credential
Manager, Drive Encryption, HP BIOS, or any number of third party
access points.
Java Card Security configures the HP ProtectTools Java Card for
●
user authentication before the hard drive boots. Java Card
Security can be accessed by Embedded Security, Java Card, and
passwords.
Java Card Security configures separate Java Cards for an
●
administrator and a user.
2Chapter 1 Introduction to securityENWW
ModuleKey features
BIOS Configuration for HP ProtectTools
Embedded Security for HP ProtectTools
Device Access Manager for HP ProtectTools
BIOS Configuration provides access to power-on user and
●
administrator password management.
BIOS Configuration provides an alternative to the pre-boot BIOS
●
configuration utility known as Computer Setup.
BIOS Configuration enablement of automatic DriveLock support,
●
which is enhanced with the embedded security chip, helps protect
a hard drive from unauthorized access, even if it is removed from
a system, without requiring the user to remember any additional
passwords beyond the embedded security chip user password.
Embedded Security uses a Trusted Platform Module (TPM)
●
embedded security chip to help protect against unauthorized
access to sensitive user data or credentials stored locally on a PC.
Embedded Security allows creation of a personal secure drive
●
(PSD), which is useful in protecting user file and folder information.
Embedded Security supports third-party applications (such as
●
Microsoft Outlook and Internet Explorer) for protected digital
certificate operations.
Device Access Manager allows IT managers to control access to
●
devices such as USB ports, optical drives, etc. based on user
profiles.
Device Access Manager prevents unauthorized users from
●
removing data using external storage media and from introducing
viruses into the system from external media.
The administrator can disable access to writeable devices for
●
specific individuals or groups of users.
ENWWHP ProtectTools features3
Accessing HP ProtectTools Security
To access HP ProtectTools Security Manager for Administrators from Windows® Control Panel:
In Windows Vista®, click Start, click All Programs, and then click HP ProtectTools Security
▲
Manager for Administrators.
– or –
In Windows XP, click Start, click All Programs, and then click HP ProtectTools Security
Manager.
NOTE: If you are not an HP ProtectTools administrator, you can run HP ProtectTools in
nonadministrator mode to view information, but you cannot make changes.
NOTE: After you have configured the Credential Manager module, you can also open HP ProtectTools
by logging on to Credential Manager directly from the Windows logon screen. For more information,
refer to
Logging on to Windows with Credential Manager on page 24.
Achieving key security objectives
The HP ProtectTools modules can work together to provide solutions for a variety of security issues,
including the following key security objectives:
Protecting against targeted theft
●
Restricting access to sensitive data
●
Preventing unauthorized access from internal or external locations
●
Creating strong password policies
●
Addressing regulatory security mandates
●
4Chapter 1 Introduction to securityENWW
Protecting against targeted theft
An example of this type of incident would be the targeted theft of a computer or its confidential data and
customer information. This can easily occur in open office environments or in unsecured areas. The
following features help protect the data if the computer is stolen:
The pre-boot authentication feature, if enabled, helps prevent access to the operating system. See
●
the following procedures:
Credential Manager
◦
Embedded Security
◦
Drive Encryption
◦
DriveLock helps ensure that data cannot be accessed even if the hard drive is removed and
●
installed into an unsecured system.
The Personal Secure Drive feature, provided by the Embedded Security for HP ProtectTools
●
module, encrypts sensitive data to help ensure it cannot be accessed without authentication. See
the following procedures:
Embedded Security “
◦
“
Using the Personal Secure Drive on page 74”
◦
Setup procedures on page 72”
Restricting access to sensitive data
Suppose a contract auditor is working onsite and has been given computer access to review sensitive
financial data; you do not want the auditor to be able to print the files or save them to a writeable device
such as a CD. The following features help restrict access to data:
Device Access Manager for HP ProtectTools allows IT managers to restrict access to writeable
●
devices so sensitive information cannot be printed or copied from the hard drive onto removable
media. See
DriveLock helps ensure that data cannot be accessed even if the hard drive is removed and
●
installed into an unsecured system.
Device class configuration (advanced) on page 79.
Preventing unauthorized access from internal or external locations
Unauthorized access to an unsecured business PC presents a very tangible risk to corporate network
resources such as information from financial services, an executive, or R&D team, and to private
ENWWAchieving key security objectives5
information such as patient records or personal financial records. The following features help prevent
unauthorized access:
The pre-boot authentication feature, if enabled, helps prevent access to the operating system. See
●
the following procedures:
Credential Manager
◦
Embedded Security
◦
Drive Encryption
◦
Embedded Security for HP ProtectTools helps protect sensitive user data or credentials stored
●
locally on a PC using the following procedures:
Embedded Security “
◦
“
Using the Personal Secure Drive on page 74”
◦
Using the following procedures, Credential Manager for HP ProtectTools helps ensure that an
●
unauthorized user cannot get passwords or access to password-protected applications:
Credential Manager “
◦
“
Using Single Sign On on page 25”
◦
Device Access Manager for HP ProtectTools allows IT managers to restrict access to writeable
●
devices so sensitive information cannot be copied from the hard drive. See
on page 78.
The Personal Secure Drive feature encrypts sensitive data to help ensure it cannot be accessed
●
without authentication using the following procedures:
Embedded Security “
◦
“
Using the Personal Secure Drive on page 74”
◦
File Sanitizer allows you to securely delete data by shredding assets or bleaching the hard drive
●
(write over data that has been previously deleted but is still present on the hard drive in order to
make recovery of the data more difficult).
Privacy Manager allows you to obtain Certificates of Authority when using Microsoft mail, Office
●
documents, and Live Messenger, making the process of sending and saving important information
safe and secure.
Setup procedures on page 72”
Setup procedures on page 20”
Simple configuration
Setup procedures on page 72”
Creating strong password policies
If a mandate goes into effect that requires the use of strong password policy for dozens of Web-based
applications and databases, Credential Manager for HP ProtectTools provides a protected repository
for passwords and Single Sign On convenience using the following procedures:
Credential Manager “
●
“
Using Single Sign On on page 25”
●
For stronger security, Embedded Security for HP ProtectTools then protects that repository of user
names and passwords. This allows users to maintain multiple strong passwords without having to write
them down or try to remember them. See Embedded Security
6Chapter 1 Introduction to securityENWW
Setup procedures on page 20”
Setup procedures on page 72.
Additional security elements
Assigning security roles
In managing computer security (particularly for large organizations), one important practice is to divide
responsibilities and rights among various types of administrators and users.
NOTE: In a small organization or for individual use, these roles may all be held by the same person.
For HP ProtectTools, the security duties and privileges can be divided into the following roles:
Security officer—Defines the security level for the company or network and determines the security
●
features to deploy, such as Java™ Cards, biometric readers, or USB tokens.
IT administrator—Applies and manages the security features defined by the security officer. Can
●
also enable and disable some features. For example, if the security officer has decided to deploy
Java Cards, the IT administrator can enable Java Card BIOS security mode.
User—Uses the security features. For example, if the security officer and IT administrator have
●
enabled Java Cards for the system, the user can set the Java Card PIN and use the card for
authentication.
Managing HP ProtectTools passwords
Most of the HP ProtectTools Security Manager features are secured by passwords. The following table
lists the commonly used passwords, the software module where the password is set, and the password
function.
The passwords that are set and used by IT administrators only are indicated in this table as well. All
other passwords may be set by regular users or administrators.
HP ProtectTools passwordSet in this HP ProtectTools
module
Credential Manager logon
password
Credential Manager recovery file
password
Basic User Key password
NOTE: Also known as:
Embedded Security password
Emergency Recovery Token
password
Credential ManagerThis password offers 2 options:
Credential Manager, by IT
administrator
Embedded SecurityUsed to access Embedded Security
Embedded Security, by IT
administrator
Function
It can be used in a separate logon to
●
access Credential Manager after
logging on to Windows.
It can be used in place of the Windows
●
logon process, allowing access to
Windows and Credential Manager
simultaneously.
Protects access to the Credential Manager
recovery file.
features, such as secure e-mail, file, and
folder encryption. When used for power-on
authentication, also protects access to the
computer contents when the computer is
turned on, restarted, or restored from
hibernation.
Protects access to the Emergency Recovery
Token, which is a backup file for the
embedded security chip.
ENWWAdditional security elements7
HP ProtectTools passwordSet in this HP ProtectTools
module
NOTE: Also known as:
Emergency Recovery Token Key
password
Function
Owner passwordEmbedded Security, by IT
Java™ Card PINJava Card SecurityProtects access to the Java Card contents
Computer Setup password
NOTE: Also known as BIOS
administrator, F10 Setup, or
Security Setup password
Power-on passwordBIOS ConfigurationProtects access to the computer contents
Windows Logon passwordWindows Control PanelCan be used for manual logon or saved on
administrator
BIOS Configuration, by IT
administrator
Protects the system and the TPM chip from
unauthorized access to all owner functions
of Embedded Security.
and authenticates users of the Java Card.
When used for power-on authentication, the
Java Card PIN also protects access to the
Computer Setup utility and to the computer
contents.
Authenticates users of Drive Encryption, if
the Java Card token is selected.
Protects access to the Computer Setup
utility.
when the computer is turned on, restarted,
or restored from hibernation.
the Java Card.
8Chapter 1 Introduction to securityENWW
Creating a secure password
When creating passwords, you must first follow any specifications that are set by the program. In
general, however, consider the following guidelines to help you create strong passwords and reduce
the chances of your password being compromised:
Use passwords with more than 6 characters, preferably more than 8.
●
Mix the case of letters throughout your password.
●
Whenever possible, mix alphanumeric characters and include special characters and punctuation
●
marks.
Substitute special characters or numbers for letters in a key word. For example, you can use the
●
number 1 for letters I or L.
Combine words from 2 or more languages.
●
Split a word or phrase with numbers or special characters in the middle, for example,
●
“Mary2-2Cat45.”
Do not use a password that would appear in a dictionary.
●
Do not use your name for the password, or any other personal information, such as birth date, pet
●
names, or mother's maiden name, even if you spell it backwards.
Change passwords regularly. You might change only a couple of characters that increment.
●
If you write down your password, do not store it in a commonly visible place very close to the
●
computer.
Do not save the password in a file, such as an e-mail, on the computer.
●
Do not share accounts or tell anyone your password.
●
Backing up and restoring HP ProtectTools credentials
To back up and restore credentials from all supported HP ProtectTools modules, reference the following:
Backing up credentials and settings
You can back up credentials in the following ways:
Use Drive Encryption for HP ProtectTools to select and back up HP ProtectTools credentials.
●
You can also register for Online Drive Encryption Key Recovery Service to store a backup copy of
your encryption key, which will enable you to access your computer if you forget your password
and do not have access to your local backup.
NOTE: You must be connected to the Internet and have a valid e-mail address to register and to
recover your password through this service.
Use Embedded Security for HP ProtectTools to back up HP ProtectTools credentials.
●
Use the Backup and Recovery tool in HP ProtectTools Security Manager for Administrators as a
●
central location from which you can back up and restore security credentials from installed
HP ProtectTools modules.
ENWWAdditional security elements9
2HP ProtectTools Security Manager for
Administrators
About HP ProtectTools Security Manager for
Administrators
HP ProtectTools Security Manager for Administrators provides security features that help protect against
unauthorized access to the computer, networks, and critical data. Security Manager is extensible and
can therefore grow to handle new threats as they emerge and offer new technologies as they become
available.
Use the modules HP ProtectTools Security Manager for Administrators for the initial security setup. The
Security Manager centralized user interface has the following features:
Getting Started - Setup wizard that guides Windows operating system administrators through the
●
configuration of levels of security and of the security login methods that are used in a pre-boot
environment, Credential Manager, and Drive Encryption. Users also use the setup wizard to
configure their security login methods. Refer to
Security Manager for Administrators on page 11 and Getting Started - Configuring user security
login methods on page 13 for more information.
Getting Started - Configuring HP ProtectTools
Administrators Tools - Allows Windows administrators to add and remove ProtectTools users
●
and view user status. Refer to
on page 15 for more information.
Backup and Restore - Backs up and restores security credentials from installed HP ProtectTools
●
modules. Refer to
Settings - Allows you to customize the behavior of a variety of items. Refer to
●
on page 19 for more information.
The Security Manager centralized user interface also contains a list of add-on software modules
designed to maximize computer security. You can select and configure any number of the available
modules.
Backup and Restore on page 16 for more information.
10Chapter 2 HP ProtectTools Security Manager for AdministratorsENWW
Getting Started - Configuring HP ProtectTools Security
Manager for Administrators
The Getting Started setup wizard allows a Windows administrator to establish and/or update levels of
security and security login methods.
Users also use the setup wizard to configure their security logon methods.
NOTE: The Windows administrator can run the setup wizard whenever he or she wants to change the
levels of security or security login methods.
The setup wizard guides the Windows administrator through configuring Security Manager:
1.In HP ProtectTools Security Manager for Administrators, click Getting Started, and then click the
Security Manager Setup button. A demonstration that describes the Security Manager features
may start.
2.On the “Welcome” page, if available, clear the Automatically play video when wizard starts
check box if you want to bypass the demonstration of the Security Manager features the next time
you run the setup wizard.
3.Read the page, and then click Next.
4.Choose the levels of security on the “Set Levels of Security” page. You can choose one or more
of the following levels:
HP Credential Manager - Protects your Windows account.
●
Pre-boot Security (some models) - Protects your computer before Windows starts.
●
HP Drive Encryption - Protects your computer data by encrypting the hard drive. Selecting
●
this option will require you to back up the unique encryption key to a removable storage device.
NOTE: The Security meter changes according to your selections. The more levels you select,
the more secure your computer will be.
After selecting the security levels, click Next.
ENWWGetting Started - Configuring HP ProtectTools Security Manager for Administrators11
5.One or more of the following pages will be displayed, depending on the levels of security you chose
in step 4.
Protect your Windows account - The Windows password is required because Security
●
Manager must synchronize the password for each level of security.
Enter and confirm a Windows password, or enter your password if one has already been
established, and then click Next.
Protect your system before Windows start-up (optional) - If you or the user knows the BIOS
●
administrator password, the BIOS administrator password can be entered. If the BIOS
administrator password is entered, the Windows administrator or user becomes a BIOS
administrator.
NOTE: If a BIOS administrator password does not exist, you must establish one before you
can continue. When a BIOS administrator password is entered, you will become a BIOS
administrator.
Enter and confirm a BIOS administrator password, or enter the password if one has already
been established. Then click Next.
Protect your data by encrypting your hard drive - You must use a USB storage device to save
●
the encryption key. Select the drive(s) to be encrypted (at least one drive must be selected),
insert the storage device into the appropriate slot, select the storage device where the
encryption key will be saved, then click Next.
6.Choose one or more security login methods on the “Set Security Login Methods” page.
a.Under Step 1, select one or more security login methods.
NOTE: The selections apply to both administrators and users.
b.Under Step 2, if you want to increase security, select the check box to require all of the security
login methods you selected under Step 1 when logging in to the computer.
If you want any one of the selected security login methods to be permissible when logging in
to the computer, do not select the check box.
CAUTION: If you select the check box and a user has not yet configured his or her login
methods (Windows password, fingerprint authentication, and/or the HP ProtectTools Java™
Card), that user will not be able to log in to the computer. It is recommended that all users first
configure their login methods before this option is selected.
c.Click Next. A summary page opens, allowing you to review your selections.
7.Click Enable on the “Review and Enable Security Settings” page.
When you click Enable, the computer sets your security choices. You will not be able to return to
any of the preceding wizard pages until security setup is complete. After you complete the wizard,
you can change your settings by running the wizard again.
12Chapter 2 HP ProtectTools Security Manager for AdministratorsENWW
8.Depending on the security login method(s) you chose in step 6, one or more of the following pages
will be displayed. Follow the on-screen instructions, and then click Next.
“Enroll your fingerprints” - Click the finger on the screen that corresponds to the finger you
●
want to register (you must register at least 2 fingerprints), slowly swipe your chosen finger
over the fingerprint sensor, then continue swiping the same finger over the fingerprint sensor
until you have completed the required swipes. Repeat the process to register a second finger
then click Finish.
“Register an HP ProtectTools Java Card” - Insert the HP ProtectTools Java Card, enter the
●
Java Card PIN, then click Finish.
9.On the “Congratulations” page, review your selections, and then click Done.
Getting Started - Configuring user security login methods
After the Windows administrator has configured the levels of security and security login methods, users
run the setup wizard to be added as HP ProtectTools users on the computer:
NOTE: Users who run the setup wizard will see most of the wizard pages. However, the “Set Levels
of Security” and “Set Security Login Methods” pages are not configurable because they are administrator
tasks only.
1.Log in to the computer.
2.In Security Manager, click Getting Started, and then click the Security Manager Setup button.
3.On the “Welcome” page, clear the Automatically play video when wizard starts check box if you
want to bypass the demonstration of the Security Manager features the next time you run the setup
wizard.
4.Read the page, and then click Next.
5.On the “Set Levels of Security” page, click Next.
6.Depending on the levels of security set by the administrator, one or both of the following pages will
be displayed.
Protect your Windows account - The Windows password is required because Security
●
Manager must synchronize the password for each level of security.
NOTE: If HP Credential Manager is the only level of security selected, you will not be
prompted for your Windows password because Credential Manager already knows your
Windows password.
Enter and confirm a Windows password, or enter your password if one has already been
established, and then click Next.
Protect your system before Windows start-up (optional) - If you know the BIOS administrator
●
password, the BIOS administrator password can be entered. If the BIOS administrator
password is entered, the Windows administrator or user becomes a BIOS administrator.
NOTE: If a BIOS administrator password does not exist, you must establish one before you
can continue. When a BIOS administrator password is entered, you will become a BIOS
administrator.
Enter and confirm a BIOS administrator password, or enter the password if one has already
been established. Then click Next.
ENWWGetting Started - Configuring user security login methods13
7.On the “Set Security Login Methods” page, click Next.
8.On the “Review and Enable Security Settings” page, click Enable.
9.Depending on the security login methods set by the administrator, one or both of the following
pages will be displayed. Follow the on-screen instructions, and then click Next.
“Enroll your fingerprints” - Click the finger on the screen that corresponds to the finger you
●
want to register (you must register at least 2 fingerprints), slowly swipe your chosen finger
over the fingerprint sensor, then continue swiping the same finger over the fingerprint sensor
until you have completed the required swipes. Repeat the process to register a second finger
then click Finish.
“Register an HP ProtectTools Java Card” - Insert the HP ProtectTools Java Card, enter the
●
Java Card PIN, then click Finish.
10. On the “Congratulations” page, review your selections, and then click Done.
Logging in after Security Manager is configured
Login scenarios vary, depending on the levels of security and security login methods chosen by the
Windows administrator during configuration. Several possible scenarios follow:
If all 3 levels of security have been configured and all security login methods are required, users
●
must log in using all of the configured methods when the computer is first turned on. This action
logs the user in to Windows.
If all 3 levels of security have been configured and any of the security login methods is permissible,
●
users may log in using any one of the configured security login methods when the computer is first
turned on. This action logs the user in to Windows.
If the HP Drive Encryption and the HP Credential Manager levels of security have been configured
●
and all security login methods are required, users must log in using all of the configured methods
when the HP Drive Encryption login screen opens. This action logs the user in to Windows.
If the HP Drive Encryption and the HP Credential Manager levels of security have been configured
●
and any of the configured security login methods is permissible, users may log in using any one of
the security login methods when the HP Drive Encryption login screen opens. This action logs the
user in to Windows.
If the HP Credential Manager level of security has been configured and all of the security login
●
methods are required, users must log in using all of the configured methods when the Credential
Manager login screen opens. This action logs the user in to Windows.
If the HP Credential Manager level of security option has been configured and any of the configured
●
security login methods is permissible, users may log in using any one of the security login methods
when the Credential Manager login screen opens. This action logs the user in to Windows.
NOTE: If the HP Credential Manager level of security has not been configured, users must still
enter their Windows password at the Windows login screen, regardless of the security login
methods that are required by other levels of security.
14Chapter 2 HP ProtectTools Security Manager for AdministratorsENWW
Windows administrators can add and remove HP ProtectTools users and view user status using the
Administrator Tools feature.
In Administrator Tools, the Administrator and User tabs show the selected security login methods and
whether a user can choose to use any one of them or must use all of them. If you want to change levels
of security or security login methods, you must run the setup wizard to make those changes.
Adding a user
The Windows administrator can add additional administrators or regular users to the users list. The
process is the same for both.
NOTE: Before you add a user, that user must already have a Windows user account on the computer
and must be present during the following procedure to provide the password.
To add a user to the users list:
1.Click Start, click All Programs, and then click HP ProtectTools Security Manager for
Administrators.
2.Click Administrator Tools.
3.Click the Manage Users button.
4.Select the Administrator or User tab.
5.Click Add.
6.Click the user name for the account you want to add or type it in the User Name box, and then
click Next.
NOTE: You must use an existing Windows account and click the name or type it exactly. You
cannot modify or add a Windows user account using this dialog box.
7.Type the Windows password for the selected account, and then click OK.
NOTE: If the user will be logging in with the fingerprint and/or HP ProtectTools Java Card security
login method, he or she must now log in to the computer and run the setup wizard to configure
those security login methods.
Removing a user
NOTE: This procedure does not delete the Windows user account. It only removes that account from
Security Manager. To completely remove the user, you must remove the user from both Security
Manager and Windows.
To remove a user from the users list:
1.Click Start, click All Programs, and then click HP ProtectTools Security Manager for
5.Click the user name for the account you want to remove, and then click Remove.
NOTE: You cannot remove an administrator if there is only one administrator listed in the
Administrator list.
6.In the confirmation dialog box, click Yes.
Checking user status
In Administrator Tools, the Administrator and User tabs show current status of each user:
Green check mark - Indicates that the user has configured the required security login method(s).
●
Yellow exclamation point - Indicates that a user has not configured one or more of the required
●
or permissible security login method(s). For example, if the Windows administrator configures at
least 2 required security login methods, and indicates that either of them can be used for logging
in to the computer, a user who has already configured one of those methods may log in using that
method. The yellow exclamation point indicates to the Windows administrator that the user has not
configured the other security login method.
Red X - Indicates that the user has not configured a required security login method and will be
●
locked out of the computer when trying to log in. The user must run the setup wizard to configure
the required login method(s).
Blank - Indicates that a security login method is not required.
●
Backup and Restore
HP ProtectTools Backup and Restore provides a central location from which you can back up and restore
security credentials from installed HP ProtectTools modules.
In Security Manager, click Backup and Restore, and then click the one of the following buttons:
Backup Options button - Allows you to configure backup settings. For details, refer to
●
Backup wizard on page 17.
Backup button - Allows you to perform an immediate backup of all security credentials.
●
NOTE: You must configure backup settings using the Backup Options button before you can
perform a backup.
Schedule Backups button - Allows you to set up scheduled backups. If you need help with
●
scheduling, search for the topic “task scheduling” in Windows Help.
NOTE: You must configure backup settings using the Backup Options button before you can
schedule a backup.
Restore button - Allows you to restore previously backed up security credentials. For details, refer
●
to
Using the Restore wizard on page 18.
Using the
CAUTION: Backup files created outside of HP ProtectTools Backup and Restore (for example, files
created previously by a specific security module) are not compatible with HP ProtectTools Backup and
Restore, and therefore cannot be restored by HP ProtectTools Backup and Restore or by new versions
of the security modules themselves. HP recommends that you create a new backup file with
HP ProtectTools Backup and Restore.
16Chapter 2 HP ProtectTools Security Manager for AdministratorsENWW
Using the Backup wizard
1.In Security Manager, click Backup and Restore, and then click Backup Options to start the
Backup wizard.
2.Clear the Show Welcome Screen check box if you want to bypass the “Welcome” page the next
time the Backup wizard is run.
3.Click Next. The “Security Modules” page opens.
4.Refer to the following subsections below to continue.
Security Modules
To select modules to back up, follow these steps:
1.Select the check box at the beginning of a row to add the associated module to the backup list.
Click the Select All or Clear All buttons to quickly add or remove all modules from the backup list.
Note that the Status column for the module must display “Ready” or “Needs Authentication” before
you can select it.
NOTE: The check box is unavailable if the module is not ready. After you update a module's
status, click the Refresh button on the right side of the row to update the Status field. Click the
Refresh All button to update the status for all modules.
2.If necessary, type the required value in the Authentication column for each selected module. The
security device may require the entry of authentication values to access the credential data on the
device. These values may include passwords, PINs, and so on.
3.Click Next. The ”File Location” page opens.
File Location
The “File Location” page allows you to choose the location of the backup storage file and the security
token file.
The security token file securely stores the key used to encrypt the backup storage file. A password
encrypts the contents of the security token file. Saving the security token file to an offline location (USB
flash drive, disc, or other media) provides a two-factor level of security, because to access the backedup data in the storage file, you must have the security token file and know the password. Therefore, HP
recommends that you store the storage file and the token file on two different removable media that are
stored in different locations.
To configure file location:
1.Confirm or change the file name and location where you want to save the storage file and security
token file. To change the location, click the Edit button, and then type the new file name, or click
Browse to select a new location. An extension of .ptb is automatically appended to the file name.
NOTE: Only one instance of backup data is allowed for each module in a given storage file. If
you specify an existing storage file, you will be given the option to overwrite the selected module's
data within the storage file or to specify a different storage file. If you specify an existing storage
file, the entire file is not overwritten, only the backup data for the selected module.
2.To encrypt and protect the storage file with the security token and password, click Password
protect the storage file. Then type and confirm the password with which to encrypt the security
token file.
ENWWUsing the Backup wizard17
3.Click Remember all passwords and authentication values to configure the system to securely
cache (save) passwords, which enables unattended backups. Enabling this feature also caches
any authentication values entered in Security Modules.
4.Click Backup Now to start the backup, or click Next to save the backup configuration without
performing a backup at this time.
If you choose to start the backup, the “Backup Complete” page opens at the end of the operation.
Backup Complete
The “Backup Complete” page shows the status of the backup operation.
1.Click View Log to see more details about the backup operation, including any errors.
2.Click Finish to exit the wizard.
Using the Restore wizard
1.In Security Manager, click Backup and Restore, and then click Restore to start the Restore
wizard.
2.Clear the Show Welcome Screen check box if you want to bypass the “Welcome” page the next
time the Restore wizard is run.
3.Click Next. The “File Location” page opens.
4.Refer to the following subsections below to continue.
File Location
The “File Location” page allows you to choose the backup storage file and the security token file (if
applicable) that contain the security credentials to restore.
To select the location of the backup files, follow these steps:
1.If the storage file is not displayed on the page, click the Edit button, and then click Browse to
navigate to the file.
2.If the security token file is not displayed on the page, click the Edit button, and then click
Browse to navigate to the security token file location.
3.If necessary, type the password for the file.
4.Click Next. The “Security Modules” page opens.
Security Modules
This page displays all installed modules that have backup data in the file selected in the “File Location”
page.
18Chapter 2 HP ProtectTools Security Manager for AdministratorsENWW
To select modules to restore:
1.Select the check box at the beginning of each row to add the associated module to the restore list.
Click the Select All or Clear All buttons to quickly add or remove modules from the restore list.
Note that the Status column for the module must display “Ready” or “Needs Authentication” before
you can select it.
NOTE: The check box is unavailable if the module is not ready. After you update a module's
status, click the Refresh button on the right side of the row to update the Status field. Click the
Refresh All button to update the status for all modules.
2.If necessary, type the required value in the Authentication column for each selected module.
Authentication values may be required to access the security device to restore. These values may
include passwords, PINs, and so on. Values typed in these fields are immediately validated.
3.Click Next. The “Confirmation” page opens.
Confirmation
1.If you want to change the restore settings, click Previous to go back to the restore configuration
screens.
2.Confirm that you want to restore the credentials for the listed modules, and then click Restore
Now to begin the restore.
3.Select the files you want to restore and click Finish.
4.Click Yes in the confirmation dialog box
CAUTION: Restoring credentials will overwrite current credentials which could lead to loss of data or
system lockout.
Restore Complete
The “Restore Complete” page shows the status of the restore operation.
Click View Log to see more details about the restore operation, including any errors.
●
Click Finish to exit the wizard.
●
Settings
IN HP ProtectTools Security Manager for Administrators, click Settings to change the settings options.
The following Security Manager settings are available:
Select the Show icon on the taskbar check box to display a taskbar icon that allows you to start
●
the host and activate a specific page and/or launch a specific application.
Select the Show Security Desktop Notifications check box to display notifications generated by
●
the installed modules.
View or bypass the Backup wizard “Welcome” page.
●
View or bypass the Restore wizard “Welcome” page.
●
ENWWSettings19
3Credential Manager for
HP ProtectTools
Credential Manager for HP ProtectTools protects against unauthorized access to your computer using
the following security features:
Alternatives to passwords when logging on to Windows, such as using a Java Card or biometric
●
reader to log on to Windows. For additional information, refer to
on page 21.
Single Sign On feature that automatically remembers credentials for Web sites, applications, and
●
protected network resources.
Support for optional security devices, such as Java Cards and biometric readers.
●
Support for additional security settings, such as requiring authentication using an optional security
●
device to unlock the computer.
Registering credentials
Setup procedures
Logging on to Credential Manager
Depending on the configuration, you can log on to Credential Manager in any of the following ways:
HP ProtectTools Security Manager for Administrators icon in the notification area
●
In Windows Vista®, click Start, click All Programs, and then click HP ProtectTools Security
●
Manager for Administrators.
In Windows XP, click Start, click All Programs, and then click HP ProtectTools Security
●
Manager.
NOTE: In Windows Vista, you must launch the HP ProtectTools Security Manager for Administrators
to make changes.
After logging on to Credential Manager, you can register additional credentials, such as a fingerprint or
a Java Card. For additional information, refer to
At the next logon, you can select the logon policy and use any combination of the registered credentials.
Registering credentials on page 21.
20Chapter 3 Credential Manager for HP ProtectToolsENWW
Loading...
+ 80 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.