HP ProtectTools Getting Started
Page 6
... ...59 Managing Drive Encryption (administrator task 59 Using Enhanced Security with TPM (select models only 60 Encrypting or decrypting individual drive partitions (software encryption only) ...61 Performing an HP SpareKey Recovery 61 Backup and recovery (administrator task 61 Backing up encryption... keys 61 Recovering access to an activated computer using backup keys 62 Recovering encryption keys 63 7 Privacy Manager for HP ProtectTools (select models only 65 Opening Privacy Manager ...65 Setup procedures ...66 Managing Privacy Manager Certificates 66 Installing a Privacy...
... ...59 Managing Drive Encryption (administrator task 59 Using Enhanced Security with TPM (select models only 60 Encrypting or decrypting individual drive partitions (software encryption only) ...61 Performing an HP SpareKey Recovery 61 Backup and recovery (administrator task 61 Backing up encryption... keys 61 Recovering access to an activated computer using backup keys 62 Recovering encryption keys 63 7 Privacy Manager for HP ProtectTools (select models only 65 Opening Privacy Manager ...65 Setup procedures ...66 Managing Privacy Manager Certificates 66 Installing a Privacy...
HP ProtectTools Getting Started
Page 13
...; Uses a Trusted Platform Module (TPM) embedded security chip to protect against unauthorized access to user data and credentials stored on a computer. ● Allows creation of a personal secure drive (PSD), which is reformatted or replaced. Computrace for HP ProtectTools (purchased separately) ● ... separate purchase of tracking and tracing subscriptions to communication devices for specific individuals or groups of users. Device Access Manager for HP ProtectTools (select ● Allows IT managers to control access to devices based on user models only) profiles. ● ...
...; Uses a Trusted Platform Module (TPM) embedded security chip to protect against unauthorized access to user data and credentials stored on a computer. ● Allows creation of a personal secure drive (PSD), which is reformatted or replaced. Computrace for HP ProtectTools (purchased separately) ● ... separate purchase of tracking and tracing subscriptions to communication devices for specific individuals or groups of users. Device Access Manager for HP ProtectTools (select ● Allows IT managers to control access to devices based on user models only) profiles. ● ...
HP ProtectTools Getting Started
Page 15
... drives. Drive Encryption for HP ProtectTools is compromised. Once set up, the hard drive cannot be easily recovered using common tools available on the Internet. File Sanitizer can be permanently removed automatically. Embedded Security protects encryption keys within a hardware TPM (Trusted Platform Module) chip... the data from the hard drive. It is removed, because they access the computer. The stock broker uses Embedded Security TPM migration to allow access to another hard drive. The doctor could further enhance drive security by choosing to run either manually ...
... drives. Drive Encryption for HP ProtectTools is compromised. Once set up, the hard drive cannot be easily recovered using common tools available on the Internet. File Sanitizer can be permanently removed automatically. Embedded Security protects encryption keys within a hardware TPM (Trusted Platform Module) chip... the data from the hard drive. It is removed, because they access the computer. The stock broker uses Embedded Security TPM migration to allow access to another hard drive. The doctor could further enhance drive security by choosing to run either manually ...
HP ProtectTools Getting Started
Page 20
... pet names, or mother's maiden name, even if you spell it backwards. ● Change passwords regularly. Protects the system and the TPM chip from hibernation. In general, however, consider the following module Embedded Security Embedded Security, by IT administrator Embedded Security, by the program.... When used for power-on , restarted, or restored from unauthorized access to all owner functions of Embedded Security. HP ProtectTools password Basic User Key password Emergency Recovery Key password Owner password Set in the following guidelines to help you create strong ...
... pet names, or mother's maiden name, even if you spell it backwards. ● Change passwords regularly. Protects the system and the TPM chip from hibernation. In general, however, consider the following module Embedded Security Embedded Security, by IT administrator Embedded Security, by the program.... When used for power-on , restarted, or restored from unauthorized access to all owner functions of Embedded Security. HP ProtectTools password Basic User Key password Emergency Recovery Key password Owner password Set in the following guidelines to help you create strong ...
HP ProtectTools Getting Started
Page 63
... complete data protection by disabling Sleep or Standby to ensure that Drive Encryption pre- 6 Drive Encryption for HP ProtectTools (select models only) Drive Encryption for more information. boot authentication is displayed before the Windows®... operating system starts. The following tasks can be performed with Drive Encryption: ● Selecting Drive Encryption settings: ◦ Activating a TPM-protected password ◦ Encrypting or decrypting individual drives or partitions using software encryption ◦ Encrypting or decrypting individual self-encrypting drives using ...
... complete data protection by disabling Sleep or Standby to ensure that Drive Encryption pre- 6 Drive Encryption for HP ProtectTools (select models only) Drive Encryption for more information. boot authentication is displayed before the Windows®... operating system starts. The following tasks can be performed with Drive Encryption: ● Selecting Drive Encryption settings: ◦ Activating a TPM-protected password ◦ Encrypting or decrypting individual drives or partitions using software encryption ◦ Encrypting or decrypting individual self-encrypting drives using ...
HP ProtectTools Getting Started
Page 70
...access to the drive is enabled on the TPM security hardware, create a TPM password, and take ownership of Drive Encryption to the left of the TPM. Click Start, click All Programs, click Security and Protection, and then click HP ProtectTools Administrative Console. 2. In the left pane... data cannot be shared with TPM check box. 60 Chapter 6 Drive Encryption for HP ProtectTools (select models only) c. In the Actions pane, click Initialize TPM. Select the Enhance security with Windows TPM.msc and Embedded Security. If Embedded Security for HP ProtectTools. NOTE: Because the ...
...access to the drive is enabled on the TPM security hardware, create a TPM password, and take ownership of Drive Encryption to the left of the TPM. Click Start, click All Programs, click Security and Protection, and then click HP ProtectTools Administrative Console. 2. In the left pane... data cannot be shared with TPM check box. 60 Chapter 6 Drive Encryption for HP ProtectTools (select models only) c. In the Actions pane, click Initialize TPM. Select the Enhance security with Windows TPM.msc and Embedded Security. If Embedded Security for HP ProtectTools. NOTE: Because the ...
HP ProtectTools Getting Started
Page 113
... recovery archive and configuring user access settings. Failure to user data or credentials. 11 Embedded Security for HP ProtectTools (select models only) NOTE: The integrated Trusted Platform Module (TPM) embedded security chip must be installed in your computer to use the embedded chip as an authentication factor...-party applications (such as Microsoft Outlook and Internet Explorer) for protected digital certificate operations when using the Embedded Security software The TPM embedded security chip enhances and enables other HP ProtectTools Security Manager security features.
... recovery archive and configuring user access settings. Failure to user data or credentials. 11 Embedded Security for HP ProtectTools (select models only) NOTE: The integrated Trusted Platform Module (TPM) embedded security chip must be installed in your computer to use the embedded chip as an authentication factor...-party applications (such as Microsoft Outlook and Internet Explorer) for protected digital certificate operations when using the Embedded Security software The TPM embedded security chip enhances and enables other HP ProtectTools Security Manager security features.
HP ProtectTools Getting Started
Page 114
...the Basic User Key password. If you will perform the following tasks: ● Produces a Basic User Key that protects access to select TPM Embedded Security, and then press enter. 5. To save your password in Computer Setup: 1. To initialize the embedded security chip: 1. ...state, and then change the setting to the Embedded Security configuration. 8. Press f10 to accept the changes to Enable. 7. The HP ProtectTools Embedded Security Initialization Wizard opens. 2. Encrypted information cannot be accessed or recovered without this password. 104 Chapter 11 Embedded Security for...
...the Basic User Key password. If you will perform the following tasks: ● Produces a Basic User Key that protects access to select TPM Embedded Security, and then press enter. 5. To save your password in Computer Setup: 1. To initialize the embedded security chip: 1. ...state, and then change the setting to the Embedded Security configuration. 8. Press f10 to accept the changes to Enable. 7. The HP ProtectTools Embedded Security Initialization Wizard opens. 2. Encrypted information cannot be accessed or recovered without this password. 104 Chapter 11 Embedded Security for...
HP ProtectTools Getting Started
Page 131
.... Windows user account The profile for the HP ProtectTools Embedded Security Chip. Trusted Contact invitation An email that information on to a network or to an individual computer. Glossary 121 Trusted Platform Module (TPM) embedded security chip The generic term for ... Logon Security Protects your Windows account(s) by storing information specific to become a Trusted Contact. user Anyone enrolled in Drive Encryption. A TPM authenticates a computer, rather than a user, by requiring the use of Trusted Contacts. Trusted Contact recipient A person who sends signed ...
.... Windows user account The profile for the HP ProtectTools Embedded Security Chip. Trusted Contact invitation An email that information on to a network or to an individual computer. Glossary 121 Trusted Platform Module (TPM) embedded security chip The generic term for ... Logon Security Protects your Windows account(s) by storing information specific to become a Trusted Contact. user Anyone enrolled in Drive Encryption. A TPM authenticates a computer, rather than a user, by requiring the use of Trusted Contacts. Trusted Contact recipient A person who sends signed ...
HP ProtectTools Getting Started
Page 134
...changing 107 personal secure drive 105 resetting user password 107 setup procedures 103 emergency recovery 104 emergency recovery password, setting 104 enabling TPM chip 103 encrypted documents, emailing 77 encrypting drives 53 files and folders 105 hard drive 58 hard drive partitions 61 encryption hardware...scenes 44 eSATA 99 Excel, adding signature line 75 excluding assets from automatic deleting 85 F face, settings 26 features, HP ProtectTools 2 File Sanitizer for HP ProtectTools 81, 86 easy setup 18 opening 82 setup procedures 82 fingerprints enrolling 44 settings 25 free space bleaching 83 ...
...changing 107 personal secure drive 105 resetting user password 107 setup procedures 103 emergency recovery 104 emergency recovery password, setting 104 enabling TPM chip 103 encrypted documents, emailing 77 encrypting drives 53 files and folders 105 hard drive 58 hard drive partitions 61 encryption hardware...scenes 44 eSATA 99 Excel, adding signature line 75 excluding assets from automatic deleting 85 F face, settings 26 features, HP ProtectTools 2 File Sanitizer for HP ProtectTools 81, 86 easy setup 18 opening 82 setup procedures 82 fingerprints enrolling 44 settings 25 free space bleaching 83 ...
HP ProtectTools Getting Started
Page 136
... files 88 sealed email message 74 signed Microsoft Office document 77 W Windows Logon password 9 wizard, HP ProtectTools Setup 13 Word, adding signature line 75 T theft recovery 101 theft, protecting against 7 third-party certificate, importing 67 TPM 60 TPM chip enabling 103 initializing 104 Trusted Contacts adding 70 backing up 78 checking revocation status...
... files 88 sealed email message 74 signed Microsoft Office document 77 W Windows Logon password 9 wizard, HP ProtectTools Setup 13 Word, adding signature line 75 T theft recovery 101 theft, protecting against 7 third-party certificate, importing 67 TPM 60 TPM chip enabling 103 initializing 104 Trusted Contacts adding 70 backing up 78 checking revocation status...