Microsoft, Windows and Windows Vista are
either trademarks or registered trademarks
of Microsoft Corporation in the United
States and/or other countries.
The only warranties for HP products and
services are set forth in the express
warranty statements accompanying such
products and services. Nothing herein
should be construed as constituting an
additional warranty. HP shall not be liable
for technical or editorial errors or omissions
contained herein.
This document contains proprietary
information that is protected by copyright.
No part of this document may be
photocopied, reproduced, or translated to
another language without the prior written
consent of Hewlett-Packard Company.
HP ProtectTools Security Software User
Guide
Third Edition: November 2010
Document Part Number: 581746-003
About This Book
This guide provides basic information for upgrading this computer model.
WARNING!Text set off in this manner indicates that failure to follow directions could result in bodily
harm or loss of life.
CAUTION:Text set off in this manner indicates that failure to follow directions could result in
damage to equipment or loss of information.
NOTE:Text set off in this manner provides important supplemental information.
ENWWiii
iv About This BookENWW
Table of contents
1 Introduction to security .................................................................................................................................. 1
HP ProtectTools features ..................................................................................................................... 2
HP ProtectTools security products description and common use examples ........................................ 3
Credential Manager (Password Manager) for HP ProtectTools .......................................... 3
Embedded Security for HP ProtectTools ............................................................................. 4
Drive Encryption for HP ProtectTools .................................................................................. 4
File Sanitizer for HP ProtectTools ........................................................................................ 5
Device Access Manager for HP ProtectTools ...................................................................... 5
Privacy Manager for HP ProtectTools ................................................................................. 5
Computrace for HP ProtectTools (formerly known as LoJack Pro) ..................................... 6
Accessing HP ProtectTools Security .................................................................................................... 6
Migrating Privacy Manager Certificates and Trusted Contacts to a different computer ..... 42
Exporting Privacy Manager Certificates and Trusted Contacts ......................... 42
Importing Privacy Manager Certificates and Trusted Contacts ......................... 42
7 File Sanitizer for HP ProtectTools ............................................................................................................... 43
Index ................................................................................................................................................................... 62
ENWWix
xENWW
1Introduction to security
HP ProtectTools security software provides security features that help protect against unauthorized
access to the computer, networks, and critical data. Enhanced security functionality is provided by
several HP ProtectTools software modules.
HP ProtectTools provides two versions that can be utilized: HP ProtectTools Security Manager
Administrative Console and HP ProtectTools Security Manager (for general users). Both
Administrator and user versions are available in the Start > All Programs > HP menu.
FunctionFeatures
HP ProtectTools Security Manager Administrative
Console
HP ProtectTools Security Manager (for general users)
Requires Microsoft Windows system administrator rights to
●
access
Access to modules to be configured by an administrator and
●
not available to the general user
Allows initial security setup and configures options or
●
requirements for all users
Allows users to configure options provided by an administrator
●
Can restrict access and only allow a user limited controls of
●
some HP ProtectTools modules
NOTE:Password Manager, Smart Card Security, Face Recognition (some models) and Drive
Encryption are configured using the Security Manager setup wizard. HP Professional Desktop
systems do not currently support fingerprint devices.
HP ProtectTools software modules may be preinstalled, preloaded, or available as a configurable
option or as an after market option. Visit
http://www.hp.com for more information.
NOTE:The instructions in this guide are written with the assumption that you have already installed
the applicable HP ProtectTools software modules.
ENWW1
HP ProtectTools features
The following table details the key features of HP ProtectTools modules:
ModuleKey features
HP ProtectTools Security Manager Administrative
Console
HP ProtectTools Security Manager (for general
users)
Credential Manager for HP ProtectTools (part of
Security Manager)
The Security Manager setup wizard is used by administrators to
●
set up and configure levels of security and security logon
methods.
●Configure options hidden from basic users.
Activate Drive Encryption and configure user access.
●
Configure Device Access Manager configurations and user
●
access.
Administrator tools are used to add and remove
●
HP ProtectTools users and view user status.
Configure and change File Sanitizer Shred, Bleaching, and
●
Settings.
View settings for Encryption Status and Device Access
●
Manager.
Use Privacy Manager to increase security of e-mails and
●
documents.
Activate Computrace for HP ProtectTools
●
●Configure Preferences and Backup and Restore options.
Organize, set up and change user names and passwords.
●
Configure and change user credentials such as Windows
●
password and Smart Card.
Acts as a personal password vault, streamlining the logon
●
process with the Single Sign On feature, which automatically
remembers and applies user credentials.
Create and Organize single sign on user names and passwords.
●
Drive Encryption for HP ProtectTools
Privacy Manager for HP ProtectTools●Used to obtain Certificates of Authority, which verify the source,
File Sanitizer for HP ProtectTools
Provides complete, full-volume hard drive encryption.
●
Forces pre-boot authentication in order to decrypt and access
●
the data on the hard drive.
●Offers the option to activate SED drives (Self Encrypting
Drives), if equipped.
integrity, and security of communication when using Microsoft email and Microsoft Office documents.
Allows you to securely shred digital assets (securely delete
●
sensitive information including application files, historical or
Web-related content, or other confidential data) on your
computer and periodically bleach the hard drive (write over data
that has been previously deleted but is still present on the hard
drive in order to make recovery of the data more difficult).
2Chapter 1 Introduction to securityENWW
ModuleKey features
Smart Card Security (part of Security Manager)
Embedded Security for HP ProtectTools
Device Access Manager for HP ProtectTools●Allows IT managers or administrators to control access to
Provides a management software interface for Smart Card.
●
HP ProtectTools Smart Card is a personal security device that
protects authentication data requiring both the card and a PIN
number to grant access. The Smart Card can be used to access
Password Manager, Drive Encryption, or any number of third
party access points.
●Change PIN number.
Uses a Trusted Platform Module (TPM) embedded security chip
●
(if equipped) to help protect against unauthorized access to
sensitive user data or credentials stored locally on a PC.
●Allows creation of a personal secure drive (PSD), which is
useful in protecting user file and folder information.
Supports third-party applications (such as Microsoft Outlook and
●
Internet Explorer) for protected digital certificate operations.
devices such as USB ports, optical drives, personal music
players, etc. based on user profiles.
Prevents unauthorized users from removing data using external
●
storage media and from introducing viruses into the system from
external media.
The administrator can disable access to writeable devices for
●
specific individuals or groups of users.
Allows the administrator to schedule when access is provided to
●
hardware.
Computrace for HP ProtectTools
Provides secure asset tracking.
●
Can monitor user activity along with hardware and software
●
changes.
Remains active even if the hard drive is reformatted or replaced.
●
●Requires separate purchase of tracking and tracing subscription
to activate.
HP ProtectTools security products description and
common use examples
Most of the HP ProtectTools security products have both a user authentication (usually a password)
and an administrative backup to gain access if passwords are lost, not available, forgotten, or any
time corporate security requires access.
NOTE:Some of the HP ProtectTools security products are designed to restrict access to data. Data
should be encrypted when it is so important that the user would rather lose the information then have
it compromised. It is recommended that all data be backed up in a secure location.
Credential Manager (Password Manager) for HP ProtectTools
Credential Manager (part of Security Manager) is a repository for user names and passwords. It is
most often used to save login names and passwords for Internet access or web mail. Credential
Manager can automatically log the user into a web site or mail.
ENWWHP ProtectTools security products description and common use examples3
Example 1: A Purchasing Agent for a large manufacturer makes most of her corporate transactions
over the Internet. She also frequently visits several popular web sites that require login information.
She is keenly aware of security so does not use the same password on every account. The
Purchasing Agent has decided to use Credential Manager to match web links with different user
names and passwords. When she goes to a web site to log in, Credential Manager presents the
credentials automatically. If she wants to view the user names and password, Credential Manager
can be configured to reveal them.
Credential Manager can also be used to manage and organize the authentications. This tool will allow
a user to select what web or network asset they choose and directly access the link. The user can
also view the user names and passwords when necessary.
Example 2: A hard working CPA has been promoted and will now manage the entire accounting
department. The team must log into a large number of client web accounts with each account using
different login information. This login information needs to be shared with other workers so
confidentiality is an issue. The CPA decides to organize all the web links, company user names, and
passwords within Credential Manager for HP ProtectTools. Once complete, the CPA deploys
Credential Manager to the employees so they can work on the web accounts and never know the
login credentials that they are using.
Embedded Security for HP ProtectTools
Embedded Security for HP ProtectTools provides the ability to create a Personal Secure Drive. This
capability allows the user to create a virtual drive partition on the PC that is completely hidden until
accessed. Embedded Security could be used anywhere data needs to be secretly protected while the
rest of the data is not encrypted.
Example 1: A Warehouse Manager has a computer that multiple workers access intermittently
throughout the day. The Manager wants to encrypt and hide confidential warehouse data on the
computer. He wants the data to be so secure that even if someone steals the hard drive, they cannot
decrypt the data or read it. The Warehouse Manager decides to activate Embedded Security and
moves the confidential data to the Personal Secure Drive. The Warehouse Manager can enter a
password and access the confidential data just like another hard drive. When he logs off or reboots
the Personal Secure Drive, it cannot be seen or opened without the proper password. The workers
never see the confidential data when they access the computer.
Embedded Security protects encryption keys within a hardware TPM (Trusted Computing Module)
chip located on the motherboard. It is the only encryption tool that meets the minimum requirements
to resist password attacks where someone would attempt to guess the decryption password.
Embedded Security can also encrypt the entire drive and e-mail.
Example 2: A Stock Broker wants to transport extremely sensitive data to another computer using a
portable drive. She wants to make sure that only these two computers can open the drive, even if the
password is compromised. The Stock Broker uses Embedded Security TPM migration to allow a
second computer to have the necessary encryption keys to decrypt the data. During the transport
process, even with the password, only the two physical computers can decrypt the data.
Drive Encryption for HP ProtectTools
Drive Encryption is most often used to restrict access to the data on the entire computer hard drive or
a secondary hard drive. Drive Encryption can also manage SED (Self Encrypting Drive) drives.
Example 1: A Doctor wants to make sure only he can access any data on his computer hard drive.
The Doctor activates Drive Encryption which enables preboot or requiring authentication before
Windows login. Once set up, the hard drive cannot be opened without a password before it even
boots to the operating system. The Doctor could further enhance drive security by choosing to
encrypt the data with the SED (Self Encrypting Drive) option.
4Chapter 1 Introduction to securityENWW
Both Embedded Security and Drive Encryption for HP ProtectTools will not allow access to the
encrypted data even when the drive is removed because they are both bound to the original
motherboard.
Example 2: A Hospital Administrator wants to ensure only doctors and authorized personnel can
access any data on their local computer without sharing their personal passwords. The IT department
adds the Administrator, doctors, and all authorized personnel as Drive Encryption users. Now only
authorized personnel can boot to the computer or Domain using their personal username and
password.
File Sanitizer for HP ProtectTools
File Sanitizer for HP ProtectTools is used to permanently delete data, including Internet browser
activity, temporary files, previously deleted data, or any other information. File Sanitizer can be
configured to run either manually or automatically on a user-defined schedule.
Example 1: An Attorney often deals with sensitive client information and wants to ensure data on
deleted files cannot be recovered. The Attorney uses File Sanitizer to “Shred” deleted files so it is
almost impossible to recover.
Normally when Windows deletes data, it actually does not erase the data from the hard drive. Instead,
it marks the hard drive sectors as available for future use. Until the data is written over, it can be
easily recovered using common tools available on the Internet. File Sanitizer overwrites the sectors
with random data (multiple times when necessary) thereby making the deleted data unreadable and
unrecoverable.
Example 2: A Researcher wants to shred deleted data, temporary files, browser activity, etc.
automatically when she logs off. She uses File Sanitizer to schedule “Shredding” so she can select
the common files or any custom files to be permanently removed automatically.
Device Access Manager for HP ProtectTools
Device Access Manager for HP ProtectTools can be used to block unauthorized access to USB flash
drives where data could be copied. It can also restrict access to CD/DVD drives, control of USB
devices, network connections, etc. An administrator can also schedule when or how long drives can
be accessed. An example would be a situation where outside vendors need access to company
computers but should not be able to copy the data to a USB drive. Device Access Manager for HP
ProtectTools allows an administrator to restrict and manage access to hardware.
Example 1: A Manager of a medical supply company often works with personal medical records
along with his company information. The employees need access to this data, however, it is
extremely important that the data is not removed from the computer by a USB drive or any other
external storage media. The network is secure, but the computers have CD burners and USB ports
that could allow the data to be copied or stolen. The Manager uses Device Access Manager to
disable the USB ports and CD burners so they cannot be used. Even though the USB ports are
blocked, mouse and keyboards will continue to function.
Example 2: An Insurance company does not want its employees to install or load personal software
or data from home. Some employees need access to the USB port on all computers. The IT Manager
uses Device Access Manager to enable access for some employees while blocking external access
to others.
Privacy Manager for HP ProtectTools
Privacy Manager for HP ProtectTools is used when Internet e-mail communications need to be
secured. The user can create and send e-mail that can only be opened by an authenticated recipient.
With Privacy Manger, the information cannot be compromised or intercepted by an imposter.
ENWWHP ProtectTools security products description and common use examples5
Example 1: A Stock Broker wants to make sure his e-mails only go to specific clients and ensure no
one can fake the e-mail account and intercept it. The Stock Broker signs himself and his clients up
with Privacy Manager. Privacy Manager issues them a Certificate of Authentication (CA) to each user.
Using this tool, the Stock Broker and his clients must authenticate before the e-mail is exchanged.
Privacy Manager for HP ProtectTools makes it easy to send and receive e-mail where the recipient
has been verified and authenticated. The mail service can also be encrypted. The encryption process
is similar to the one used during general credit card purchases on the Internet.
Example 2: A CEO wants to insure that only the members of the board of directors can view the
information he sends through e-mail. The CEO uses the option to encrypt the e-mail sent and
received from the directors. Privacy Manager Certificate of Authentication allows the CEO and
directors to have a copy of the encryption key so only they can decrypt the confidential e-mail.
Computrace for HP ProtectTools (formerly known as LoJack Pro)
Computrace for HP ProtectTools is a service that can track the location of a stolen computer
whenever the user accesses the Internet.
Example 1: A school principal instructed the IT department to keep track of all the computers at his
school. After the inventory of the PCs was made, the IT Administrator registered all the computers
with Computrace so they could be traced in case they were ever stolen. Recently, the school realized
several computers were missing, so the IT Administrator alerted authorities and Computrace officials.
The computers were located and were returned to the school by the authorities.
Computrace for HP ProtectTools can also help remotely manage and locate computers as well as
monitor computer usage and applications.
Example 2: A real estate company needs to manage and update computers all over the world. They
use Computrace to monitor and update the computers without having to send an IT person to each
computer.
Accessing HP ProtectTools Security
To access HP ProtectTools Security Manager from the Windows Start menu:
In Windows, click Start, click All Programs, click HP, and then click HP ProtectTools Security
▲
Manager.
To access HP ProtectTools Security Manager Administrative Console from the Windows Start menu:
In Windows, click Start, click All Programs, click HP, and then click HP ProtectTools
▲
Administrative Console.
NOTE:After you have configured the Password Manager module, you can also open
HP ProtectTools by logging on to Password Manager directly from the Windows logon screen.
Achieving key security objectives
The HP ProtectTools modules can work together to provide solutions for a variety of security issues,
including the following key security objectives:
Protecting against targeted theft
●
Restricting access to sensitive data
●
Preventing unauthorized access from internal or external locations
●
6Chapter 1 Introduction to securityENWW
Creating strong password policies
●
●Addressing regulatory security mandates
Protecting against targeted theft
An example of this type of incident would be the targeted theft of a computer or its confidential data
and customer information. This can easily occur in open office environments or in unsecured areas.
The following features help protect the data if the computer is stolen:
●The pre-boot authentication feature, if enabled, helps prevent access to the operating system.
See the following chapters:
Password Manager for HP ProtectTools on page 25
◦
Embedded Security for HP ProtectTools on page 49
◦
Drive Encryption for HP ProtectTools on page 29
◦
DriveLock helps ensure that data cannot be accessed even if the hard drive is removed and
●
installed into an unsecured system.
The Personal Secure Drive feature, provided by the Embedded Security for HP ProtectTools
●
module, encrypts sensitive data to help ensure it cannot be accessed without authentication.
See the following chapter:
Embedded Security for HP ProtectTools on page 49
◦
Computrace can track the computer's location after a theft. See the following chapter:
●
Computrace for HP ProtectTools on page 57
◦
Restricting access to sensitive data
Suppose a contract auditor is working on site and has been given computer access to review
sensitive financial data; you do not want the auditor to be able to print the files or save them to a
writeable device such as a CD. The following feature helps restrict access to data:
Device Access Manager for HP ProtectTools allows IT managers to restrict access to writeable
devices so sensitive information cannot be printed or copied from the hard drive onto removable
media. See
Device class configuration (advanced) on page 54.
ENWWAchieving key security objectives7
Preventing unauthorized access from internal or external locations
Unauthorized access to an unsecured business PC presents a very tangible risk to critical data such
as information from financial services, an executive, or R&D team, and to private information such as
patient records or personal financial records. The following features help prevent unauthorized
access:
The pre-boot authentication feature, if enabled, helps prevent access to the operating system.
●
See the following chapters:
Password Manager for HP ProtectTools on page 25
◦
Embedded Security for HP ProtectTools on page 49
◦
Drive Encryption for HP ProtectTools on page 29
◦
●Embedded Security for HP ProtectTools helps strengthen the protection of sensitive user data or
credentials stored locally on a PC. See the following chapter:
Embedded Security for HP ProtectTools on page 49
◦
Password Manager for HP ProtectTools helps ensure that an unauthorized user cannot get
●
passwords or access to password-protected applications. See the following chapter
Password Manager for HP ProtectTools on page 25
◦
Device Access Manager for HP ProtectTools allows IT managers to restrict access to writeable
●
devices so sensitive information cannot be copied from the hard drive. See the following chapter:
Device Access Manager for HP ProtectTools on page 53
◦
The Personal Secure Drive feature encrypts sensitive data to help ensure it cannot be accessed
●
without authentication. See the following section:
◦Embedded Security for HP ProtectTools on page 49
File Sanitizer allows you to securely delete data by shredding critical files and folders or
●
bleaching the hard drive (write over data that has been previously deleted but is still present on
the hard drive in order to make recovery of the data more difficult). See the following chapter:
File Sanitizer for HP ProtectTools on page 43
◦
Privacy Manager allows you to obtain Certificates of Authority when using Microsoft mail, Office
●
documents, and Instant Messenger, making the process of sending and saving important
information safe and secure. See the following chapter:
Privacy Manager for HP ProtectTools on page 32
◦
Creating strong password policies
If a mandate goes into effect that requires the use of strong password policy for dozens of Webbased applications and databases, Password Manager for HP ProtectTools provides a protected
repository for passwords and Single Sign On convenience. See the following chapter:
Password Manager for HP ProtectTools on page 25
●
8Chapter 1 Introduction to securityENWW
Additional security elements
Assigning security roles
In managing computer security, one important practice is to divide responsibilities and rights among
various types of administrators and users.
NOTE:In a small organization or for individual use, these roles may all be held by the same person.
For HP ProtectTools, the security duties and privileges can be divided into the following roles:
Security officer—Defines the security level for the company or network and determines the
●
security features to deploy, such as Drive Encryption or Embedded Security.
●IT administrator—Applies and manages the security features defined by the security officer. Can
also enable and disable some features. For example, if the security officer has decided to deploy
Smart Cards, the IT administrator can enable both password and Smart Card mode.
User—Uses the security features. For example, if the security officer and IT administrator have
●
enabled Smart Cards for the system, the user can use the card for authentication.
Managing HP ProtectTools passwords
Most of the HP ProtectTools Security Manager features are secured by passwords. The following
table lists the commonly used passwords, the software module where the password is set, and the
password function.
The passwords that are set and used by IT administrators only are indicated in this table as well. All
other passwords may be set by regular users or administrators.
HP ProtectTools passwordSet in this
HP ProtectTools module
Password Manager logon
password
Basic User Key password
NOTE: Also known as:
Embedded Security password
Emergency Recovery Token
password
NOTE: Also known as:
Emergency Recovery Token Key
password
Password ManagerThis password offers 2 options:
Embedded SecurityUsed to access Embedded Security
Embedded Security, by IT
administrator
Function
It can be used in a separate logon to
●
access Password Manager after
logging on to Windows.
●It can be used in place of the
Windows logon process, allowing
access to Windows and Password
Manager simultaneously.
features, such as secure e-mail, file, and
folder encryption. When used for power-on
authentication, also protects access to the
computer contents when the computer is
turned on, restarted, or restored from
hibernation.
Protects access to the Emergency
Recovery Token, which is a backup file for
the embedded security chip.
Owner passwordEmbedded Security, by IT
administrator
Protects the system and the TPM chip from
unauthorized access to all owner functions
of Embedded Security.
ENWWAdditional security elements9
HP ProtectTools passwordSet in this
HP ProtectTools module
Function
Smart Card PINSmart Card SecurityCan be used as a multifactor authentication
Computer Setup password
NOTE: Also known as BIOS
administrator, F10 Setup, or
Security Setup password
Power-on passwordBIOSProtects access to the computer contents
Windows Logon passwordWindows Control PanelCan be used for manual logon.
Creating a secure password
When creating passwords, you must first follow any specifications that are set by the program. In
general, however, consider the following guidelines to help you create strong passwords and reduce
the chances of your password being compromised:
Use passwords with more than 6 characters, preferably more than 8.
●
option.
Can be used as a Windows authentication.
Authenticates users of Drive Encryption, if
the Smart Card token is selected.
BIOS, by IT administratorProtects access to the Computer Setup
utility.
when the computer is turned on, restarted,
or restored from hibernation.
Mix the case of letters throughout your password.
●
Whenever possible, mix alphanumeric characters and include special characters and
●
punctuation marks.
Substitute special characters or numbers for letters in a key word. For example, you can use the
●
number 1 for letters I or L.
●Combine words from 2 or more languages.
Split a word or phrase with numbers or special characters in the middle, for example,
●
“Mary2-2Cat45.”
●Do not use a password that would appear in a dictionary.
●Do not use your name for the password, or any other personal information, such as birth date,
pet names, or mother's maiden name, even if you spell it backwards.
Change passwords regularly. You might change only a couple of characters that increment.
●
●If you write down your password, do not store it in a commonly visible place very close to the
computer.
Do not save the password in a file, such as an e-mail, on the computer.
●
Do not share accounts or tell anyone your password.
●
10Chapter 1 Introduction to securityENWW
Backing up credentials and settings
You can back up credentials in the following ways:
Use Drive Encryption for HP ProtectTools to select and back up HP ProtectTools credentials.
●
You can also register for Online Drive Encryption Key Recovery Service to store a backup copy
of your encryption key, which will enable you to access your computer if you forget your
password and do not have access to your local backup.
Use Embedded Security for HP ProtectTools to back up HP ProtectTools credentials.
●
Use the Backup and Recovery tool in HP ProtectTools Security Manager as a central location
●
from which you can back up and restore security credentials from installed HP ProtectTools
modules.
ENWWAdditional security elements11
2HP ProtectTools Security Manager
Administrative Console
About HP ProtectTools Administrative Console
Administration of HP ProtectTools Security Manager is provided through the Administrative Console.
Using the console, the local administrator can:
Enable or disable security features
●
Manage users of the computer
●
●Adjust device-specific parameters
Configure Security Manager applications
●
Add additional Security Manager applications
●
Using the Administrative Console
The Security Manager Administrative Console is the central location for administering
HP ProtectTools Security Manager.
To open the console:
Select Start > All Programs > HP > HP ProtectTools Administrative Console, or
●
Click the Administration link in the lower-left corner of the Security Manager console.
●
The Administrative Console consists of two panes: a left pane and a right pane. The left pane
contains the administrative tools. The right pane contains the working area for configuring the tools.
The Administrative Console left pane consists of the following:
●Home - Provides easy access to commonly used tasks, including enabling security features,
specifying security credentials, and managing users.
System - Manages configuration of system-wide security features, users, and authentication
●
devices such as smart card readers.
Applications - Includes tools for configuring the behavior of Security Manager and its
●
applications.
Data - Provides tools for managing drive encryptions and backing up and recovering encryption
various types of devices that could compromise PC security and set access permissions for
various users and groups.
Communications - Privacy Manager allows the user to manage third-party certificates for e-mail
●
authentication. Embedded Security allows the user to exchange TPM encrypted e-mail.
12Chapter 2 HP ProtectTools Security Manager Administrative ConsoleENWW
Management Tools - Opens your default browser to a web page where you can discover
●
additional management applications and tools that extend the features of Security Manager as
well as a means to stay notified when new applications and updates are available.
Links - Provides the following:
●
◦Setup Wizard - Launches the Setup Wizard, which guides you through the initial
configuration of Security Manager.
Help - Opens the help file, which provides information about Security Manager and its
◦
applications.
About - Displays information about HP ProtectTools Security Manager, including the
◦
version number and copyright notice.
Getting Started - Setup Wizard
Administration of HP ProtectTools Security Manager requires administrative privileges.
The HP ProtectTools Security Manager Setup Wizard guides you through setting up the security
features of HP ProtectTools. However, there is a wealth of additional functionality available through
the HP ProtectTools Security Manager Console. The same settings found in the wizard, as well as
additional security features, can be configured through the console, accessed from the Windows Start
menu or from a link within the Administrative console. These settings apply to the computer and all
users who share the computer.
The first time that you log on to Windows, you will be prompted to set up HP ProtectTools Security
Manager. Click OK to launch the Security Manager Setup wizard, which will guide you through the
basic steps in configuring the program.
NOTE:You can also launch the Security Wizard by clicking Security Wizard in the bottom section
of the left pane on the Administrative Console.
Follow the on-screen instructions in the Setup Wizard until setup is complete.
If you do not complete the wizard, it will launch automatically until you click Do not show this wizardagain.
To use the HP ProtectTools Security Manager applications, launch HP ProtectTools Security
Manager from the Start menu or by right-clicking the Security Manager icon in the taskbar
notification area (system tray). The Security Manager console and its applications are available to all
users who share this computer.
Configuring your system
The System group of applications is accessed from the Tools menu on the left side of the
Administrative Console.
By using the applications included in this group, you can configure and manage the policies and
settings for this computer, its users and devices.
The following applications are included in the System group.
Security - Manage security features, authentication policies and other settings that govern how
●
users authenticate when logging on to the computer or HP ProtectTools applications.
Users - Set up, manage and enroll users of this computer.
●
Devices - Manage settings for security devices built-in or connected to the computer.
●
ENWWGetting Started - Setup Wizard13
Loading...
+ 51 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.