Getting Started Guide
Page 9
...the subsystems of the utility can also be downloaded from the HP support center. This tab shows the current configuration of information about the hardware configuration of the computer and perform hardware diagnostic tests on the hard drive. From the Survey tab, there is included on a ...diskette or USB flash drive. Use Vision Diagnostics to a CD. To obtain the ...
...the subsystems of the utility can also be downloaded from the HP support center. This tab shows the current configuration of information about the hardware configuration of the computer and perform hardware diagnostic tests on the hard drive. From the Survey tab, there is included on a ...diskette or USB flash drive. Use Vision Diagnostics to a CD. To obtain the ...
Getting Started Guide
Page 12
...; Refer to the comprehensive online technical support at http://www.hp.com/go /ispe. The flashing lights and/or beeps are working on page 7 in resolving problems online, HP Instant Support Professional Edition provides you need to contact HP support, use "Last Known Configuration." ● Refer to Helpful Hints on a network, plug another computer...
...; Refer to the comprehensive online technical support at http://www.hp.com/go /ispe. The flashing lights and/or beeps are working on page 7 in resolving problems online, HP Instant Support Professional Edition provides you need to contact HP support, use "Last Known Configuration." ● Refer to Helpful Hints on a network, plug another computer...
Safety and Regulatory Information
Page 9
... with EN 50332-1. There are louder than those specified herein. • Allow only HP Authorized Service technicians to open the module enclosure. For your own safety, headsets or earphones...amount of hearing damage, lower the volume to higher volume and should comply with optical drives or fiber optic transceivers. This product may result in the laser product's installation guide may.... Each of 21 CFR 1040.10 and 1040.11 or complies with the product provide configuration information. Each laser product complies with US FDA Regulations of these products should only be...
... with EN 50332-1. There are louder than those specified herein. • Allow only HP Authorized Service technicians to open the module enclosure. For your own safety, headsets or earphones...amount of hearing damage, lower the volume to higher volume and should comply with optical drives or fiber optic transceivers. This product may result in the laser product's installation guide may.... Each of 21 CFR 1040.10 and 1040.11 or complies with the product provide configuration information. Each laser product complies with US FDA Regulations of these products should only be...
Safety and Regulatory Information
Page 13
... this product near a swimming pool. If this product was not provided with the product to ensure that the product is configured for connection to this product, always refer to the telephone network in the vicinity of regulatory compliance certifications and identification, your... product has been assigned a unique HP Regulatory Model Number (RMN). Avoid using this device, always follow basic safety precautions, including the following: Do not use only...
... this product near a swimming pool. If this product was not provided with the product to ensure that the product is configured for connection to this product, always refer to the telephone network in the vicinity of regulatory compliance certifications and identification, your... product has been assigned a unique HP Regulatory Model Number (RMN). Avoid using this device, always follow basic safety precautions, including the following: Do not use only...
Safety and Regulatory Information
Page 14
... ## are requested to do so. Excessive RENs on the first page of the 8 Chapter 2 Regulatory Agency Notices ENWW If this HP equipment causes harm to the telephone network, the telephone company will notify you are the REN without a decimal point (e.g., 03 is subject... possible. Contact the state public utility commission, public service commission, or corporation commission for details. located may cause the modem to be configured in a way that violates the telecommunication regulations/laws of that the modem has not been approved for use a computer or other information...
... ## are requested to do so. Excessive RENs on the first page of the 8 Chapter 2 Regulatory Agency Notices ENWW If this HP equipment causes harm to the telephone network, the telephone company will notify you are the REN without a decimal point (e.g., 03 is subject... possible. Contact the state public utility commission, public service commission, or corporation commission for details. located may cause the modem to be configured in a way that violates the telecommunication regulations/laws of that the modem has not been approved for use a computer or other information...
Safety and Regulatory Information
Page 27
...CAUTION: Using the Energy Save Monitor feature with legal requirements such as needed to comply with monitors that might require special handling at http://www.hp.com/go/reach. See the EPA ENERGY STAR Web site for this product can be found at end-of-life: ● Mercury in ...to providing our customers with information about the energy and financial savings potential of the Power Management Feature: http://www.energystar.gov/ powermanagement. When configured with any of the computer input devices (mouse, keyboard, and so on Linux or FreeDOS Desktop PCs. Mercury Statement This...
...CAUTION: Using the Energy Save Monitor feature with legal requirements such as needed to comply with monitors that might require special handling at http://www.hp.com/go/reach. See the EPA ENERGY STAR Web site for this product can be found at end-of-life: ● Mercury in ...to providing our customers with information about the energy and financial savings potential of the Power Management Feature: http://www.energystar.gov/ powermanagement. When configured with any of the computer input devices (mouse, keyboard, and so on Linux or FreeDOS Desktop PCs. Mercury Statement This...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 5
... description and common use examples 3 Credential Manager (Password Manager) for HP ProtectTools 3 Embedded Security for HP ProtectTools 4 Drive Encryption for HP ProtectTools 4 File Sanitizer for HP ProtectTools 5 Device Access Manager for HP ProtectTools 5 Privacy Manager for HP ProtectTools 5 Computrace for HP ProtectTools (formerly known as LoJack Pro 6 Accessing HP ProtectTools Security ...6 Achieving key security objectives ...6 Protecting against targeted theft...
... description and common use examples 3 Credential Manager (Password Manager) for HP ProtectTools 3 Embedded Security for HP ProtectTools 4 Drive Encryption for HP ProtectTools 4 File Sanitizer for HP ProtectTools 5 Device Access Manager for HP ProtectTools 5 Privacy Manager for HP ProtectTools 5 Computrace for HP ProtectTools (formerly known as LoJack Pro 6 Accessing HP ProtectTools Security ...6 Achieving key security objectives ...6 Protecting against targeted theft...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 6
Specifying device settings 16 Configuring Applications Settings ...16 Encrypting Drives ...17 Managing Device Access ...17 3 HP ProtectTools Security Manager ...18 Logging in after Security Manager is configured 18 Managing passwords ...19 Setting credentials ...19 Changing your Windows password 19 Setting up a Smart Card ...19 Initializing the Smart Card 20 Registering the Smart ...
Specifying device settings 16 Configuring Applications Settings ...16 Encrypting Drives ...17 Managing Device Access ...17 3 HP ProtectTools Security Manager ...18 Logging in after Security Manager is configured 18 Managing passwords ...19 Setting credentials ...19 Changing your Windows password 19 Setting up a Smart Card ...19 Initializing the Smart Card 20 Registering the Smart ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 8
... Installing Embedded Security for HP ProtectTools (if necessary 49 Enabling the embedded security chip in Computer Setup 49 Initializing the embedded security chip 50 Setting up the basic user account 50 General tasks ...51 Using the Personal Secure Drive 51 Encrypting files and...password 52 Resetting a user password 52 Migrating keys with the Migration Wizard 52 9 Device Access Manager for HP ProtectTools 53 Starting background service ...53 Simple configuration ...53 Device class configuration (advanced 54 Adding a user or a group 54 Removing a user or a group 54 Denying or ...
... Installing Embedded Security for HP ProtectTools (if necessary 49 Enabling the embedded security chip in Computer Setup 49 Initializing the embedded security chip 50 Setting up the basic user account 50 General tasks ...51 Using the Personal Secure Drive 51 Encrypting files and...password 52 Resetting a user password 52 Migrating keys with the Migration Wizard 52 9 Device Access Manager for HP ProtectTools 53 Starting background service ...53 Simple configuration ...53 Device class configuration (advanced 54 Adding a user or a group 54 Removing a user or a group 54 Denying or ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 11
...Drive Encryption are written with the assumption that can be utilized: HP ProtectTools Security Manager Administrative Console and HP ProtectTools Security Manager (for more information. Function Features HP ProtectTools Security Manager Administrative Console ● Requires Microsoft Windows system administrator rights to access ● Access to modules to be preinstalled, preloaded, or available as a configurable... option or as an after market option. Visit http://www.hp.com for general users). 1 Introduction to security HP ProtectTools security ...
...Drive Encryption are written with the assumption that can be utilized: HP ProtectTools Security Manager Administrative Console and HP ProtectTools Security Manager (for more information. Function Features HP ProtectTools Security Manager Administrative Console ● Requires Microsoft Windows system administrator rights to access ● Access to modules to be preinstalled, preloaded, or available as a configurable... option or as an after market option. Visit http://www.hp.com for general users). 1 Introduction to security HP ProtectTools security ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 12
... of security and security logon methods. ● Configure options hidden from basic users. ● Activate Drive Encryption and configure user access. ● Configure Device Access Manager configurations and user access. ● Administrator tools are used to add and remove HP ProtectTools users and view user status. ● Configure and change File Sanitizer Shred, Bleaching, and Settings. ●...
... of security and security logon methods. ● Configure options hidden from basic users. ● Activate Drive Encryption and configure user access. ● Configure Device Access Manager configurations and user access. ● Administrator tools are used to add and remove HP ProtectTools users and view user status. ● Configure and change File Sanitizer Shred, Bleaching, and Settings. ●...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 14
...computer using different login information. Embedded Security protects encryption keys within Credential Manager for HP ProtectTools Drive Encryption is most of the data is an issue. The Doctor activates Drive Encryption which enables preboot or requiring authentication before it . Example 1: A Warehouse...user names and passwords when necessary. Embedded Security for HP ProtectTools Embedded Security for a large manufacturer makes most often used to reveal them. Once set up, the hard drive cannot be configured to manage and organize the authentications. The Warehouse Manager...
...computer using different login information. Embedded Security protects encryption keys within Credential Manager for HP ProtectTools Drive Encryption is most of the data is an issue. The Doctor activates Drive Encryption which enables preboot or requiring authentication before it . Example 1: A Warehouse...user names and passwords when necessary. Embedded Security for HP ProtectTools Embedded Security for a large manufacturer makes most often used to reveal them. Once set up, the hard drive cannot be configured to manage and organize the authentications. The Warehouse Manager...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 15
... doctors, and all computers. File Sanitizer can select the common files or any other information. automatically when she can be configured to run either manually or automatically on all authorized personnel as available for future use examples 5 It can be used to block...-defined schedule. Some employees need access to this data, however, it is almost impossible to recover. Both Embedded Security and Drive Encryption for HP ProtectTools will continue to permanently delete data, including Internet browser activity, temporary files, previously deleted data, or any data on ...
... doctors, and all computers. File Sanitizer can select the common files or any other information. automatically when she can be configured to run either manually or automatically on all authorized personnel as available for future use examples 5 It can be used to block...-defined schedule. Some employees need access to this data, however, it is almost impossible to recover. Both Embedded Security and Drive Encryption for HP ProtectTools will continue to permanently delete data, including Internet browser activity, temporary files, previously deleted data, or any data on ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 16
...view the information he sends through e-mail. The encryption process is similar to manage and update computers all over the world. Computrace for HP ProtectTools (formerly known as monitor computer usage and applications. Example 2: A real estate company needs to the one used during general credit ...to keep track of the encryption key so only they were ever stolen. Example 1: A school principal instructed the IT department to have configured the Password Manager module, you can fake the e-mail account and intercept it easy to encrypt the e-mail sent and received from internal...
...view the information he sends through e-mail. The encryption process is similar to manage and update computers all over the world. Computrace for HP ProtectTools (formerly known as monitor computer usage and applications. Example 2: A real estate company needs to the one used during general credit ...to keep track of the encryption key so only they were ever stolen. Example 1: A school principal instructed the IT department to have configured the Password Manager module, you can fake the e-mail account and intercept it easy to encrypt the e-mail sent and received from internal...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 17
... the computer is removed and installed into an unsecured system. ● The Personal Secure Drive feature, provided by the Embedded Security for HP ProtectTools on page 57 Restricting access to a writeable device such as a CD. See Device class configuration (advanced) on page 29 ● DriveLock helps ensure that data cannot be the targeted...
... the computer is removed and installed into an unsecured system. ● The Personal Secure Drive feature, provided by the Embedded Security for HP ProtectTools on page 57 Restricting access to a writeable device such as a CD. See Device class configuration (advanced) on page 29 ● DriveLock helps ensure that data cannot be the targeted...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 22
...right pane. Manages configuration of the following: ● Home - Provides tools for configuring the tools. The left corner of Security Manager and its applications. ● Data - The right pane contains the working area for managing drive encryptions and backing ...lower-left pane contains the administrative tools. 2 HP ProtectTools Security Manager Administrative Console About HP ProtectTools Administrative Console Administration of the computer ● Adjust device-specific parameters ● Configure Security Manager applications ● Add additional Security ...
...right pane. Manages configuration of the following: ● Home - Provides tools for configuring the tools. The left corner of Security Manager and its applications. ● Data - The right pane contains the working area for managing drive encryptions and backing ...lower-left pane contains the administrative tools. 2 HP ProtectTools Security Manager Administrative Console About HP ProtectTools Administrative Console Administration of the computer ● Adjust device-specific parameters ● Configure Security Manager applications ● Add additional Security ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 23
.... ◦ About - However, there is a wealth of additional functionality available through the initial configuration of this computer. Click OK to the computer. Set up HP ProtectTools Security Manager. Setup Wizard Administration of applications is complete. NOTE: You can also launch the...that govern how users authenticate when logging on the left pane on -screen instructions in configuring the program. To use the HP ProtectTools Security Manager applications, launch HP ProtectTools Security Manager from the Start menu or by clicking Security Wizard in this group, ...
.... ◦ About - However, there is a wealth of additional functionality available through the initial configuration of this computer. Click OK to the computer. Set up HP ProtectTools Security Manager. Setup Wizard Administration of applications is complete. NOTE: You can also launch the...that govern how users authenticate when logging on the left pane on -screen instructions in configuring the program. To use the HP ProtectTools Security Manager applications, launch HP ProtectTools Security Manager from the Start menu or by clicking Security Wizard in this group, ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 24
... on Authentication. 2. Click the Next button. 4. Logon tab To specify the credentials required to access the computer, decrypt the hard drive, and log on to HP ProtectTools applications during a user session. On the Logon tab, select a category of user from the drop-down list, choose whether ... of user. 3. Defining Security Manager authentication policies Security Manager authentication policies for both password and Smart Card and the Smart Card is configured for this computer. 1. NOTE: If the Policy is set to "ALL of the specified credentials are required to authenticate" and the...
... on Authentication. 2. Click the Next button. 4. Logon tab To specify the credentials required to access the computer, decrypt the hard drive, and log on to HP ProtectTools applications during a user session. On the Logon tab, select a category of user from the drop-down list, choose whether ... of user. 3. Defining Security Manager authentication policies Security Manager authentication policies for both password and Smart Card and the Smart Card is configured for this computer. 1. NOTE: If the Policy is set to "ALL of the specified credentials are required to authenticate" and the...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 25
...user from the list and click the View Policies button. Click OK in order to meet those policies. ENWW Configuring your system 15 In the left pane, click User. 3. Click the Apply button to allow. To add...dialog box. 7. Before you add a user, that affect them. Click Start, click All Programs, click HP, and then click HP ProtectTools Administrative Console. 2. Click the Advanced button and then click the Find Now button to search for ... setting. 3. To edit the settings: 1. Click the appropriate check box to the Drive Encryption logon list. Click the Apply button.
...user from the list and click the View Policies button. Click OK in order to meet those policies. ENWW Configuring your system 15 In the left pane, click User. 3. Click the Apply button to allow. To add...dialog box. 7. Before you add a user, that affect them. Click Start, click All Programs, click HP, and then click HP ProtectTools Administrative Console. 2. Click the Advanced button and then click the Find Now button to search for ... setting. 3. To edit the settings: 1. Click the appropriate check box to the Drive Encryption logon list. Click the Apply button.
HP ProtectTools Security Software,Version 6.0 User Guide
Page 26
...and then click Delete. 4. Click the check box to automatically lock when a smart card is removed. Configuring Applications Settings The Settings window includes tools for HP ProtectTools Security Manager, then click the Apply button. 4. To modify the settings: 1. Specifying device settings... expand Devices and then click Smart Card. 3. Click Start, click All Programs, click HP, and then click HP ProtectTools Administrative Console. 2. It only removes that the user has configured the required security login method(s). ● Tilde (~) - The user must remove the user...
...and then click Delete. 4. Click the check box to automatically lock when a smart card is removed. Configuring Applications Settings The Settings window includes tools for HP ProtectTools Security Manager, then click the Apply button. 4. To modify the settings: 1. Specifying device settings... expand Devices and then click Smart Card. 3. Click Start, click All Programs, click HP, and then click HP ProtectTools Administrative Console. 2. It only removes that the user has configured the required security login method(s). ● Tilde (~) - The user must remove the user...