HP ProtectTools Security Software,Version 6.0User Guide
x ENWW
1 Introduction to securityHP ProtectTools security software provides security features that help protect against unauthorizedaccess to the computer, n
HP ProtectTools featuresThe following table details the key features of HP ProtectTools modules:Module Key featuresHP ProtectTools Security Manager Ad
Module Key featuresSmart Card Security (part of Security Manager)●Provides a management software interface for Smart Card.HP ProtectTools Smart Card i
Example 1: A Purchasing Agent for a large manufacturer makes most of her corporate transactionsover the Internet. She also frequently visits several p
Both Embedded Security and Drive Encryption for HP ProtectTools will not allow access to theencrypted data even when the drive is removed because they
Example 1: A Stock Broker wants to make sure his e-mails only go to specific clients and ensure noone can fake the e-mail account and intercept it. Th
●Creating strong password policies● Addressing regulatory security mandatesProtecting against targeted theftAn example of this type of incident would
Preventing unauthorized access from internal or external locationsUnauthorized access to an unsecured business PC presents a very tangible risk to cri
Additional security elementsAssigning security rolesIn managing computer security, one important practice is to divide responsibilities and rights amo
© Copyright 2009, 2010 Hewlett-PackardDevelopment Company, L.P. Theinformation contained herein is subject tochange without notice.Microsoft, Windows
HP ProtectTools password Set in thisHP ProtectTools moduleFunctionSmart Card PIN Smart Card Security Can be used as a multifactor authenticationoption
Backing up credentials and settingsYou can back up credentials in the following ways:●Use Drive Encryption for HP ProtectTools to select and back up H
2 HP ProtectTools Security ManagerAdministrative ConsoleAbout HP ProtectTools Administrative ConsoleAdministration of HP ProtectTools Security Manager
●Management Tools - Opens your default browser to a web page where you can discoveradditional management applications and tools that extend the featur
Enabling security featuresThe security features enabled here apply to all users of this computer.1. In the left pane of the Administrative Console, ex
4. In the Policy section drop-down list, choose whether ANY (only one) of the specified credentialsare required, or if ALL of the specified credential
Removing a userNOTE: This procedure does not delete the Windows user account. It only removes that accountfrom Security Manager. To completely remove
Encrypting DrivesDrive Encryption for HP ProtectTools allows you to encrypt computer hard drives, making the harddrive unreadable and inaccessible to
3 HP ProtectTools Security ManagerHP ProtectTools Security Manager allows you to significantly increase the security of your computer.Through the use
NOTE: If the HP Password Manager level of security has not been configured, users must stillenter their Windows password at the Windows login screen,
About This BookThis guide provides basic information for upgrading this computer model.WARNING! Text set off in this manner indicates that failure to
Initializing the Smart CardHP ProtectTools Security Manager can support a number of different Smart Cards. The number andtype of characters used as PI
Shredding or bleaching filesFile Sanitizer for HP ProtectTools deletes files by overwriting them with meaningless data. Thisprocess, referred to as “s
Adding applicationsAdditional applications may be available to add new features to this program.1. Click Start, click All Programs, click HP, and then
5. Enter your password to verify your identity, then click the arrow button.6. Enter a path and name for the storage file. By default, the file will b
Changing your Windows user name and pictureYour Windows user name and a picture are displayed in the upper left corner of Security Manager.To change y
4 Password Manager forHP ProtectToolsLogging on to Windows, websites and programs is easier and more secure when you use PasswordManager.Password Mana
●Open Password Manager - Launches the Security Manager dashboard on the PasswordManager page.●Help - Displays online help for the Password Manager app
4. Edit your logon information.● Click the arrows to the right of a logon field to populate it with one of several preformattedchoices.●Optionally, cl
Managing your logonsPassword Manager makes managing your logon information - user names, passwords and multiplelogon accounts - painless and intuitive
5 Drive Encryption for HP ProtectToolsNOTE: Drive Encryption for HP ProtectTools is available on some models only.In today’s world, a computer belongi
iv About This Book ENWW
Setup proceduresOpening Drive Encryption1. Click Start, click All Programs, click HP, and then click HP ProtectTools AdministrativeConsole.2. Click Dr
Encrypting or decrypting individual drives1. In the Administrative Console left pane, expand Drive Encryption, and click EncryptionManagement.2. Click
6 Privacy Manager for HP ProtectToolsPrivacy Manager is a tool used to obtain Certificates of Authority, which verify the source, integrity,and securi
set up as an account within Microsoft Outlook on the same computer from which you are requestingthe Privacy Manager Certificate.Requesting a Privacy M
Renewing a Privacy Manager CertificateWhen your Privacy Manager Certificate nears expiration, you will be notified that you need to renewit:1. In the
3. On the “Migration File” page, click Browse to search for the .dppsm file that you created whenyou installed or exported the Privacy Manager Certifi
Adding a Trusted Contact1. In the Security Manager left pane, expand Privacy Manager and click Trusted Contacts, andthen click the Invite Contacts but
NOTE: When the e-mail is received by the Trusted Contact recipient, the recipient must openthe e-mail and click Accept in the lower-right corner of th
Configuring Privacy Manager in a Microsoft Office document1. Right-click the HP ProtectTools icon in the notification area, at the far right of the ta
To add a suggested signer to a Microsoft Word or Microsoft Excel document:1. In Microsoft Word or Microsoft Excel, create and save a document.2. Click
Table of contents1 Introduction to security ...
5. Click OK.6. Authenticate using your chosen security logon method.If you later decide to edit the document, follow the steps in Signing a Microsoft
Using Privacy Manager in Microsoft OutlookWhen Privacy Manager is installed, a Privacy button is displayed on the Microsoft Outlook toolbar,and a Send
Advanced tasksMigrating Privacy Manager Certificates and Trusted Contacts to a differentcomputerYou can securely migrate your Privacy Manager Certific
7 File Sanitizer for HP ProtectToolsFile Sanitizer is a tool that allows you to securely erase critical files and folders (personal informationor file
Setting a free space bleaching scheduleNOTE: Free space bleaching is for those assets that you delete using the Windows Recycle Bin orfor manually del
To select a predefined shred profile:1. In the Security Manager left pane, expand File Sanitizer and click Settings.2. Click a predefined shred profil
NOTE: It is highly recommended that you run free space bleaching regularly if you use the simpledelete option.1. In the Security Manager left pane, ex
Manually shredding one assetCAUTION: Shredded assets cannot be recovered. Carefully consider which items you select formanual shredding.1. Right-click
Aborting a shred or free space bleaching operationWhen a shred or free space bleaching operation is in progress, a message above theHP ProtectTools Se
8 Embedded Security forHP ProtectToolsNOTE: The integrated Trusted Platform Module (TPM) embedded security chip must be installed inyour computer to u
Specifying device settings ... 16Configuring Applicatio
To enable the embedded security chip in Computer Setup:1. Open Computer Setup by turning on or restarting the computer, and then pressing F10 while th
NOTE: To use secure e-mail, you must first configure the e-mail client to use a digitalcertificate that is created with Embedded Security. If a digita
Advanced tasksBacking up and restoringThe Embedded Security backup feature creates an archive that contains certification information tobe restored in
9 Device Access Manager forHP ProtectToolsThis security tool is available to administrators only. Device Access Manager for HP ProtectTools hasthe fol
NOTE: If background service is not running, it attempts to start now. Click Yes to allow it.5. Click OK.Device class configuration (advanced)More sele
Scenario: A Simple Configuration policy is configured to deny all non-Device Administrators accessto the DVD/CD-ROM drive.Result: A JITA enabled user
5. Set the JITA period to the required time.6. Click the Extendable check box.7. Click the Apply button.The selected user can now login, authenticate
10 Computrace for HP ProtectToolsComputrace for HP ProtectTools is a tool that can remotely monitor, manage, and track yourcomputer.Once activated, Co
Glossaryactivation.The task that must be completed before any of the Drive Encryption features are accessible. Drive Encryption isactivated using the
Drive Encryption key recovery service.The SafeBoot Recovery Service. It stores a copy of the encryption key, enabling you to access your computer ifyo
Logging in after Drive Encryption is activated ... 30Advanced tasks ...
A task that allows the user to decrypt one or more chat history sessions, displaying the Contact Screen Name(s)in plain text and making the session av
A communication session during which trusted messages are sent from a trusted sender to a Trusted Contact.trusted message.A communication session duri
IndexAaccesscontrolling 53preventing unauthorized 8accessing HP ProtectToolsSecurity 6accountbasic user 50advanced tasksDevice Access Manager 54Embedd
changing Windows username 24changing your picture 24device access 21drive encryption status 21logging in 18managing communicationprivacy 20managing pa
viewing Privacy Managercertificate details 33viewing trusted contactdetails 37Rrestrictingaccess to sensitive data 7device access 53Ssecuritykey objec
Setting a shred schedule ....... 44Selecting or creating a
Creating an extendable JITA for a user or group ................ 55Disabling a JITA for a user or group
Commenti su questo manuale