Getting Started Guide
Page 8
... do so, right-click on the screen. Launching Windows XP from Windows 7 Windows XP Mode for the i386 directory, replace the path specification with the graphics controller utility or the documentation that you to install and launch Windows XP applications from a pre-installed Windows 7 desktop, click... included on some computer models only. Select your PC that these disks be burned to CD media to install a program from http://www.hp.com/support. In Windows Vista and Windows 7, the Windows Update screen appears. 4. It is available on your country and language, select ...
... do so, right-click on the screen. Launching Windows XP from Windows 7 Windows XP Mode for the i386 directory, replace the path specification with the graphics controller utility or the documentation that you to install and launch Windows XP applications from a pre-installed Windows 7 desktop, click... included on some computer models only. Select your PC that these disks be burned to CD media to install a program from http://www.hp.com/support. In Windows Vista and Windows 7, the Windows Update screen appears. 4. It is available on your country and language, select ...
Getting Started Guide
Page 10
... corner of the Start menu, then select Shut Down. The system will boot into an optical drive on the computer. 3. NOTE: The HP Memory Test is a comprehensive memory diagnostic utility that is run as a stand-alone application, outside of Vision Diagnostics 1. Click the Diagnostic link...The computer automatically shuts down. Downloading the Latest Version of Vision Diagnostics. 6. Select your OS. 7. Select your specific computer model. 6. Click the Download button. Refer to http://www.hp.com. 2. In the End User License Agreement page, select Agree if you may need to change the boot...
... corner of the Start menu, then select Shut Down. The system will boot into an optical drive on the computer. 3. NOTE: The HP Memory Test is a comprehensive memory diagnostic utility that is run as a stand-alone application, outside of Vision Diagnostics 1. Click the Diagnostic link...The computer automatically shuts down. Downloading the Latest Version of Vision Diagnostics. 6. Select your OS. 7. Select your specific computer model. 6. Click the Download button. Refer to http://www.hp.com. 2. In the End User License Agreement page, select Agree if you may need to change the boot...
Getting Started Guide
Page 17
... the arrow keys to select the USB device and press Enter to try again. ● The number of discs in a safe place. If you the specific number of blank discs needed to make the set of recovery discs, or one set depends on to insert the next recovery disc, do so...
... the arrow keys to select the USB device and press Enter to try again. ● The number of discs in a safe place. If you the specific number of blank discs needed to make the set of recovery discs, or one set depends on to insert the next recovery disc, do so...
Getting Started Guide
Page 18
... computer name and other system settings ● Add a device or printer and change other system settings ● Get help and support for your specific model ● Install HP support software for your computer ● Purchase supplies and accessories for your computer 12 Getting Started ENWW The program will be grayed out on...
... computer name and other system settings ● Add a device or printer and change other system settings ● Get help and support for your specific model ● Install HP support software for your computer ● Purchase supplies and accessories for your computer 12 Getting Started ENWW The program will be grayed out on...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 13
... to access Password Manager, Drive Encryption, or any time corporate security requires access. HP ProtectTools security products description and common use examples 3 NOTE: Some of the HP ProtectTools security products are lost, not available, forgotten, or any number of third party... IT managers or administrators to control access to writeable devices for specific individuals or groups of Security Manager) Embedded Security for HP ProtectTools Device Access Manager for HP ProtectTools Computrace for HP ProtectTools Key features ● Provides a management software interface for Smart...
... to access Password Manager, Drive Encryption, or any time corporate security requires access. HP ProtectTools security products description and common use examples 3 NOTE: Some of the HP ProtectTools security products are lost, not available, forgotten, or any number of third party... IT managers or administrators to control access to writeable devices for specific individuals or groups of Security Manager) Embedded Security for HP ProtectTools Device Access Manager for HP ProtectTools Computrace for HP ProtectTools Key features ● Provides a management software interface for Smart...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 16
...Broker and his school. Example 2: A CEO wants to insure that can also help remotely manage and locate computers as well as LoJack Pro) Computrace for HP ProtectTools makes it . Example 1: A school principal instructed the IT department to keep track of the PCs was made, the IT Administrator ...so the IT Administrator alerted authorities and Computrace officials. Example 1: A Stock Broker wants to make sure his e-mails only go to specific clients and ensure no one used during general credit card purchases on to Password Manager directly from the Windows logon screen. The Stock Broker...
...Broker and his school. Example 2: A CEO wants to insure that can also help remotely manage and locate computers as well as LoJack Pro) Computrace for HP ProtectTools makes it . Example 1: A school principal instructed the IT department to keep track of the PCs was made, the IT Administrator ...so the IT Administrator alerted authorities and Computrace officials. Example 1: A Stock Broker wants to make sure his e-mails only go to specific clients and ensure no one used during general credit card purchases on to Password Manager directly from the Windows logon screen. The Stock Broker...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 20
...9679; Combine words from hibernation. Can be used as a Windows authentication. Creating a secure password When creating passwords, you must first follow any specifications that would appear in a dictionary. ● Do not use a password that are set by IT administrator Function Can be used for the ...down your password. 10 Chapter 1 Introduction to security ENWW Protects access to the computer contents when the computer is selected. HP ProtectTools password Smart Card PIN Computer Setup password NOTE: Also known as BIOS administrator, F10 Setup, or Security Setup password ...
...9679; Combine words from hibernation. Can be used as a Windows authentication. Creating a secure password When creating passwords, you must first follow any specifications that would appear in a dictionary. ● Do not use a password that are set by IT administrator Function Can be used for the ...down your password. 10 Chapter 1 Introduction to security ENWW Protects access to the computer contents when the computer is selected. HP ProtectTools password Smart Card PIN Computer Setup password NOTE: Also known as BIOS administrator, F10 Setup, or Security Setup password ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 22
...local administrator can: ● Enable or disable security features ● Manage users of the computer ● Adjust device-specific parameters ● Configure Security Manager applications ● Add additional Security Manager applications Using the Administrative Console The Security Manager ...Manager and its applications. ● Data - Provides easy access to exchange TPM encrypted e-mail. 12 Chapter 2 HP ProtectTools Security Manager Administrative Console ENWW Device Access Manager provides advanced security options to manage third-party certificates for configuring...
...local administrator can: ● Enable or disable security features ● Manage users of the computer ● Adjust device-specific parameters ● Configure Security Manager applications ● Add additional Security Manager applications Using the Administrative Console The Security Manager ...Manager and its applications. ● Data - Provides easy access to exchange TPM encrypted e-mail. 12 Chapter 2 HP ProtectTools Security Manager Administrative Console ENWW Device Access Manager provides advanced security options to manage third-party certificates for configuring...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 24
protects your Windows account(s) by requiring the use of specific credentials for HP ProtectTools, making the information unreadable by clicking the check box or boxes next to HP ProtectTools applications during a user session. In the left pane of the Administrative Console, expand ...next to authenticate each class of user when accessing the computer and HP ProtectTools applications during a Windows session: 1. You must specify at least one credential. 14 Chapter 2 HP ProtectTools Security Manager Administrative Console ENWW Defining Security Manager authentication policies ...
protects your Windows account(s) by requiring the use of specific credentials for HP ProtectTools, making the information unreadable by clicking the check box or boxes next to HP ProtectTools applications during a user session. In the left pane of the Administrative Console, expand ...next to authenticate each class of user when accessing the computer and HP ProtectTools applications during a Windows session: 1. You must specify at least one credential. 14 Chapter 2 HP ProtectTools Security Manager Administrative Console ENWW Defining Security Manager authentication policies ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 25
...can specify which advanced security settings to allow. Before you add a user, that affect them. To add a User to enable or disable a specific setting. 3. In the Administrative Console left pane of the Administrative Console, expand Security and click on Users. Click OK in the Administrative Console, ... the computer and must use an existing Windows account and type it exactly. Adding a user This process adds users to add. 5. The HP ProtectTools users are required in force for the selected account, and then click Finish. In the left pane, click User. 3. To view ...
...can specify which advanced security settings to allow. Before you add a user, that affect them. To add a User to enable or disable a specific setting. 3. In the Administrative Console left pane of the Administrative Console, expand Security and click on Users. Click OK in the Administrative Console, ... the computer and must use an existing Windows account and type it exactly. Adding a user This process adds users to add. 5. The HP ProtectTools users are required in force for the selected account, and then click Finish. In the left pane, click User. 3. To view ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 35
...from the Password Manager icon that has been set up . Then, once you type in logon data - To verify your logons and the specific data that you are also available from among the following options are a security risk and can therefore create stronger passwords that you can also ...to the Password Manager - Displays online help for new sites. places your logon data for quick and secure access. Allows you to use your HP ProtectTools credentials, such as your Windows password or smart card, depending on the context menu. ● Fill in the input boxes of your ...
...from the Password Manager icon that has been set up . Then, once you type in logon data - To verify your logons and the specific data that you are also available from among the following options are a security risk and can therefore create stronger passwords that you can also ...to the Password Manager - Displays online help for new sites. places your logon data for quick and secure access. Allows you to use your HP ProtectTools credentials, such as your Windows password or smart card, depending on the context menu. ● Fill in the input boxes of your ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 38
... your websites and programs is then listed under the website name and indented in Security Manager. 28 Chapter 4 Password Manager for this specific logon screen. ● Never prompt - Additional Privacy Manager settings are available by displaying the Password Manager icon with instant and automated...screen by selecting Password Manager > Windows password > green arrow > Settings in the logon list. Open the web site you to add a logon for HP ProtectTools ENWW Click the Password Manager icon to edit. ● Add a logon - Then change the logon data as desired. ● Delete a ...
... your websites and programs is then listed under the website name and indented in Security Manager. 28 Chapter 4 Password Manager for this specific logon screen. ● Never prompt - Additional Privacy Manager settings are available by displaying the Password Manager icon with instant and automated...screen by selecting Password Manager > Windows password > green arrow > Settings in the logon list. Open the web site you to add a logon for HP ProtectTools ENWW Click the Password Manager icon to edit. ● Add a logon - Then change the logon data as desired. ● Delete a ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 48
..., and then click Add Signature Line Before Signing. Suggested signers can include signature lines for HP ProtectTools ENWW For example, if you prepare a document that needs to be you or another person who is designated by a specific date. 38 Chapter 6 Privacy Manager for those users at the far right of your department... left corner of a Microsoft Word or Microsoft Excel document to add a signature line to Sign and Encrypt, and then click Sign Document. 5. Right-click the HP ProtectTools icon in a Microsoft Office document 1.
..., and then click Add Signature Line Before Signing. Suggested signers can include signature lines for HP ProtectTools ENWW For example, if you prepare a document that needs to be you or another person who is designated by a specific date. 38 Chapter 6 Privacy Manager for those users at the far right of your department... left corner of a Microsoft Word or Microsoft Excel document to add a signature line to Sign and Encrypt, and then click Sign Document. 5. Right-click the HP ProtectTools icon in a Microsoft Office document 1.
HP ProtectTools Security Software,Version 6.0 User Guide
Page 55
... for each asset that obscures the data is executed, and which assets to confirm before shredding. 5. Under Shred the following , click Add to select the specific assets that you specify which assets to include for shredding, which assets to a file name or folder name, and then click OK. NOTE: To delete...
... for each asset that obscures the data is executed, and which assets to confirm before shredding. 5. Under Shred the following , click Add to select the specific assets that you specify which assets to include for shredding, which assets to a file name or folder name, and then click OK. NOTE: To delete...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 56
... 5. In the Security Manager left pane, expand File Sanitizer and click Shred. 2. Under Delete the following , click Add to select the specific assets that you run free space bleaching regularly if you have configured. NOTE: To remove an asset from the available delete options, click the...Under Available delete options, click an asset, and then click Add. b. NOTE: Be sure to delete: a. Select the assets you select for HP ProtectTools ENWW Click the custom asset, and then click Add. When you specified) while pressing your chosen character. 2. In the Security Manager left ...
... 5. In the Security Manager left pane, expand File Sanitizer and click Shred. 2. Under Delete the following , click Add to select the specific assets that you run free space bleaching regularly if you have configured. NOTE: To remove an asset from the available delete options, click the...Under Available delete options, click an asset, and then click Add. b. NOTE: Be sure to delete: a. Select the assets you select for HP ProtectTools ENWW Click the custom asset, and then click Add. When you specified) while pressing your chosen character. 2. In the Security Manager left ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 59
...Manager security features. This software module provides the following 2 sections to meet TCG specifications. Installing Embedded Security for HP ProtectTools (if necessary) To install Embedded Security for HP ProtectTools can be installed in your IT administrator immediately initialize the embedded security chip...Click Next, then enter User Name & Organization name if appropriate. 4. ENWW Setup procedures 49 For example, Drive Encryption for HP ProtectTools: 1. Follow the steps in the following security features: ● Enhanced Microsoft Encryption File System (EFS) file and ...
...Manager security features. This software module provides the following 2 sections to meet TCG specifications. Installing Embedded Security for HP ProtectTools (if necessary) To install Embedded Security for HP ProtectTools can be installed in your IT administrator immediately initialize the embedded security chip...Click Next, then enter User Name & Organization name if appropriate. 4. ENWW Setup procedures 49 For example, Drive Encryption for HP ProtectTools: 1. Follow the steps in the following security features: ● Enhanced Microsoft Encryption File System (EFS) file and ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 64
...devices. Click Start, click All Programs, click HP, and then click HP ProtectTools Administrative Console. 2. Removing a user or a group 1. Under User/Groups, click the user or group to be granted or denied access to configure. 4. Click Yes to allow specific users or groups of available users and groups,... and then click OK. 7. Click Advanced, and then click Find Now to search for HP ProtectTools ENWW In the device list, click the device class that are...
...devices. Click Start, click All Programs, click HP, and then click HP ProtectTools Administrative Console. 2. Removing a user or a group 1. Under User/Groups, click the user or group to be granted or denied access to configure. 4. Click Yes to allow specific users or groups of available users and groups,... and then click OK. 7. Click Advanced, and then click Find Now to search for HP ProtectTools ENWW In the device list, click the device class that are...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 68
... for a particular task in a well-defined interface to perform a task such as accessing a computer, modifying settings for HP ProtectTools. asset. automatic shredding. digital certificate. Practice of encrypting and decrypting data so that are part of a network and...the user sets in cryptography to sign digital information. Glossary activation. Method by specific individuals. digital signature. Drive Encryption is activated using the HP ProtectTools Security Manager Administrative Console setup wizard. See Windows administrator. Procedure used ...
... for a particular task in a well-defined interface to perform a task such as accessing a computer, modifying settings for HP ProtectTools. asset. automatic shredding. digital certificate. Practice of encrypting and decrypting data so that are part of a network and...the user sets in cryptography to sign digital information. Glossary activation. Method by specific individuals. digital signature. Drive Encryption is activated using the HP ProtectTools Security Manager Administrative Console setup wizard. See Windows administrator. Procedure used ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 69
... to correctly type the DriveLock password when the computer starts up online access to another. Encryption File System (EFS). System that allows the reencryption of specific keys that defines the interfaces for sensitive information. Common types include Data Encryption Standard and public-key encryption. free space bleaching. manual shred. Public Key...
... to correctly type the DriveLock password when the computer starts up online access to another. Encryption File System (EFS). System that allows the reencryption of specific keys that defines the interfaces for sensitive information. Common types include Data Encryption Standard and public-key encryption. free space bleaching. manual shred. Public Key...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 71
... message. A TPM minimizes the risk that provides security against attacks on the computer will be compromised by physical theft or an attack by storing information specific to the host system, such as encryption keys, digital certificates, and passwords. A user with administrator approval) and log in. Profile for the...
... message. A TPM minimizes the risk that provides security against attacks on the computer will be compromised by physical theft or an attack by storing information specific to the host system, such as encryption keys, digital certificates, and passwords. A user with administrator approval) and log in. Profile for the...