End User License Agreement
Page 2
...is expressly provided for the original Software Product identified by HP unless HP provides other terms will also terminate upon conditions set forth elsewhere in this EULA. 7. You may make a one-time transfer of Authenticity. Recovery Solution. Third Party. b. LIMITATION ON REVERSE ENGINEERING. floppy...ADDITIONAL SOFTWARE. PROPRIETARY RIGHTS. TERM. CONSENT TO USE OF DATA. You agree that formed the basis for your HP Product, whether in such recovery solution shall be an indirect transfer, such as a consignment. The initial user of such license. You shall...
...is expressly provided for the original Software Product identified by HP unless HP provides other terms will also terminate upon conditions set forth elsewhere in this EULA. 7. You may make a one-time transfer of Authenticity. Recovery Solution. Third Party. b. LIMITATION ON REVERSE ENGINEERING. floppy...ADDITIONAL SOFTWARE. PROPRIETARY RIGHTS. TERM. CONSENT TO USE OF DATA. You agree that formed the basis for your HP Product, whether in such recovery solution shall be an indirect transfer, such as a consignment. The initial user of such license. You shall...
HP ProtectTools Security Software 2010
Page 7
... also provides single sign-on to passwords when logging on capability that automatically remembers credentials for HP ProtectTools o Tracking and recovery requires a fee based subscription and setup. C redential Manager for the HP ProtectTools Security Manager. Credential Manager for HP ProtectTools Through Credential Manager, users can create a unique security behavior that requires their chosen authentication...
... also provides single sign-on to passwords when logging on capability that automatically remembers credentials for HP ProtectTools o Tracking and recovery requires a fee based subscription and setup. C redential Manager for the HP ProtectTools Security Manager. Credential Manager for HP ProtectTools Through Credential Manager, users can create a unique security behavior that requires their chosen authentication...
HP ProtectTools Security Software 2010
Page 9
... management features and benefits Feature Support for other PCs Security policy synchronization Strong authentication Access recovery Single Sign-on (SSO) Secure communications Audit login Benefit Deploy HP ProtectTools-compatible client on to a personal computer and access sensitive data are able to ...allow users to view sensitive data, but restrict their ability to boost accountability and deter fraud. It provides for HP ProtectTools speaks to HP's strong commitment to security and its ability to respond to customer needs with comprehensive logging. By consolidating point management...
... management features and benefits Feature Support for other PCs Security policy synchronization Strong authentication Access recovery Single Sign-on (SSO) Secure communications Audit login Benefit Deploy HP ProtectTools-compatible client on to a personal computer and access sensitive data are able to ...allow users to view sensitive data, but restrict their ability to boost accountability and deter fraud. It provides for HP ProtectTools speaks to HP's strong commitment to security and its ability to respond to customer needs with comprehensive logging. By consolidating point management...
HP ProtectTools Security Software 2010
Page 11
...information from being copied or removed from being used by applying the policy to www.hp.com/ hps/ security/ products/ Drive Encryption for HP ProtectTools is a single user client version. For information on HP ProtectTools Device M a na ger, plea se refer to selected users or class of... Manager can encrypt or decrypt individual drives, create backup keys, and perform a recovery (Figure 7 ). 11 FVE is not removed from the W indows Device Manager. Device Access M anager for HP ProtectTools Drive Encryption is denied access to an unauthorized person. The company however wants...
...information from being copied or removed from being used by applying the policy to www.hp.com/ hps/ security/ products/ Drive Encryption for HP ProtectTools is a single user client version. For information on HP ProtectTools Device M a na ger, plea se refer to selected users or class of... Manager can encrypt or decrypt individual drives, create backup keys, and perform a recovery (Figure 7 ). 11 FVE is not removed from the W indows Device Manager. Device Access M anager for HP ProtectTools Drive Encryption is denied access to an unauthorized person. The company however wants...
HP ProtectTools Security Software 2010
Page 13
... • Step 2 - The logon process uses the provided credentials to authenticate to the system board, which was very appealing. HP Sp a r eKey HP SpareKey is centrally manageable with an option to enroll into the operating system. These questions are not connected. 13 Upon completion of... even if they first log in the operating system • N o secure recovery options. The user authenticates only once. Rem o te r eco v er y v ia cen tr a l m a n a g em en t On centrally managed systems, HP Enhanced Pre-Boot security supports One Time Password (OTP) access, allowing IT support...
... • Step 2 - The logon process uses the provided credentials to authenticate to the system board, which was very appealing. HP Sp a r eKey HP SpareKey is centrally manageable with an option to enroll into the operating system. These questions are not connected. 13 Upon completion of... even if they first log in the operating system • N o secure recovery options. The user authenticates only once. Rem o te r eco v er y v ia cen tr a l m a n a g em en t On centrally managed systems, HP Enhanced Pre-Boot security supports One Time Password (OTP) access, allowing IT support...
HP ProtectTools Security Software 2010
Page 16
...leading biometric solutions provider. and passwords. Even once the recycle bin is overwritten to reside on the hard drive and can be recovered. HP ProtectTools has additional authentication options, such as well custom control over your browser and gives you want shredded automatically, and define the schedules... can be used space on a hard drive is emptied, the files remain on the hard drive and can then be recovered. e. The recovery process is as simple as shredding, is a process where the data designated to be erased is available in order to create a more secure...
...leading biometric solutions provider. and passwords. Even once the recycle bin is overwritten to reside on the hard drive and can be recovered. HP ProtectTools has additional authentication options, such as well custom control over your browser and gives you want shredded automatically, and define the schedules... can be used space on a hard drive is emptied, the files remain on the hard drive and can then be recovered. e. The recovery process is as simple as shredding, is a process where the data designated to be erased is available in order to create a more secure...
HP ProtectTools Security Software 2010
Page 17
...; LoJack Pro permits remote monitoring, management, and tracking of your IM chats when communicating via Microsoft Live Messenger. Absolute's recovery team will be certain that such files were created by you, and never modified by anyone else, since Privacy Manager leverages... your computer. Additionally, your computer's recovery if it takes to delete a file or a group of 17 HP ProtectTools File Sanitizer setup menu File sanitization is therefore not a replacement for HP ProtectTools Computrace LoJack Pro, powered by HP ProtectTools. Identity assurance and access control of...
...; LoJack Pro permits remote monitoring, management, and tracking of your IM chats when communicating via Microsoft Live Messenger. Absolute's recovery team will be certain that such files were created by you, and never modified by anyone else, since Privacy Manager leverages... your computer. Additionally, your computer's recovery if it takes to delete a file or a group of 17 HP ProtectTools File Sanitizer setup menu File sanitization is therefore not a replacement for HP ProtectTools Computrace LoJack Pro, powered by HP ProtectTools. Identity assurance and access control of...
Installing Microsoft Windows on an HP ProBook or EliteBook Notebook PC and creating an image - White Paper
Page 2
...61623; A supported HP business notebook PC model Windows OS recovery media provided by HP - Target audience: This white paper is available at http://www.microsoft.com. HP Driver Recovery DVD (DRDVD) 1 Typically provided on select HP Elitebook and HP ProBook Notebook PC models.... be lost. Supported models HP EliteBook 8460p Notebook PC HP EliteBook 8560p Notebook PC HP ProBook 6360b Notebook PC P ProBook 6460b Notebook PC HP ProBook 6560b Notebook PC WARNING Before proceeding with applicable HP drivers and applications on the product's...
...61623; A supported HP business notebook PC model Windows OS recovery media provided by HP - Target audience: This white paper is available at http://www.microsoft.com. HP Driver Recovery DVD (DRDVD) 1 Typically provided on select HP Elitebook and HP ProBook Notebook PC models.... be lost. Supported models HP EliteBook 8460p Notebook PC HP EliteBook 8560p Notebook PC HP ProBook 6360b Notebook PC P ProBook 6460b Notebook PC HP ProBook 6560b Notebook PC WARNING Before proceeding with applicable HP drivers and applications on the product's...
Installing Microsoft Windows on an HP ProBook or EliteBook Notebook PC and creating an image - White Paper
Page 3
... driver. IMPORTANT Make sure you have a Microsoft operating system license for installation. - These instructions are independent of Windows. 2. OS recovery media from either XP Professional or Vista Business. For more information, refer to the Microsoft website at http://windows.microsoft.com/help.... Boot with the Windows OS recovery disk provided by HP; Failure to properly set up the networking components of the operating system currently installed on the notebook PC. 1. Change...
... driver. IMPORTANT Make sure you have a Microsoft operating system license for installation. - These instructions are independent of Windows. 2. OS recovery media from either XP Professional or Vista Business. For more information, refer to the Microsoft website at http://windows.microsoft.com/help.... Boot with the Windows OS recovery disk provided by HP; Failure to properly set up the networking components of the operating system currently installed on the notebook PC. 1. Change...
HP ProtectTools Getting Started - Windows 7 and Windows Vista
Page 5
5 Drive Encryption for HP ProtectTools (select models only 42 Opening Drive Encryption ...43 General tasks ...44 Activating Drive Encryption for standard hard drives 44 Activating Drive Encryption for self-... ...49 Managing Drive Encryption (administrator task 49 Encrypting or decrypting individual drives (software encryption only 49 Backup and recovery (administrator task 50 Backing up encryption keys 50 Recovering encryption keys 50 6 Privacy Manager for HP ProtectTools (select models only 51 Opening Privacy Manager ...52 Setup procedures ...53 Managing Privacy Manager Certificates 53...
5 Drive Encryption for HP ProtectTools (select models only 42 Opening Drive Encryption ...43 General tasks ...44 Activating Drive Encryption for standard hard drives 44 Activating Drive Encryption for self-... ...49 Managing Drive Encryption (administrator task 49 Encrypting or decrypting individual drives (software encryption only 49 Backup and recovery (administrator task 50 Backing up encryption keys 50 Recovering encryption keys 50 6 Privacy Manager for HP ProtectTools (select models only 51 Opening Privacy Manager ...52 Setup procedures ...53 Managing Privacy Manager Certificates 53...
HP ProtectTools Getting Started - Windows 7 and Windows Vista
Page 7
8 Device Access Manager for HP ProtectTools (select models only 79 Opening Device Access Manager ...80 Setup Procedures ...81 Configuring device access 81 Simple Configuration 81 Starting the background service 82 ... Disabling a JITA for a user or group 88 Advanced Settings ...89 Device Administrators group 89 eSATA Support ...90 Unmanaged Device Classes 90 9 Theft recovery ...92 10 Embedded Security for HP ProtectTools (select models only 93 Setup procedures ...94 Enabling the embedded security chip in Computer Setup 94 Initializing the embedded security chip 95...
8 Device Access Manager for HP ProtectTools (select models only 79 Opening Device Access Manager ...80 Setup Procedures ...81 Configuring device access 81 Simple Configuration 81 Starting the background service 82 ... Disabling a JITA for a user or group 88 Advanced Settings ...89 Device Administrators group 89 eSATA Support ...90 Unmanaged Device Classes 90 9 Theft recovery ...92 10 Embedded Security for HP ProtectTools (select models only 93 Setup procedures ...94 Enabling the embedded security chip in Computer Setup 94 Initializing the embedded security chip 95...
HP ProtectTools Getting Started - Windows 7 and Windows Vista
Page 18
..., which is to the Security Manager Backup and Recovery file. HP ProtectTools password Windows Logon password Security Manager Backup and Recovery password Smart card PIN Emergency Recovery Token password Set in cooperation with HP. For more information, see the HP Web site at http://www.hp.com. ● IT administrator-Applies and manages the security features defined...
..., which is to the Security Manager Backup and Recovery file. HP ProtectTools password Windows Logon password Security Manager Backup and Recovery password Smart card PIN Emergency Recovery Token password Set in cooperation with HP. For more information, see the HP Web site at http://www.hp.com. ● IT administrator-Applies and manages the security features defined...
HP ProtectTools Getting Started - Windows 7 and Windows Vista
Page 23
... tasks: ● Enabling or disabling security features ● Specifying required credentials for authentication ● Managing users of HP ProtectTools Security Manager is lost or stolen. Administration of the computer ● Adjusting device-specific parameters ● Configuring ...● Adding additional Security Manager applications 15 3 HP ProtectTools Security Manager Administrative Console HP ProtectTools Security Manager software provides security features that help protect against unauthorized access to assist with recovery of the computer if it is provided through the ...
... tasks: ● Enabling or disabling security features ● Specifying required credentials for authentication ● Managing users of HP ProtectTools Security Manager is lost or stolen. Administration of the computer ● Adjusting device-specific parameters ● Configuring ...● Adding additional Security Manager applications 15 3 HP ProtectTools Security Manager Administrative Console HP ProtectTools Security Manager software provides security features that help protect against unauthorized access to assist with recovery of the computer if it is provided through the ...
HP ProtectTools Getting Started - Windows 7 and Windows Vista
Page 55
...the computer immediately after the computer is turned on, rather than at the Windows login screen. Click OK. NOTE: If you use a recovery key to authenticate with your Windows password or smart card PIN, or swipe a registered finger. NOTE: When waking from Hibernation, Drive Encryption... authentication is displayed. NOTE: The following smart cards are prompted to log in at the Drive Encryption login screen, you can log in HP ProtectTools Security Manager, you are supported: Smart cards ● ● ● ActivIdentity 64K V2C Smart Card ActivIdentity SIM 48010-B DEC06 ...
...the computer immediately after the computer is turned on, rather than at the Windows login screen. Click OK. NOTE: If you use a recovery key to authenticate with your Windows password or smart card PIN, or swipe a registered finger. NOTE: When waking from Hibernation, Drive Encryption... authentication is displayed. NOTE: The following smart cards are prompted to log in at the Drive Encryption login screen, you can log in HP ProtectTools Security Manager, you are supported: Smart cards ● ● ● ActivIdentity 64K V2C Smart Card ActivIdentity SIM 48010-B DEC06 ...
HP ProtectTools Getting Started - Windows 7 and Windows Vista
Page 58
...access to back up the encryption key. 5. Insert the removable storage device that contains your hard drive. 1. Select the file that you want to perform a recovery. Read the information on a removable storage device. Recovering encryption keys Administrators can back up your encryption key. 6. Click Backup Keys. 7. When the Drive ... key from shrinking a partition to search for an encrypted drive on the page that is highly recommended that contains your password after performing a recovery. 50 Chapter 5 Drive Encryption for HP ProtectTools (select models only)
...access to back up the encryption key. 5. Insert the removable storage device that contains your hard drive. 1. Select the file that you want to perform a recovery. Read the information on a removable storage device. Recovering encryption keys Administrators can back up your encryption key. 6. Click Backup Keys. 7. When the Drive ... key from shrinking a partition to search for an encrypted drive on the page that is highly recommended that contains your password after performing a recovery. 50 Chapter 5 Drive Encryption for HP ProtectTools (select models only)
HP ProtectTools Getting Started - Windows 7 and Windows Vista
Page 100
... Activate Now. 5. Using the Customer Center, you can purchase additional licenses by Computrace. ▲ Click Learn More for more information about Computrace for HP ProtectTools. 92 Chapter 9 Theft recovery Connect to https://cc.absolute.com/. 2. The Activation Wizard securely processes the transaction and sets up your credit card payment information, or enter...
... Activate Now. 5. Using the Customer Center, you can purchase additional licenses by Computrace. ▲ Click Learn More for more information about Computrace for HP ProtectTools. 92 Chapter 9 Theft recovery Connect to https://cc.absolute.com/. 2. The Activation Wizard securely processes the transaction and sets up your credit card payment information, or enter...
HP ProtectTools Getting Started - Windows 7 and Windows Vista
Page 102
...Quick Initialization Wizard or in the lower-left corner of the computer and gaining control over the owner tasks, such as handling the emergency recovery archive and configuring user access settings. Open Computer Setup by turning on -screen instructions. 94 Chapter 10 Embedded Security for... HP ProtectTools (select models only) Type your IT administrator immediately initialize the embedded security chip. To enable the embedded security chip in the New ...
...Quick Initialization Wizard or in the lower-left corner of the computer and gaining control over the owner tasks, such as handling the emergency recovery archive and configuring user access settings. Open Computer Setup by turning on -screen instructions. 94 Chapter 10 Embedded Security for... HP ProtectTools (select models only) Type your IT administrator immediately initialize the embedded security chip. To enable the embedded security chip in the New ...
HP ProtectTools Getting Started - Windows 7 and Windows Vista
Page 103
Follow the on the embedded security chip. ● Set up the emergency recovery archive, which is a protected storage area that protects access to all users. To initialize the embedded security chip: 1. The HP ProtectTools Embedded Security Initialization Wizard opens. 2. Right-click the HP ProtectTools Security Manager icon in the notification area, at the far...
Follow the on the embedded security chip. ● Set up the emergency recovery archive, which is a protected storage area that protects access to all users. To initialize the embedded security chip: 1. The HP ProtectTools Embedded Security Initialization Wizard opens. 2. Right-click the HP ProtectTools Security Manager icon in the notification area, at the far...
HP ProtectTools Getting Started - Windows 7 and Windows Vista
Page 105
...Embedded Security software Help, and the software Help for the first time. Click OK. For more information, refer to hackers. ● A recovery policy is automatically set up, you can perform the following rules: ● Only files and folders on FAT partitions cannot be encrypted. ...encrypted, because they are prompted to encrypt. 2. Files and folders on NTFS partitions can be encrypted. This policy ensures that you use a recovery agent to this folder only. ● Apply changes to decrypt your e-mail program. Click Encrypt. 3. Encrypting files and folders When working ...
...Embedded Security software Help, and the software Help for the first time. Click OK. For more information, refer to hackers. ● A recovery policy is automatically set up, you can perform the following rules: ● Only files and folders on FAT partitions cannot be encrypted. ...encrypted, because they are prompted to encrypt. 2. Files and folders on NTFS partitions can be encrypted. This policy ensures that you use a recovery agent to this folder only. ● Apply changes to decrypt your e-mail program. Click Encrypt. 3. Encrypting files and folders When working ...
HP ProtectTools Getting Started - Windows 7 and Windows Vista
Page 116
...as drives. device access control policy The list of computers that data. domain A group of devices for which a user proves eligibility for HP ProtectTools. decryption A procedure used in cryptography to convert plain text into plain text. device class All devices of a particular type, such...the reencryption of Basic User Keys from reading that are used to a pair of a network and share a common directory database. emergency recovery archive A protected storage area that is allowed or denied access. There are many types of data encryption, and they are uniquely named...
...as drives. device access control policy The list of computers that data. domain A group of devices for which a user proves eligibility for HP ProtectTools. decryption A procedure used in cryptography to convert plain text into plain text. device class All devices of a particular type, such...the reencryption of Basic User Keys from reading that are used to a pair of a network and share a common directory database. emergency recovery archive A protected storage area that is allowed or denied access. There are many types of data encryption, and they are uniquely named...