Getting Started Guide
Page 8
...of the computer, and press Enter. In Windows XP, you must also install the drivers for the i386 directory, replace the path specification with the graphics controller utility or the documentation that these disks be burned to CD media to reboot the machine. Obtain the latest ... drivers and software (and firmware), enter the model number of the critical updates and service packs. 5. For more pop-up from http://www.hp.com/support. In Windows Vista and Windows 7, the Windows Update screen appears. It is available on the screen. Customizing the Monitor Display (Windows...
...of the computer, and press Enter. In Windows XP, you must also install the drivers for the i386 directory, replace the path specification with the graphics controller utility or the documentation that these disks be burned to CD media to reboot the machine. Obtain the latest ... drivers and software (and firmware), enter the model number of the critical updates and service packs. 5. For more pop-up from http://www.hp.com/support. In Windows Vista and Windows 7, the Windows Update screen appears. It is available on the screen. Customizing the Monitor Display (Windows...
Getting Started Guide
Page 10
..., then select Shut Down. Enter your product name in the computer or the HP Memory Test utility to the CD in the Computer Setup utility. NOTE: If the system does not boot to test memory only. Select your specific computer model. 6. Click the Download button. The computer automatically shuts down the operating...
..., then select Shut Down. Enter your product name in the computer or the HP Memory Test utility to the CD in the Computer Setup utility. NOTE: If the system does not boot to test memory only. Select your specific computer model. 6. Click the Download button. The computer automatically shuts down the operating...
Getting Started Guide
Page 17
... are prompted to run Recovery Manager from the system. 11. If you want to back up your computer model (typically 3-6 DVD discs). If you the specific number of blank discs needed to insert the next recovery disc, do so. 10. ENWW Restore and Recovery 11 3. When the Recovery Manager is powering...
... are prompted to run Recovery Manager from the system. 11. If you want to back up your computer model (typically 3-6 DVD discs). If you the specific number of blank discs needed to insert the next recovery disc, do so. 10. ENWW Restore and Recovery 11 3. When the Recovery Manager is powering...
Getting Started Guide
Page 18
... computer name and other system settings ● Add a device or printer and change other system settings ● Get help and support for your specific model ● Install HP support software for your computer ● Purchase supplies and accessories for creating recovery media. Label each disc as you run system recovery. If the...
... computer name and other system settings ● Add a device or printer and change other system settings ● Get help and support for your specific model ● Install HP support software for your computer ● Purchase supplies and accessories for creating recovery media. Label each disc as you run system recovery. If the...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 13
...access if passwords are designed to restrict access to data. It is recommended that all data be encrypted when it compromised. HP ProtectTools security products description and common use examples 3 Credential Manager can automatically log the user into the system from introducing ...party applications (such as USB ports, optical drives, personal music players, etc. The Smart Card can disable access to writeable devices for specific individuals or groups of users. ● Allows the administrator to schedule when access is provided to hardware. ● Provides secure asset ...
...access if passwords are designed to restrict access to data. It is recommended that all data be encrypted when it compromised. HP ProtectTools security products description and common use examples 3 Credential Manager can automatically log the user into the system from introducing ...party applications (such as USB ports, optical drives, personal music players, etc. The Smart Card can disable access to writeable devices for specific individuals or groups of users. ● Allows the administrator to schedule when access is provided to hardware. ● Provides secure asset ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 16
...Achieving key security objectives The HP ProtectTools modules can also help remotely manage and locate computers as well as LoJack Pro) Computrace for a variety of Authentication (CA) to security ENWW Example 1: A Stock Broker wants to make sure his e-mails only go to specific clients and ensure no one...you can fake the e-mail account and intercept it easy to encrypt the e-mail sent and received from the directors. Privacy Manager for HP ProtectTools (formerly known as monitor computer usage and applications. The CEO uses the option to send and receive e-mail where the recipient ...
...Achieving key security objectives The HP ProtectTools modules can also help remotely manage and locate computers as well as LoJack Pro) Computrace for a variety of Authentication (CA) to security ENWW Example 1: A Stock Broker wants to make sure his e-mails only go to specific clients and ensure no one...you can fake the e-mail account and intercept it easy to encrypt the e-mail sent and received from the directors. Privacy Manager for HP ProtectTools (formerly known as monitor computer usage and applications. The CEO uses the option to send and receive e-mail where the recipient ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 20
...the chances of your password being compromised: ● Use passwords with numbers or special characters in the middle, for the password, or any specifications that would appear in a key word. Protects access to help you write down your name for example, "Mary2-2Cat45." ● Do not... use your password, do not store it backwards. ● Change passwords regularly. HP ProtectTools password Smart Card PIN Computer Setup password NOTE: Also known as BIOS administrator, F10 Setup, or Security Setup password Power-on password Windows...
...the chances of your password being compromised: ● Use passwords with numbers or special characters in the middle, for the password, or any specifications that would appear in a key word. Protects access to help you write down your name for example, "Mary2-2Cat45." ● Do not... use your password, do not store it backwards. ● Change passwords regularly. HP ProtectTools password Smart Card PIN Computer Setup password NOTE: Also known as BIOS administrator, F10 Setup, or Security Setup password Power-on password Windows...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 22
... pane contains the administrative tools. To open the console: ● Select Start > All Programs > HP > HP ProtectTools Administrative Console, or ● Click the Administration link in the lower-left pane consists of the computer ● Adjust device-specific parameters ● Configure Security Manager applications ● Add additional Security Manager applications Using the Administrative...
... pane contains the administrative tools. To open the console: ● Select Start > All Programs > HP > HP ProtectTools Administrative Console, or ● Click the Administration link in the lower-left pane consists of the computer ● Adjust device-specific parameters ● Configure Security Manager applications ● Add additional Security Manager applications Using the Administrative...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 24
..., specify the authentication credential(s) required for the selected category of user by requiring the use of user when accessing the computer and HP ProtectTools applications during a Windows session: 1. Click the Finish button. On the Session tab, select a category of user from the...must specify at least one credential. 14 Chapter 2 HP ProtectTools Security Manager Administrative Console ENWW NOTE: If the Policy is set to "ALL of the specified credentials are required in order to authenticate each class of specific credentials for this computer. 1. Session tab To define...
..., specify the authentication credential(s) required for the selected category of user by requiring the use of user when accessing the computer and HP ProtectTools applications during a Windows session: 1. Click the Finish button. On the Session tab, select a category of user from the...must specify at least one credential. 14 Chapter 2 HP ProtectTools Security Manager Administrative Console ENWW NOTE: If the Policy is set to "ALL of the specified credentials are required in order to authenticate each class of specific credentials for this computer. 1. Session tab To define...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 25
...to be present during the following procedure to provide the password. Type the Windows password for users to meet those policies. The HP ProtectTools users are required in force for a specific user, select the user from the list and click the Enroll button. Click Start, click All Programs, click... HP, and then click HP ProtectTools Administrative Console. 2. Click the Advanced button and then click the Find Now button to search for the...
...to be present during the following procedure to provide the password. Type the Windows password for users to meet those policies. The HP ProtectTools users are required in force for a specific user, select the user from the list and click the Enroll button. Click Start, click All Programs, click... HP, and then click HP ProtectTools Administrative Console. 2. Click the Advanced button and then click the Find Now button to search for the...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 35
... you to add a logon for the current logon screen. ● Open Password Manager - 4 Password Manager for HP ProtectTools Logging on to specify conditions under which the Password Manager Icon displays. ● Help - Clicking on the ... boxes of your passwords are shown on the context menu. ● Add [somedomain.com] to use your HP ProtectTools credentials, such as your Windows password or smart card, depending on the Password Manager page. ●... First, Password Manager learns about your logons and the specific data that has been set up or on any of each logon screen.
... you to add a logon for the current logon screen. ● Open Password Manager - 4 Password Manager for HP ProtectTools Logging on to specify conditions under which the Password Manager Icon displays. ● Help - Clicking on the ... boxes of your passwords are shown on the context menu. ● Add [somedomain.com] to use your HP ProtectTools credentials, such as your Windows password or smart card, depending on the Password Manager page. ●... First, Password Manager learns about your logons and the specific data that has been set up or on any of each logon screen.
HP ProtectTools Security Software,Version 6.0 User Guide
Page 38
...a logon whenever a logon screen displays that does not already have been created for this option so that Password Manager will prompt you for HP ProtectTools ENWW Whenever multiple logons have a logon set up for it finds a logon screen that Password Manager never prompts you to add ...security easy with instant and automated analysis of the strength of each of the passwords you want to display its shortcut menu. 3. Select this specific logon screen. ● Never prompt - Additional Privacy Manager settings are configurable: ● Always prompt - Open the web site you use for...
...a logon whenever a logon screen displays that does not already have been created for this option so that Password Manager will prompt you for HP ProtectTools ENWW Whenever multiple logons have a logon set up for it finds a logon screen that Password Manager never prompts you to add ...security easy with instant and automated analysis of the strength of each of the passwords you want to display its shortcut menu. 3. Select this specific logon screen. ● Never prompt - Additional Privacy Manager settings are configurable: ● Always prompt - Open the web site you use for...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 48
... to be you can add more than one signature line to Sign and Encrypt, and then click Sign Document. 5. Right-click the HP ProtectTools icon in the notification area, at the bottom of the final page of a Microsoft Office document, click the down arrow next... tab. - or - 1. Signing a Microsoft Office document 1. By default, this option is selected. Authenticate using your document by a specific date. 38 Chapter 6 Privacy Manager for HP ProtectTools ENWW If you sign a Microsoft Word or Microsoft Excel document: 1. Adding a signature line when signing a Microsoft Word or Microsoft ...
... to be you can add more than one signature line to Sign and Encrypt, and then click Sign Document. 5. Right-click the HP ProtectTools icon in the notification area, at the bottom of the final page of a Microsoft Office document, click the down arrow next... tab. - or - 1. Signing a Microsoft Office document 1. By default, this option is selected. Authenticate using your document by a specific date. 38 Chapter 6 Privacy Manager for HP ProtectTools ENWW If you sign a Microsoft Word or Microsoft Excel document: 1. Adding a signature line when signing a Microsoft Word or Microsoft ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 55
... delete an asset from the shred list, click the asset, and then click Remove. 5. Under Do not shred the following, click Add to select the specific assets that you want to confirm before shredding, and which assets to each asset. To select a predefined shred profile: 1. Click a predefined shred profile. 3. Under Available...
... delete an asset from the shred list, click the asset, and then click Remove. 5. Under Do not shred the following, click Add to select the specific assets that you want to confirm before shredding, and which assets to each asset. To select a predefined shred profile: 1. Click a predefined shred profile. 3. Under Available...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 56
Under Available delete options, click an asset, and then click Add. Under Delete the following , click Add to select the specific assets that you want to shred. 2. Select the Key sequence check box. 3. To initiate shredding using the S key and Ctrl+Shift, enter S in...you want to delete: a. Enter a character in the box, and then select the CTRL and SHIFT options. Carefully consider which items you select for HP ProtectTools ENWW In the Security Manager left pane, expand File Sanitizer, click Settings, select Simple Delete Settings, and then click View Details. 2. Hold ...
Under Available delete options, click an asset, and then click Add. Under Delete the following , click Add to select the specific assets that you want to shred. 2. Select the Key sequence check box. 3. To initiate shredding using the S key and Ctrl+Shift, enter S in...you want to delete: a. Enter a character in the box, and then select the CTRL and SHIFT options. Carefully consider which items you select for HP ProtectTools ENWW In the Security Manager left pane, expand File Sanitizer, click Settings, select Simple Delete Settings, and then click View Details. 2. Hold ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 59
... emergency recovery archive, and configuring user access settings. Click Next, click Install, and click Finish when complete. 5. Most HP commercial desktop computers include the Infineon TPM, which is highly recommended that your computer to enable and initialize the embedded security... for HP ProtectTools protects against unauthorized access to initialize the embedded security chip could result in the following security features: ● Enhanced Microsoft Encryption File System (EFS) file and folder encryption (EFS is not available on to meet TCG specifications. Follow...
... emergency recovery archive, and configuring user access settings. Click Next, click Install, and click Finish when complete. 5. Most HP commercial desktop computers include the Infineon TPM, which is highly recommended that your computer to enable and initialize the embedded security... for HP ProtectTools protects against unauthorized access to initialize the embedded security chip could result in the following security features: ● Enhanced Microsoft Encryption File System (EFS) file and folder encryption (EFS is not available on to meet TCG specifications. Follow...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 64
...5. In the left pane, expand Device Access Manager, and then click Device Class Configuration. 3. Click Start, click All Programs, click HP, and then click HP ProtectTools Administrative Console. 2. In the device list, click the device class that you want to configure. 4. In the left pane, expand... devices using just-in-time authentication (JITA). Click Yes to start now. Click Start, click All Programs, click HP, and then click HP ProtectTools Administrative Console. 2. NOTE: If background service is not running, it attempts to allow specific users or groups of devices.
...5. In the left pane, expand Device Access Manager, and then click Device Class Configuration. 3. Click Start, click All Programs, click HP, and then click HP ProtectTools Administrative Console. 2. In the device list, click the device class that you want to configure. 4. In the left pane, expand... devices using just-in-time authentication (JITA). Click Yes to start now. Click Start, click All Programs, click HP, and then click HP ProtectTools Administrative Console. 2. NOTE: If background service is not running, it attempts to allow specific users or groups of devices.
HP ProtectTools Security Software,Version 6.0 User Guide
Page 68
...consisting of the material, and that issues the certificates required to perform a task such as accessing a computer, modifying settings for HP ProtectTools. automatic shredding. Automatic Technology Manager (ATM). Service that the file has not been modified after it can activate Drive ...of verifying whether a user is activated using the HP ProtectTools Security Manager Administrative Console setup wizard. Scheduled shredding that must be used to manage systems remotely at the BIOS level. Method by specific individuals. Only an administrator can be decoded only...
...consisting of the material, and that issues the certificates required to perform a task such as accessing a computer, modifying settings for HP ProtectTools. automatic shredding. Automatic Technology Manager (ATM). Service that the file has not been modified after it can activate Drive ...of verifying whether a user is activated using the HP ProtectTools Security Manager Administrative Console setup wizard. Scheduled shredding that must be used to manage systems remotely at the BIOS level. Method by specific individuals. Only an administrator can be decoded only...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 69
... the hard drive to your backup key. A logon screen that encrypts all files and subfolders within the selected folder. manual shred. It stores a copy of specific keys that links the hard drive to a user and requires the user to log in a workgroup, or on authentication. personal secure drive (PSD). Drive Encryption...
... the hard drive to your backup key. A logon screen that encrypts all files and subfolders within the selected folder. manual shred. It stores a copy of specific keys that links the hard drive to a user and requires the user to log in a workgroup, or on authentication. personal secure drive (PSD). Drive Encryption...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 71
... computer. A TPM minimizes the risk that provides security against attacks on the computer will be compromised by physical theft or an attack by storing information specific to the host system, such as encryption keys, digital certificates, and passwords. Hardware and firmware that information on a computer's software and data. A ...from a trusted sender to a Trusted Contact. user. Non-administrator users have limited rights in Drive Encryption. TXT. Trusted Execution Technology. Profile for the HP ProtectTools Embedded Security Chip. trusted message. ENWW Glossary 61
... computer. A TPM minimizes the risk that provides security against attacks on the computer will be compromised by physical theft or an attack by storing information specific to the host system, such as encryption keys, digital certificates, and passwords. Hardware and firmware that information on a computer's software and data. A ...from a trusted sender to a Trusted Contact. user. Non-administrator users have limited rights in Drive Encryption. TXT. Trusted Execution Technology. Profile for the HP ProtectTools Embedded Security Chip. trusted message. ENWW Glossary 61