Software Update - Windows XP
Page 8
... the BIOS update that are ready to install the update. BIOS installation procedures vary. Open your Internet browser, go to http://www.hp.com/support, and then select your operating system. 5. Follow the instructions on the screen after it has been downloaded to your hard... > My Computer. 2. Click your computer. Follow the on-screen instructions to access the BIOS update you recorded earlier, open the folder on your specific product from the AC outlet. Make a note of the path to download your hard drive designation. At the download area, perform these steps: 1....
... the BIOS update that are ready to install the update. BIOS installation procedures vary. Open your Internet browser, go to http://www.hp.com/support, and then select your operating system. 5. Follow the instructions on the screen after it has been downloaded to your hard... > My Computer. 2. Click your computer. Follow the on-screen instructions to access the BIOS update you recorded earlier, open the folder on your specific product from the AC outlet. Make a note of the path to download your hard drive designation. At the download area, perform these steps: 1....
Software Update - Windows XP
Page 10
... where the file was stored, and double-click the file to install the updated software without downloading the file. - If you want a specific SoftPaq, type the SoftPaq number in the product box, and then press enter. - Click your computer model number in the Search box, ...click an update to step 6. 3. If prompted to http://www.hp.com/support, and then select your computer. Click the option for software and driver downloads, type your operating system. 5. or - When prompted, select a storage location on your specific product from the models listed. 4. Proceed to open a window...
... where the file was stored, and double-click the file to install the updated software without downloading the file. - If you want a specific SoftPaq, type the SoftPaq number in the product box, and then press enter. - Click your computer model number in the Search box, ...click an update to step 6. 3. If prompted to http://www.hp.com/support, and then select your computer. Click the option for software and driver downloads, type your operating system. 5. or - When prompted, select a storage location on your specific product from the models listed. 4. Proceed to open a window...
HP ProtectTools - Windows Vista and Windows XP
Page 6
... Embedded Security 73 Enabling Embedded Security after permanent disable 73 Migrating keys with the Migration Wizard 74 8 Device Access Manager for HP ProtectTools (select models only) Starting background service ...75 Simple configuration ...76 Device class configuration (advanced 77 Adding a user or... of a group 77 Allowing access to a specific device for one user of a group 78 9 Troubleshooting Credential Manager for HP ProtectTools 79 Embedded Security for HP ProtectTools (select models only 82 Device Access Manager for HP ProtectTools 88 Miscellaneous ...89 Glossary ...92 Index ...
... Embedded Security 73 Enabling Embedded Security after permanent disable 73 Migrating keys with the Migration Wizard 74 8 Device Access Manager for HP ProtectTools (select models only) Starting background service ...75 Simple configuration ...76 Device class configuration (advanced 77 Adding a user or... of a group 77 Allowing access to a specific device for one user of a group 78 9 Troubleshooting Credential Manager for HP ProtectTools 79 Embedded Security for HP ProtectTools (select models only 82 Device Access Manager for HP ProtectTools 88 Miscellaneous ...89 Glossary ...92 Index ...
HP ProtectTools - Windows Vista and Windows XP
Page 9
...Access Manager allows IT managers to control access to writeable devices for protected digital certificate operations. Module Key features Embedded Security for HP ProtectTools (select models only) ● Embedded Security uses a Trusted Platform Module (TPM) embedded security chip to help protect ... introducing viruses into the system from external media. ● The administrator can disable access to models only) devices based on a PC. ● Embedded Security allows creation of a personal secure drive (PSD), which is useful in protecting user file and folder information...
...Access Manager allows IT managers to control access to writeable devices for protected digital certificate operations. Module Key features Embedded Security for HP ProtectTools (select models only) ● Embedded Security uses a Trusted Platform Module (TPM) embedded security chip to help protect ... introducing viruses into the system from external media. ● The administrator can disable access to models only) devices based on a PC. ● Embedded Security allows creation of a personal secure drive (PSD), which is useful in protecting user file and folder information...
HP ProtectTools - Windows Vista and Windows XP
Page 16
...chances of characters that would appear in the middle, for example, "Mary2-2Cat45." ● Do not use your name for HP ProtectTools to back up HP ProtectTools credentials. You might change only a couple of your password being compromised: ● Use passwords with numbers or special ...a valid e-mail address to register and to recover your password through this service. ● Use Embedded Security for the password, or any specifications that are set by the program. In general, however, consider the following ways: ● Use Drive Encryption for letters in a key word...
...chances of characters that would appear in the middle, for example, "Mary2-2Cat45." ● Do not use your name for HP ProtectTools to back up HP ProtectTools credentials. You might change only a couple of your password being compromised: ● Use passwords with numbers or special ...a valid e-mail address to register and to recover your password through this service. ● Use Embedded Security for the password, or any specifications that are set by the program. In general, however, consider the following ways: ● Use Drive Encryption for letters in a key word...
HP ProtectTools - Windows Vista and Windows XP
Page 47
... Excel, or Microsoft PowerPoint, create and save a document. 2. For example, if you or another person who is designated by the owner of your document by a specific date. Click the Insert menu. 3. NOTE: This message will not be able to display the date and/or title in the signature line even if...
... Excel, or Microsoft PowerPoint, create and save a document. 2. For example, if you or another person who is designated by the owner of your document by a specific date. Click the Insert menu. 3. NOTE: This message will not be able to display the date and/or title in the signature line even if...
HP ProtectTools - Windows Vista and Windows XP
Page 51
... your configuration settings. Sessions may be marked as invalid when the recipient receives it. You can use the Display history for menu to select only specific accounts to search for your messages. To specify a history folder for a folder, and then click OK. 4. Using Privacy Manager Chat is closed. ● Hide all...
... your configuration settings. Sessions may be marked as invalid when the recipient receives it. You can use the Display history for menu to select only specific accounts to search for your messages. To specify a history folder for a folder, and then click OK. 4. Using Privacy Manager Chat is closed. ● Hide all...
HP ProtectTools - Windows Vista and Windows XP
Page 52
... History Viewer, right-click any revealed session, and select View session ID. Reveal sessions for a specific account Revealing a session displays the decrypted Contact Screen Name for HP ProtectTools (select models only) Authenticate using your chosen security logon method. View a session ID ▲...-click any session, and then select Reveal All Sessions. 2. Search sessions for specific text 46 Chapter 4 Privacy Manager for the currently selected session. 1. Click Start, click All Programs, and then click HP ProtectTools Security Manager. 2. or - ▲ In a Chat session, click ...
... History Viewer, right-click any revealed session, and select View session ID. Reveal sessions for a specific account Revealing a session displays the decrypted Contact Screen Name for HP ProtectTools (select models only) Authenticate using your chosen security logon method. View a session ID ▲...-click any session, and then select Reveal All Sessions. 2. Search sessions for specific text 46 Chapter 4 Privacy Manager for the currently selected session. 1. Click Start, click All Programs, and then click HP ProtectTools Security Manager. 2. or - ▲ In a Chat session, click ...
HP ProtectTools - Windows Vista and Windows XP
Page 53
... the viewer window. To remove columns from the Display history for a range of your accounts is shown in the Chat History Viewer. Displaying sessions for a specific account ▲ In the Chat History Viewer, select an account from the display: 1. In the Chat History View, click the Advanced Filter icon. 2. In the...
... the viewer window. To remove columns from the Display history for a range of your accounts is shown in the Chat History Viewer. Displaying sessions for a specific account ▲ In the Chat History Viewer, select an account from the display: 1. In the Chat History View, click the Advanced Filter icon. 2. In the...
HP ProtectTools - Windows Vista and Windows XP
Page 58
...asset delete without shredding. Select the assets you want to each asset that you run free space bleaching regularly if you want to include for HP ProtectTools Under Shred the following , select the check box next to shred: a. NOTE: To remove an asset from shredding. 52 Chapter 5... File Sanitizer for a simple delete, which assets to confirm before deleting. Under Do not shred the following , click Add to select the specific assets that you want to delete: a. NOTE: Only file extensions can be excluded from a simple delete: NOTE: It is executed, and which ...
...asset delete without shredding. Select the assets you want to each asset that you run free space bleaching regularly if you want to include for HP ProtectTools Under Shred the following , select the check box next to shred: a. NOTE: To remove an asset from shredding. 52 Chapter 5... File Sanitizer for a simple delete, which assets to confirm before deleting. Under Do not shred the following , click Add to select the specific assets that you want to delete: a. NOTE: Only file extensions can be excluded from a simple delete: NOTE: It is executed, and which ...
HP ProtectTools - Windows Vista and Windows XP
Page 60
... from the shred list, click the asset, and then click Remove. 5. Under Do not shred the following, click Add to select the specific assets that are selected for HP ProtectTools Click View Details to view the list of shredding cycles will be performed for shredding. Click Cancel, and then click OK. NOTE...
... from the shred list, click the asset, and then click Remove. 5. Under Do not shred the following, click Add to select the specific assets that are selected for HP ProtectTools Click View Details to view the list of shredding cycles will be performed for shredding. Click Cancel, and then click OK. NOTE...
HP ProtectTools - Windows Vista and Windows XP
Page 61
..., click the asset, and then click Remove. 4. For example, if you want to confirm before a simple delete is executed, and which assets to select the specific assets that you run free space bleaching regularly if you finish configuring the shred profile, click Apply, and then click OK.
..., click the asset, and then click Remove. 4. For example, if you want to confirm before a simple delete is executed, and which assets to select the specific assets that you run free space bleaching regularly if you finish configuring the shred profile, click Apply, and then click OK.
HP ProtectTools - Windows Vista and Windows XP
Page 67
... changes and close the window. 3. None of information: ● Identification information about the computer (including the serial number) and about batteries in the system ● Specification information about the processor; or - NOTE: Password changes take effect immediately with no need to save your changes, and then click Apply to view the...
... changes and close the window. 3. None of information: ● Identification information about the computer (including the serial number) and about batteries in the system ● Specification information about the processor; or - NOTE: Password changes take effect immediately with no need to save your changes, and then click Apply to view the...
HP ProtectTools - Windows Vista and Windows XP
Page 83
... left pane, click Device Access Manager, and then click Device Class Configuration. 3. Device class configuration (advanced) More selections are available to allow specific users or groups of users to be denied access. 6. Click a user or a group to configure in the device list. Click Add. In... Class Configuration. 3. Click the user or group you want to be denied access. 5. Click Start, click All Programs, and then click HP ProtectTools Security Manager. 2. Device class configuration (advanced) 77 Under User/Groups, click the user or group to be added to the list ...
... left pane, click Device Access Manager, and then click Device Class Configuration. 3. Device class configuration (advanced) More selections are available to allow specific users or groups of users to be denied access. 6. Click a user or a group to configure in the device list. Click Add. In... Class Configuration. 3. Click the user or group you want to be denied access. 5. Click Start, click All Programs, and then click HP ProtectTools Security Manager. 2. Device class configuration (advanced) 77 Under User/Groups, click the user or group to be added to the list ...
HP ProtectTools - Windows Vista and Windows XP
Page 84
... to be denied access. 5. In the left pane, click Device Access Manager, and then click Device Class Configuration. 3. Navigate to the specific device to grant this user access. 7. Click Allow to be denied access. 6. Click Allow to the folder below that of that . ...can allow access to search for HP ProtectTools (select models only) Click Advanced, and then click Find Now to a specific device for all other members of the required class and add the specific user. Click Start, click All Programs, and then click HP ProtectTools Security Manager. 2. Click Apply...
... to be denied access. 5. In the left pane, click Device Access Manager, and then click Device Class Configuration. 3. Navigate to the specific device to grant this user access. 7. Click Allow to be denied access. 6. Click Allow to the folder below that of that . ...can allow access to search for HP ProtectTools (select models only) Click Advanced, and then click Find Now to a specific device for all other members of the required class and add the specific user. Click Start, click All Programs, and then click HP ProtectTools Security Manager. 2. Click Apply...
HP ProtectTools - Windows Vista and Windows XP
Page 85
...smart cards or USB tokens in the Credential Manager software Help files. For example, an ! If a specific Single Sign On cannot be installed prior to Browse for HP ProtectTools 79 When the domain administrator attempts to Credential Manager. All other accounts. A list of Windows. ...Log on to change the Credential Manager cannot change his/her password through Change Windows password. Domain administrators cannot change the local PC account passwords. The domain user can only change Windows password even with Administrator's rights on to a domain and registers the ...
...smart cards or USB tokens in the Credential Manager software Help files. For example, an ! If a specific Single Sign On cannot be installed prior to Browse for HP ProtectTools 79 When the domain administrator attempts to Credential Manager. All other accounts. A list of Windows. ...Log on to change the Credential Manager cannot change his/her password through Change Windows password. Domain administrators cannot change the local PC account passwords. The domain user can only change Windows password even with Administrator's rights on to a domain and registers the ...
HP ProtectTools - Windows Vista and Windows XP
Page 93
...This is the default setting if the Scheduled Task is scheduled for HP ProtectTools (select models only) 87 HP will address this issue in the software interface for TPM 1.1 platforms. Embedded Security for a specific time, however, the backup fails without displaying notice of the ...failure. Click here if you want to backup to use NT AUTHORITY\SYSTEM for HP Notebook 1.1B implementations, as well as supporting HP Desktop 1.2 implementations. When the administrator ...
...This is the default setting if the Scheduled Task is scheduled for HP ProtectTools (select models only) 87 HP will address this issue in the software interface for TPM 1.1 platforms. Embedded Security for a specific time, however, the backup fails without displaying notice of the ...failure. Click here if you want to backup to use NT AUTHORITY\SYSTEM for HP Notebook 1.1B implementations, as well as supporting HP Desktop 1.2 implementations. When the administrator ...
HP ProtectTools - Windows Vista and Windows XP
Page 94
.... In the Services window, search for allowing access to devices they believe Device Access Manager should be a member, e.g., Users, Administrators. Specific users would be added to the User. Allow or deny-which takes precedence? Expand the levels in the device class hierarchy (e.g., DVD/CD... BUILTIN\Administrators) and the Deny permission has been granted to devices. Simple Configuration and/or Device Class Configuration have specific Windows groups, one for the HP ProtectTools Device Locking/Auditing service. When the user is a member of both groups.
.... In the Services window, search for allowing access to devices they believe Device Access Manager should be a member, e.g., Users, Administrators. Specific users would be added to the User. Allow or deny-which takes precedence? Expand the levels in the device class hierarchy (e.g., DVD/CD... BUILTIN\Administrators) and the Deny permission has been granted to devices. Simple Configuration and/or Device Class Configuration have specific Windows groups, one for the HP ProtectTools Device Locking/Auditing service. When the user is a member of both groups.
HP ProtectTools - Windows Vista and Windows XP
Page 99
... perform particular cryptographic functions. HP SpareKey. Logging in cryptography to a pair of Privacy Manager Certificates and Trusted Contacts. A combination of computers that , when pressed, initiates an automatic shred-for logon. cryptography. Group of specific keys that are used in...file has not been modified after it can be decoded only by binding the identity of an individual or a company by specific individuals. The SafeBoot Recovery Service. identity. Immediate shredding of drive encryption key. Encryption File System (EFS). domain. emergency...
... perform particular cryptographic functions. HP SpareKey. Logging in cryptography to a pair of Privacy Manager Certificates and Trusted Contacts. A combination of computers that , when pressed, initiates an automatic shred-for logon. cryptography. Group of specific keys that are used in...file has not been modified after it can be decoded only by binding the identity of an individual or a company by specific individuals. The SafeBoot Recovery Service. identity. Immediate shredding of drive encryption key. Encryption File System (EFS). domain. emergency...
HP ProtectTools - Windows Vista and Windows XP
Page 101
... the computer will be compromised by physical theft or an attack by an external hacker. TXT. Windows user account. Profile for the HP ProtectTools Embedded Security Chip. A user who has accepted a Trusted Contact invitation. Trusted Contact invitation. A listing of a Microsoft Word...individual computer. user. virtual token. Non-administrator users have limited rights in Drive Encryption. The token is designated by storing information specific to modify permissions and manage other users. An e-mail that works very much like a Java Card and card reader. Windows ...
... the computer will be compromised by physical theft or an attack by an external hacker. TXT. Windows user account. Profile for the HP ProtectTools Embedded Security Chip. A user who has accepted a Trusted Contact invitation. Trusted Contact invitation. A listing of a Microsoft Word...individual computer. user. virtual token. Non-administrator users have limited rights in Drive Encryption. The token is designated by storing information specific to modify permissions and manage other users. An e-mail that works very much like a Java Card and card reader. Windows ...