HP ProtectTools Guide
Page 34
... starts up. Encrypting everything on your company could be provided out-of the Trusted Platform Module (TPM) embedded security chip 26 Chapter 5 Drive Encryption for HP ProtectTools ENWW Drive Encryption for HP ProtectTools can be enabled through the Setup Wizard in at the Drive Encryption login screen, which is not supported on...
... starts up. Encrypting everything on your company could be provided out-of the Trusted Platform Module (TPM) embedded security chip 26 Chapter 5 Drive Encryption for HP ProtectTools ENWW Drive Encryption for HP ProtectTools can be enabled through the Setup Wizard in at the Drive Encryption login screen, which is not supported on...
HP ProtectTools Guide
Page 35
...Console. 2. NOTE: If you use a recovery key to log in Drive Encryption for HP ProtectTools: ● Manage Drive Encryption ◦ Activate a TPM-protected password ◦ Encrypt or decrypt individual drives ● Backup and Recovery ◦ Create backup keys ◦ Register for online recovery ◦ Manage...will log in to access the data on , rather than at the Drive Encryption logon screen: NOTE: If the Windows administrator has enabled Pre-boot Security in the HP ProtectTools Administrative Console, you must first decrypt all encrypted drives. Select your user name, and then ...
...Console. 2. NOTE: If you use a recovery key to log in Drive Encryption for HP ProtectTools: ● Manage Drive Encryption ◦ Activate a TPM-protected password ◦ Encrypt or decrypt individual drives ● Backup and Recovery ◦ Create backup keys ◦ Register for online recovery ◦ Manage...will log in to access the data on , rather than at the Drive Encryption logon screen: NOTE: If the Windows administrator has enabled Pre-boot Security in the HP ProtectTools Administrative Console, you must first decrypt all encrypted drives. Select your user name, and then ...
HP ProtectTools Guide
Page 61
...ProtectTools protects against unauthorized access to user data or credentials. 9 Embedded Security for HP ProtectTools NOTE: The integrated Trusted Platform Module (TPM) embedded security chip must be installed in your computer to use the embedded chip as an authentication factor when the user logs ... (such as Microsoft Outlook and Internet Explorer) for protected digital certificate operations when using the Embedded Security software The TPM embedded security chip enhances and enables other HP ProtectTools Security Manager security features. Embedded Security for HP ProtectTools.
...ProtectTools protects against unauthorized access to user data or credentials. 9 Embedded Security for HP ProtectTools NOTE: The integrated Trusted Platform Module (TPM) embedded security chip must be installed in your computer to use the embedded chip as an authentication factor when the user logs ... (such as Microsoft Outlook and Internet Explorer) for protected digital certificate operations when using the Embedded Security software The TPM embedded security chip enhances and enables other HP ProtectTools Security Manager security features. Embedded Security for HP ProtectTools.
HP ProtectTools Guide
Page 62
...or a virus taking ownership of the screen. 2. Type your preferences and exit Computer Setup, use the arrow keys to Enable. 7. Select Embedded security device state and change to select TPM Embedded Security, and then press Enter. 5. In the Security menu, use the arrow keys to select File, and click... Save Changes and Exit. Failure to enable and initialize the embedded security chip. Follow the steps in the following 2 ...
...or a virus taking ownership of the screen. 2. Type your preferences and exit Computer Setup, use the arrow keys to Enable. 7. Select Embedded security device state and change to select TPM Embedded Security, and then press Enter. 5. In the Security menu, use the arrow keys to select File, and click... Save Changes and Exit. Failure to enable and initialize the embedded security chip. Follow the steps in the following 2 ...
HP ProtectTools Guide
Page 75
... Embedded Security for HP ProtectTools backup file, creating 57 basic user account 55 Basic User Key 55 certification data, restoring 57 enabling TPM chip 54 encrypted e-mail 56 encrypting files and folders 56 initializing chip 55 installing 54 migrating keys 57 owner password, changing ...password 6 Personal Secure Drive 56 resetting user password 57 setup procedures 54 emergency recovery 55 emergency recovery token password definition 6 setting 55 enabling TPM chip 54 encrypting a drive 26 encrypting files and folders 56 F F10 Setup password 7 features, HP ProtectTools 2 File Sanitizer 49 File...
... Embedded Security for HP ProtectTools backup file, creating 57 basic user account 55 Basic User Key 55 certification data, restoring 57 enabling TPM chip 54 encrypted e-mail 56 encrypting files and folders 56 initializing chip 55 installing 54 migrating keys 57 owner password, changing ...password 6 Personal Secure Drive 56 resetting user password 57 setup procedures 54 emergency recovery 55 emergency recovery token password definition 6 setting 55 enabling TPM chip 54 encrypting a drive 26 encrypting files and folders 56 F F10 Setup password 7 features, HP ProtectTools 2 File Sanitizer 49 File...
HP ProtectTools Guide
Page 77
... 7 shred profile customizing 48 predefined 48 selecting or creating 48 simple delete profile customizing 49 smart card setting up 16 T targeted theft, protecting against 4, 62 TPM chip enabling 54 initializing 55 tracking a computer 62 U unauthorized access, preventing 5 W Windows Logon password 7 ENWW Index 69
... 7 shred profile customizing 48 predefined 48 selecting or creating 48 simple delete profile customizing 49 smart card setting up 16 T targeted theft, protecting against 4, 62 TPM chip enabling 54 initializing 55 tracking a computer 62 U unauthorized access, preventing 5 W Windows Logon password 7 ENWW Index 69
Quality Testing on HP Business PCs
Page 3
... and Modems Parallel, Serial, USB 1.1/2.0 and Firewire (IEEE 1394) ports Trusted Platform (TPM) hardware Flash memory readers / devices PC Card / Express Card interfaces Software Image Development Software Image Development is executed only when certain conditions are met. .... Rigorous database rules help verify that each component used to validate the following elements: Test Management-Database tools enable test teams to generate and manage test plans and test procedures in a centralized, repeatable environment with minimal time and effort...
... and Modems Parallel, Serial, USB 1.1/2.0 and Firewire (IEEE 1394) ports Trusted Platform (TPM) hardware Flash memory readers / devices PC Card / Express Card interfaces Software Image Development Software Image Development is executed only when certain conditions are met. .... Rigorous database rules help verify that each component used to validate the following elements: Test Management-Database tools enable test teams to generate and manage test plans and test procedures in a centralized, repeatable environment with minimal time and effort...