Bluetooth is a trademark owned by its
proprietor and used by Hewlett-Packard
Company under license. Intel is a
trademark of Intel Corporation in the U.S.
and other countries and is used under
license. Microsoft and Windows are U.S.
registered trademarks of Microsoft
Corporation.
The information contained herein is subject
to change without notice. The only
warranties for HP products and services are
set forth in the express warranty statements
accompanying such products and services.
Nothing herein should be construed as
constituting an additional warranty. HP shall
not be liable for technical or editorial errors
or omissions contained herein.
First Edition: August 2012
Document Part Number: 702113-001
Table of contents
1 Introduction to security .................................................................................................................................. 1
HP ProtectTools features ..................................................................................................................... 1
HP ProtectTools security product description and common use examples ......................................... 2
Managing HP ProtectTools passwords ................................................................................ 6
Creating a secure password ............................................................................... 7
Backing up credentials and settings .................................................................... 7
2 Getting started ................................................................................................................................................ 8
HP Client Security Setup Wizard .......................................................................................................... 8
HP ProtectTools Security Manager Setup Wizard ............................................................................... 9
HP Client Security Dashboard .............................................................................................................. 9
3 Easy Setup Guide for Small Business ........................................................................................................ 10
Getting started .................................................................................................................................... 10
Viewing and managing the saved authentications in Password Manager ......................... 11
Device Access Manager for HP ProtectTools .................................................................................... 11
Drive Encryption for HP ProtectTools ................................................................................................. 12
4 HP ProtectTools Security Manager Administrative Console .................................................................... 13
Getting started .................................................................................................................................... 13
HP Client Security Setup Wizard ....................................................................................... 13
HP ProtectTools Security Manager Setup Wizard ............................................................. 14
HP Client Security Dashboard ........................................................................................... 14
Opening HP ProtectTools Administrative Console ............................................................................. 15
iii
Using Administrative Console ............................................................................................................ 15
Configuring your system ..................................................................................................................... 16
Setting up authentication for your computer ...................................................................... 16
Data .................................................................................................................................................... 22
Using the Security Manager User Console ........................................................................................ 23
Your personal ID card ........................................................................................................................ 24
My Logons .......................................................................................................................................... 24
Index ................................................................................................................................................................... 63
vi
1Introduction to security
HP ProtectTools Security Manager software provides security features that help protect against
unauthorized access to the computer, networks, and critical data.
ApplicationFeatures
HP ProtectTools Security Manager Administrative Console
(for administrators)
HP ProtectTools Security Manager User Console (for users)
The software modules available for your computer may vary depending on your model.
HP ProtectTools software modules may be preinstalled, preloaded, or available for download from the
HP website. For more information, go to
NOTE:The instructions in this guide are written with the assumption that you have already installed
the applicable HP ProtectTools software modules.
HP ProtectTools features
The following table details the key features of HP ProtectTools modules.
●
Requires Microsoft Windows
access.
Provides access to modules that are configured by an
●
administrator and not available to users.
Allows initial security setup and configures options or
●
requirements for all users.
Allows users to configure options provided by an
●
administrator.
Allows administrators to provide users limited control of
●
some HP ProtectTools modules.
http://www.hp.com.
®
administrator rights to
ModuleKey features
HP ProtectTools Security Manager Administrative
Console
HP ProtectTools Security Manager User ConsoleGeneral users can perform the following functions:
Administrators can perform the following functions:
Use the Security Manager Setup Wizard to set up and configure
●
levels of security and security logon methods.
Configure options hidden from users.
●
●Activate Drive Encryption and configure user access.
Configure Device Access Manager policies and user access.
●
Use administrator tools to add and remove HP ProtectTools
●
users and view user status.
View settings for Encryption Status and Device Access
●
Manager.
●Activate Computrace for HP ProtectTools.
Configure Preferences and Backup and Restore options.
●
HP ProtectTools features1
ModuleKey features
Credential ManagerGeneral users can perform the following functions:
Change user names and passwords.
●
Configure and change user credentials such as a Windows
●
password, fingerprint, face images, smart card, proximity card,
or contactless card.
Password ManagerGeneral users can perform the following functions:
Organize, and set up user names and passwords.
●
Create stronger passwords for enhanced account security.
●
Password Manager fills in and submits the information
automatically.
Streamline the logon process with the Single Sign On feature,
●
which automatically remembers and applies user credentials.
Drive Encryption for HP ProtectTools (select models
only)
Device Access Manager for HP ProtectTools (select
models only)
Theft Recovery (Computrace for HP ProtectTools,
purchased separately)
●Provides complete, full-volume hard drive encryption.
Forces pre-boot authentication in order to decrypt and access
●
the data.
Offers the option to activate self-encrypting drives (select
●
models only).
Allows IT managers to control access to devices based on user
●
profiles.
Prevents unauthorized users from removing data using external
●
storage media, and from introducing viruses into the system
from external media.
Allows administrators to disable access to communication
●
devices for specific individuals or groups of users.
●Requires separate purchase of tracking and tracing
subscriptions to activate.
Provides secure asset tracking.
●
Monitors user activity, as well as hardware and software
●
changes.
Remains active even if the hard drive is reformatted or replaced.
●
HP ProtectTools security product description and
common use examples
Most of the HP ProtectTools security products have both user authentication (usually a password)
and an administrative backup to gain access if passwords are lost, not available, or forgotten, or any
time corporate security requires access.
NOTE:Some of the HP ProtectTools security products are designed to restrict access to data. Data
should be encrypted when it is so important that the user would rather lose the information than have
it compromised. It is recommended that all data be backed up in a secure location.
2Chapter 1 Introduction to security
Password Manager
Password Manager stores user names and passwords, and can be used to:
Save login names and passwords for Internet access or email.
●
Automatically log the user in to a website or email.
●
●Manage and organize authentications.
Select a Web or network asset and directly access the link.
●
View names and passwords when necessary.
●
Example 1: A purchasing agent for a large manufacturer makes most of her corporate transactions
over the Internet. She also frequently visits several popular websites that require login information.
She is keenly aware of security so does not use the same password on every account. The
purchasing agent has decided to use Password Manager to match Web links with different user
names and passwords. When she goes to a website to log on, Password Manager presents the
credentials automatically. If she wants to view the user names and passwords, Password Manager
can be configured to display them.
Password Manager can also be used to manage and organize the authentications. This tool will allow
a user to select a Web or network asset and directly access the link. The user can also view the user
names and passwords when necessary.
Example 2: A hard-working CPA has been promoted and will now manage the entire accounting
department. The team must log on to a large number of client Web accounts, each of which uses
different login information. This login information needs to be shared with other workers, so
confidentiality is an issue. The CPA decides to organize all the Web links, company user names, and
passwords within Password Manager. Once complete, the CPA deploys Password Manager to the
employees so they can work on the Web accounts and never know the login credentials that they are
using.
Drive Encryption for HP ProtectTools (select models only)
Drive Encryption is used to restrict access to the data on the entire computer hard drive or a
secondary drive. Drive Encryption can also manage self-encrypting drives.
Example 1: A doctor wants to make sure only he can access any data on his computer hard drive.
The doctor activates Drive Encryption, which requires pre-boot authentication before Windows login.
Once set up, the hard drive cannot be accessed without a password before the operating system
starts. The doctor could further enhance drive security by choosing to encrypt the data with the selfencrypting drive option.
Drive Encryption for HP ProtectTools does not allow access to the encrypted data even when the
drive is removed, because they are both bound to the original system board.
Example 2: A hospital administrator wants to ensure only doctors and authorized personnel can
access any data on their local computer without sharing their personal passwords. The IT department
adds the administrator, doctors, and all authorized personnel as Drive Encryption users. Now only
authorized personnel can boot the computer or domain using their personal user name and
password.
Device Access Manager for HP ProtectTools (select models only)
Device Access Manager for HP ProtectTools allows an administrator to restrict and manage access
to hardware. Device Access Manager for HP ProtectTools can be used to block unauthorized access
to USB flash drives where data could be copied. It can also restrict access to CD/DVD drives, control
HP ProtectTools security product description and common use examples3
of USB devices, network connections, and so on. An example would be a situation where outside
vendors need access to company computers but should not be able to copy the data to a USB drive.
Example 1: A manager of a medical supply company often works with personal medical records
along with his company information. The employees need access to this data, however, it is
extremely important that the data is not removed from the computer by a USB drive or any other
external storage media. The network is secure, but the computers have CD burners and USB ports
that could allow the data to be copied or stolen. The Manager uses Device Access Manager to
disable the USB ports and CD burners so they cannot be used. Even though the USB ports are
blocked, mouse and keyboards will continue to function.
Example 2: An insurance company does not want its employees to install or load personal software
or data from home. Some employees need access to the USB port on all computers. The IT manager
uses Device Access Manager to enable access for some employees while blocking external access
for others.
Computrace for HP ProtectTools (formerly LoJack Pro) (purchased
separately)
Computrace for HP ProtectTools (purchased separately) is a service that can track the location of a
stolen computer whenever the user accesses the Internet. Computrace for HP ProtectTools can also
help remotely manage and locate computers, as well as monitor computer usage and applications.
Example 1: A school principal instructed the IT department to keep track of all the computers at his
school. After the inventory of the computers was made, the IT administrator registered all the
computers with Computrace so they could be traced in case they were ever stolen. Recently, the
school realized several computers were missing, so the IT administrator alerted the authorities and
Computrace officials. The computers were located and were returned to the school by the authorities.
Example 2: A real estate company needs to manage and update computers all over the world. They
use Computrace to monitor and update the computers without having to send an IT person to each
computer.
Achieving key security objectives
The HP ProtectTools modules can work together to provide solutions for a variety of security issues,
including the following key security objectives:
Protecting against targeted theft
●
Restricting access to sensitive data
●
●Preventing unauthorized access from internal or external locations
Creating strong password policies
●
4Chapter 1 Introduction to security
Protecting against targeted theft
An example of targeted theft would be the theft of a computer containing confidential data and
customer information at an airport security checkpoint. The following features help protect against
targeted theft:
The pre-boot authentication feature, if enabled, helps prevent access to the operating system.
●
Security Manager for HP ProtectTools—See
◦
on page 23.
◦Drive Encryption for HP ProtectTools—See
models only) on page 38.
Encryption helps ensure that data cannot be accessed even if the hard drive is removed and
●
installed into an unsecured system.
Computrace can track the computer's location after a theft.
●
Computrace for HP ProtectTools—See
◦
HP ProtectTools Security Manager
Drive Encryption for HP ProtectTools (select
Theft recovery (select models only) on page 56.
Restricting access to sensitive data
Suppose a contract auditor is working onsite and has been given computer access to review sensitive
financial data; you do not want the auditor to be able to print the files or save them to a writable
device such as a CD. The following feature helps restrict access to data:
Device Access Manager for HP ProtectTools allows IT managers to restrict access to
●
communication devices so that sensitive information cannot be copied from the hard drive. See
Device Class Configuration on page 48.
Preventing unauthorized access from internal or external locations
Unauthorized access to an unsecured business computer presents a very real risk to corporate
network resources such as information from financial services, an executive, or the R&D team, and to
private information such as patient records or personal financial records. The following features help
prevent unauthorized access:
The pre-boot authentication feature, if enabled, helps prevent access to the operating system.:
●
Security Manager for HP ProtectTools—See
◦
on page 23.
Drive Encryption for HP ProtectTools—See
◦
models only) on page 38.
●Security Manager helps ensure that an unauthorized user cannot get passwords or access to
password-protected applications. See
Device Access Manager for HP ProtectTools allows IT managers to restrict access to writable
●
devices so sensitive information cannot be copied from the hard drive. See
Manager for HP ProtectTools (select models only) on page 46.
Creating strong password policies
If a company policy goes into effect that requires the use of strong password policy for dozens of
Web-based applications and databases, Security Manager provides a protected repository for
passwords and Single Sign On convenience. See
HP ProtectTools Security Manager
Drive Encryption for HP ProtectTools (select
HP ProtectTools Security Manager on page 23.
Device Access
HP ProtectTools Security Manager on page 23.
Achieving key security objectives5
Additional security elements
Assigning security roles
In managing computer security (particularly for large organizations), one important practice is to
divide responsibilities and rights among various types of administrators and users.
NOTE:In a small organization or for individual use, these roles may all be held by the same person.
For HP ProtectTools, the security duties and privileges can be divided into the following roles:
Security officer—Defines the security level for the company or network and determines the
●
security features to deploy, such as Drive Encryption.
NOTE:Many of the features in HP ProtectTools can be customized by the security officer in
cooperation with HP. For more information, go to
IT administrator—Applies and manages the security features defined by the security officer. Can
●
also enable and disable some features. For example, if the security officer has decided to deploy
smart cards, the IT administrator can enable both password and smart card mode.
●User—Uses the security features. For example, if the security officer and IT administrator have
enabled smart cards for the system, the user can set the smart card PIN and use the card for
authentication.
CAUTION:Administrators are encouraged to follow “best practices” in restricting end-user
privileges and restricting user access.
http://www.hp.com.
Unauthorized users should not be granted administrative privileges.
Managing HP ProtectTools passwords
Most of the HP ProtectTools Security Manager features are secured by passwords. The following
table lists the commonly used passwords, the software module where the password is set, and the
password function.
The passwords that are set and used by IT administrators only are indicated in this table as well. All
other passwords may be set by regular users or administrators.
HP ProtectTools passwordSet in the following
Windows logon passwordWindows Control Panel or
Security Manager Backup and
Recovery password
Smart card PINCredential ManagerCan be used as multifactor authentication.
module
HP ProtectTools Security
Manager
Security Manager, by
individual user
Function
Can be used for manual logon and for
authentication to access various Security
Manager features.
Protects access to the Security Manager
Backup and Recovery file.
Can be used as Windows authentication.
Authenticates users of Drive Encryption, if
the smart card is selected.
6Chapter 1 Introduction to security
Creating a secure password
When creating passwords, you must first follow any specifications that are set by the program. In
general, however, consider the following guidelines to help you create strong passwords and reduce
the chances of your password being compromised:
Use passwords with more than 6 characters, preferably more than 8.
●
Mix the case of letters throughout your password.
●
Whenever possible, mix alphanumeric characters and include special characters and
●
punctuation marks.
Substitute special characters or numbers for letters in a key word. For example, you can use the
●
number 1 for letters I or L.
Combine words from 2 or more languages.
●
Split a word or phrase with numbers or special characters in the middle, for example,
●
“Mary2-2Cat45.”
Do not use a password that would appear in a dictionary.
●
Do not use your name for the password, or any other personal information, such as your birth
●
date, pet names, or mother's maiden name, even if you spell it backwards.
Change passwords regularly. You might change only a couple of characters that increment.
●
If you write down your password, do not store it in a commonly visible place very close to the
●
computer.
●Do not save the password in a file, such as an email, on the computer.
Do not share accounts or tell anyone your password.
●
Backing up credentials and settings
You can back up credentials in the following ways:
●Use Drive Encryption for HP ProtectTools to select and back up HP ProtectTools credentials.
Use the Backup and Recovery tool in HP ProtectTools Security Manager as a central location
●
from which you can back up and restore security credentials from some of the installed HP
ProtectTools modules.
Additional security elements7
2Getting started
To configure settings for HP ProtectTools, use the HP Client Security Setup Wizard or the HP
ProtectTools Security Manager Setup Wizard.
After you have completed the HP Client Security Setup Wizard, application status is displayed on the
HP Client Security Dashboard.
HP Client Security Setup Wizard
NOTE:Administration of HP ProtectTools requires administrative privileges.
The HP Client Security Setup Wizard guides you through setting up the most commonly used
features of Security Manager. If you have not completed the HP Client Security Setup Wizard
previously, you can launch HP Client Security Setup Wizard in one of the following ways:
From the Start screen, click or tap the HP Client Security app.
▲
– or –
From the Windows desktop, click or tap the HP ProtectTools gadget.
Pages are displayed in the following order:
1.Windows password—Enter your Windows password.
This will protect your Windows account using strong authentication.
2.SpareKey—To enroll the SpareKey option, select three security questions.
3.Enroll fingerprints—If a fingerprint reader and the associated driver are installed, you can
enroll fingerprints. You must select and register at least 2 fingerprints.
4.Drive Encryption—If Drive Encryption for HP ProtectTools is installed, you can activate
encryption on the primary drive:
Software encryption for a traditional hard drive
●
Hardware encryption if a self-encrypting drive is detected.
●
You must save an encryption key on one or more of the following before encryption is enabled:
NOTE:If you cancel the wizard at this time, you will not be able to activate Windows and Drive
Encryption authentication.
●Removable media, such as a USB flash drive with FAT 32 format.
This option is selected by default if a single removable device is detected before the
◦
Drive Encryption page is displayed.
If 2 or more removable devices are detected, select one of the drives displayed.
◦
SkyDrive—This option is available if an Internet connection is detected.
●
A Windows
®
Live ID is required. Enter your ID and password, or sign up for one.
5.The Finish page displays a success notification, and you are prompted to reboot for Drive
Encryption activation.
8Chapter 2 Getting started
HP ProtectTools Security Manager Setup Wizard
NOTE:Administration of HP ProtectTools requires administrative privileges.
The HP ProtectTools Security Manager Setup Wizard guides you through setting up the features of
Security Manager. Besides the settings found in the wizard, administrators can configure many
additional security features through the Administrative Console. These settings apply to the computer
and all users who share the computer.
To launch the HP ProtectTools Security Manager Setup Wizard:
Click Setup Wizard in the left panel of the Administrative Console, and then follow the on-
▲
screen instructions until setup is complete.
Administrators can launch Administrative Console from HP ProtectTools Security Manager User
Console. For more information, see
on page 13.
Security Manager and its applications are available to all users who share this computer.
HP ProtectTools Security Manager Administrative Console
HP Client Security Dashboard
To open HP Client Security if you have previously completed the HP Client Security Setup Wizard:
From the Start screen, type hp and then select HP Client Security.
▲
The dashboard displays a quick overview of features and related status for each application.
Click or tap an application row to display more information for the selected application:
▲
The Configure Now button indicates an application not yet configured. Click or tap the
●
button to open the application page to configure the application.
The Settings button indicates an application with an OK status. Click or tap the button to
●
access the settings for the application.
The User Console is launched for a user configuration.
●
●The Administrative Console is launched for a configuration requiring administrator
privilege.
The Status Dashboard stays open after the User Console or the Administrative Console is
●
launched, and once you have configured settings and closed the Console, the status is
refreshed.
HP ProtectTools Security Manager Setup Wizard9
3Easy Setup Guide for Small Business
This chapter is designed to demonstrate the basic steps to activate the most common and useful
options within HP ProtectTools for Small Business. There are numerous tools and options available in
this software that will allow you to fine-tune your preferences and set your access control. This Easy
Setup Guide will focus on getting each module running with the least amount of setup effort and time.
For additional information, just select the module you are interested in and click the ? or Help button
in the upper right corner. This button will automatically provide information to help you with the
currently displayed window.
Getting started
1.From the Windows desktop, open HP ProtectTools Security Manager by double-clicking the HP
ProtectTools icon in the notification area located at the far right of the taskbar.
2.Enter your Windows password, or create a Windows password.
3.Complete the setup wizard.
NOTE:By default, HP ProtectTools Security Manager is set to Strong Authentication Policy.
This setting is designed to prevent unauthorized access while logged into Windows and should be
used when high security is needed or if users are away from their systems frequently throughout the
day. If you would like to change this setting, click the Session Policy tab, and make your selections.
To have HP ProtectTools Security Manager require authentication only once during the Windows
login, follow this procedure.
1.From the Windows desktop, open HP ProtectTools Security Manager by double-clicking the HP
ProtectTools icon in the notification area located at the far right of the taskbar.
2.In the left pane, click Administration, and then click Administrative Console.
3.In the left pane under System, select Authentication from the Security group.
4.Click the Session Policy tab, and then select the login combination requirements for the
session. To reverse these selections, click Restore Defaults.
5.Click the Apply button when complete.
Password Manager
Passwords! We all have quite a number of them – especially if you regularly access websites or use
applications that require you to log on. The normal user either uses the same password for every
application and website, or gets really creative and promptly forgets which password goes with which
application.
Password Manager can automatically remember your passwords or give you the ability to discern
which sites to remember and which to omit. Once you sign on to the computer, Password Manager
will provide your passwords or credentials for participating applications or websites.
When you access any application or website requiring credentials, Password Manager will
automatically recognize the site, and will ask if you want the software to remember your information. If
you want to exclude certain sites, you can decline the request.
10Chapter 3 Easy Setup Guide for Small Business
To start saving web locations, user names, and passwords:
1.As an example, navigate to a participating website or application, and then click the Password
Manager icon in the upper-left corner of the Web page to add the web authentication.
2.Name the link (optional) and enter a user name and password into Password Manager.
NOTE:The areas that Password Manager will use now and for subsequent visits are
highlighted.
3.When complete, click the OK button.
4.Password Manager can also save your user name and passwords for network shares or
mapped network drives.
Viewing and managing the saved authentications in Password Manager
Password Manager allows you to view, manage, back up, and launch your authentications from a
central location. Password Manager also supports the launching of saved sites from Windows.
To open Password Manager, use one of the following two methods:
Use the keyboard combination of ctrl+Windows logo key+h to open Password Manager, and
●
then click Open to launch and authenticate the saved shortcut.
– or –
Select the Manage tab in Password Manager to open HP ProtectTools Security Manager to edit
●
the credentials.
Password Manager’s Edit option allows you to view and modify the name, login name, and even
reveal the passwords.
HP ProtectTools for Small Business allows all credentials and settings to be backed up and/or copied
to another computer.
Device Access Manager for HP ProtectTools
Device Access Manager can be used to restrict the use of various internal and external storage
devices so your data will remain secured on the hard drive and not walk out the door of your
business. An example would be to allow a user access to your data but block them from copying it to
a CD, personal music player, or USB memory device. Below is an easy way to set this up.
1.From the Windows desktop, open HP ProtectTools Security Manager User Console by double-
clicking the HP ProtectTools icon in the notification area located at the far right of the taskbar.
2.In the left pane of HP ProtectTools Security Manager, click Administration, and then click
Administrative Console.
3.Click Device Access Manager, and then click Device Class Configuration.
4.The next step is to select who will continue to have access while everyone else is blocked.
5.Select the hardware devices that you want to restrict, and then click the Apply button to finish
the process.
6.Select Add, click Advanced, and then click Find Now.
Device Access Manager for HP ProtectTools11
7.Select the desired user, and then click OK > OK > Apply.
Your choice is displayed in the Users/Groups box.
8.Select the Device Class that the user will be using, select Allow or Deny, and then click Apply.
Drive Encryption for HP ProtectTools
Drive Encryption for HP ProtectTools is used to protect your data by encrypting the entire hard drive.
The data on your hard drive will stay protected if your PC is ever stolen and/or if the hard drive is
removed from the original computer and placed in a different computer.
An additional security benefit is that Drive Encryption requires you to properly authenticate using your
user name and password before the operating system starts. This process is called pre-boot
authentication.
To make it easy for you, multiple software modules synchronize passwords automatically, including
Windows user accounts, domains, Drive Encryption for HP ProtectTools, Password Manager, and HP
ProtectTools Security Manager.
Use the following simple steps to activate Drive Encryption for HP ProtectTools:
1.From the Windows desktop, open HP ProtectTools Security Manager by double-clicking the HP
ProtectTools icon in the notification area located at the far right of the taskbar.
2.In the left pane, click Administration, and then click Administrative Console.
3.In the left pane, click Setup Wizard.
4.Select Next in the Welcome screen.
5.Enter your Windows password to start the activation wizard, and then click Next.
6.Skip SpareKey if it is not desired.
7.Check the Drive Encryption box, and then click Next.
8.Check the drive to encrypt, and then click Next.
9.The Drive Encryption configuration window requires a USB flash drive or other external device to
store the encryption recovery key. Keep this recovery key safe and secure because it is used to
recover data or access the drive if the pre-boot password is lost or fails.
10. Click Next, complete the process, and then click Finish. Remove the USB flash drive, and then
reboot the computer when ready.
11. When the system starts, Drive Encryption will request your Windows password. Enter the
password, and then click OK.
NOTE:The computer may appear to run slowly while the drive is encrypting. Once totally
encrypted, the performance will return to normal. As data on the drive is accessed, it is
encrypted or decrypted as required by the administrator.
Drive Encryption authentication will “chain” through Windows login directly to the Windows
desktop so that you will not need to enter your password twice.
12Chapter 3 Easy Setup Guide for Small Business
4HP ProtectTools Security Manager
Administrative Console
HP ProtectTools Security Manager software provides security features that help protect against
unauthorized access to the computer, networks, and critical data. Administration of HP ProtectTools
Security Manager is provided through the Administrative Console feature.
Additional applications are available in the Security Manager User Console to assist with recovery of
the computer if it is lost or stolen (select models only).
Using the Administrative Console, the local administrator can perform the following tasks:
Enabling or disabling security features
●
Specifying required credentials for authentication
To configure settings for HP ProtectTools, use the HP Client Security Setup Wizard or the HP
ProtectTools Security Manager Setup Wizard.
After you have completed the HP Client Security Setup Wizard, application status is displayed on the
HP Client Security Dashboard.
HP Client Security Setup Wizard
NOTE:Administration of HP ProtectTools requires administrative privileges.
The HP Client Security Setup Wizard guides you through setting up the most commonly used
features of Security Manager. If you have not completed the HP Client Security Setup Wizard
previously, you can launch HP Client Security Setup Wizard in one of the following ways:
From the Start screen, click or tap the HP Client Security app.
▲
– or –
From the Windows desktop, click or tap the HP ProtectTools gadget.
Pages are displayed in the following order:
1.Windows password—Enter your Windows password.
This will protect your Windows account using strong authentication.
2.SpareKey—To enroll the SpareKey option, select three security questions.
3.Enroll fingerprints—If a fingerprint reader and the associated driver are installed, you can
enroll fingerprints. You must select and register at least 2 fingerprints.
Getting started13
4.Drive Encryption—If Drive Encryption for HP ProtectTools is installed, you can activate
encryption on the primary drive:
Software encryption for a traditional hard drive
●
Hardware encryption if a self-encrypting drive is detected.
●
You must save an encryption key on one or more of the following before encryption is enabled:
NOTE:If you cancel the wizard at this time, you will not be able to activate Windows and Drive
Encryption authentication.
Removable media, such as a USB flash drive with FAT 32 format.
●
This option is selected by default if a single removable device is detected before the
◦
Drive Encryption page is displayed.
If 2 or more removable devices are detected, select one of the drives displayed.
◦
SkyDrive—This option is available if an Internet connection is detected.
●
A Windows
5.The Finish page displays a success notification, and you are prompted to reboot for Drive
Encryption activation.
®
Live ID is required. Enter your ID and password, or sign up for one.
HP ProtectTools Security Manager Setup Wizard
NOTE:Administration of HP ProtectTools requires administrative privileges.
The HP ProtectTools Security Manager Setup Wizard guides you through setting up the features of
Security Manager. Besides the settings found in the wizard, administrators can configure many
additional security features through the Administrative Console. These settings apply to the computer
and all users who share the computer.
To launch the HP ProtectTools Security Manager Setup Wizard:
Click Setup Wizard in the left panel of the Administrative Console, and then follow the on-
▲
screen instructions until setup is complete.
Administrators can launch Administrative Console from HP ProtectTools Security Manager User
Console. For more information, see
on page 13.
Security Manager and its applications are available to all users who share this computer.
HP Client Security Dashboard
To open HP Client Security if you have previously completed the HP Client Security Setup Wizard:
From the Start screen, type hp and then select HP Client Security.
▲
The dashboard displays a quick overview of features and related status for each application.
Click or tap an application row to display more information for the selected application:
▲
The Configure Now button indicates an application not yet configured. Click or tap the
●
button to open the application page to configure the application.
HP ProtectTools Security Manager Administrative Console
●The Settings button indicates an application with an OK status. Click or tap the button to
access the settings for the application.
The User Console is launched for a user configuration.
●
14Chapter 4 HP ProtectTools Security Manager Administrative Console
The Administrative Console is launched for a configuration requiring administrator
●
privilege.
The Status Dashboard stays open after the User Console or the Administrative Console is
●
launched, and once you have configured settings and closed the Console, the status is
refreshed.
Opening HP ProtectTools Administrative Console
Use the HP ProtectTools Administrative Console for administrative tasks, such as setting system
policies or configuring software. Access the Administrative Console by opening HP ProtectTools
Security Manager:
1.From the Windows desktop, double-click the HP ProtectTools icon in the notification area,
located at the far right of the taskbar.
– or –
From Control Panel, select System and Security, and then select HP ProtectTools Security
Manager.
2.In the left panel of Security Manager User Console, click Administration, and then click
Administrative Console.
Using Administrative Console
HP ProtectTools Administrative Console is the central location for administering HP ProtectTools
Security Manager features and applications.
1.From the Windows desktop, double-click the HP ProtectTools icon in the notification area,
located at the far right of the taskbar.
– or –
From Control Panel, select System and Security, and then select HP ProtectTools Security
Manager.
2.In the left panel of Security Manager User Console, click Administration, and then click
Administrative Console.
The Administrative console displays the following selections under Home in the left panel:
System—Allows you to configure the following security features and authentication for users
●
and devices.
Security
◦
Users
◦
◦Credentials
Applications—Allows you to configure settings for HP ProtectTools Security Manager and for
●
Security Manager applications.
●Data—allows you to configure settings for Drive Encryption (select models only).
●Computer—allows you to configure settings for Device Access Manager
Setup Wizard—Guides you through setting up HP ProtectTools Security Manager.
●
Opening HP ProtectTools Administrative Console15
About—Displays information about HP ProtectTools Security Manager, such as the version
●
number and copyright notice.
Main area—Displays application-specific screens.
●
?—Displays the Administrative Console Help. This icon is located at the top right of the window
frame, next to the minimize and maximize icons.
Configuring your system
The System group is accessed from the menu panel on the left side of HP ProtectTools
Administrative Console. You can use the applications in this group to manage the policies and
settings for the computer, its users, and its devices.
The following applications are included in the System group:
●Security—Manage features, authentication, and settings governing how users interact with this
computer.
Users—Set up, manage, and register users of this computer.
●
●Credentials—Manage settings for security devices built into or attached to the computer and
configure settings.
Setting up authentication for your computer
Within the Authentication application, you can set policies governing access to the computer. You can
specify the credentials required to authenticate each class of user when logging on to Windows or
logging on to websites and programs during a user session.
To set up authentication on your computer:
1.In the left panel of Administrative Console, click Security, and then click Authentication.
2.To configure logon authentication, click the Logon Policy tab, make changes, and then click
3.To configure session authentication, click the Session Policy tab, make changes, and then click
Logon Policy
To define policies governing the credentials required to authenticate a user when logging on to
Windows:
1.In the left panel of Administrative Console, click Security, and then click Authentication.
2.On the Logon Policy tab, select a user category, such as Administrators or Standard users.
3.Click an authentication credential to display the edit dialog.
4.To require a combination of two authentication credentials, click the down arrow to select each
5.To remove a credential, click the X, or right-click the credential, and then click Delete.
Apply.
Apply.
credential, and then click OK.
6.Click Yes on the configuration dialog.
7.To confirm whether users can log on, click Check that HP ProtectTools can log on.
16Chapter 4 HP ProtectTools Security Manager Administrative Console
Loading...
+ 49 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.