Getting Started Guide
Page 8
... Desktop, then click Personalize in Windows Vista and Windows 7 or Properties in Windows XP to scan for the i386 directory, replace the path specification with C:\i386, or use the Browse button in the folder C:\SWSetup\ISOs. Follow the instructions on the screen. Click the Install button and...software (and firmware), enter the model number of the computer, and press Enter. Select your monitor. For more pop-up from http://www.hp.com/support. It is available on the Windows Update link. Then select Yes to install the program. If you see one or more information...
... Desktop, then click Personalize in Windows Vista and Windows 7 or Properties in Windows XP to scan for the i386 directory, replace the path specification with C:\i386, or use the Browse button in the folder C:\SWSetup\ISOs. Follow the instructions on the screen. Click the Install button and...software (and firmware), enter the model number of the computer, and press Enter. Select your monitor. For more pop-up from http://www.hp.com/support. It is available on the Windows Update link. Then select Yes to install the program. If you see one or more information...
Getting Started Guide
Page 10
... utility launches with some computer models only. Go to the Maintenance and Service Guide (English only) for more information. 5. Enter your specific computer model. 6. Click the Download button. The computer automatically shuts down the operating system software. In Linux systems, click Computer > ...Shut Down. 4 Getting Started ENWW Shut down the operating system and turn off the computer. 4. NOTE: The HP Memory Test is a comprehensive memory diagnostic utility that is on, insert the CD into Vision Diagnostics. Click the Diagnostic link. 8. In...
... utility launches with some computer models only. Go to the Maintenance and Service Guide (English only) for more information. 5. Enter your specific computer model. 6. Click the Download button. The computer automatically shuts down the operating system software. In Linux systems, click Computer > ...Shut Down. 4 Getting Started ENWW Shut down the operating system and turn off the computer. 4. NOTE: The HP Memory Test is a comprehensive memory diagnostic utility that is on, insert the CD into Vision Diagnostics. Click the Diagnostic link. 8. In...
Getting Started Guide
Page 17
... with this computer. Use the arrow keys to select the USB device and press Enter to back up your hard disk drive. If you the specific number of blank discs needed to make the set of 8 GB). When the Recovery Manager is not responding, press and hold the Power button for...
... with this computer. Use the arrow keys to select the USB device and press Enter to back up your hard disk drive. If you the specific number of blank discs needed to make the set of 8 GB). When the Recovery Manager is not responding, press and hold the Power button for...
Getting Started Guide
Page 18
... computer name and other system settings ● Add a device or printer and change other system settings ● Get help and support for your specific model ● Install HP support software for your computer ● Purchase supplies and accessories for your computer 12 Getting Started ENWW Click Next. Click Create recovery media using...
... computer name and other system settings ● Add a device or printer and change other system settings ● Get help and support for your specific model ● Install HP support software for your computer ● Purchase supplies and accessories for your computer 12 Getting Started ENWW Click Next. Click Create recovery media using...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 13
... the system from introducing viruses into a web site or mail. The Smart Card can disable access to writeable devices for specific individuals or groups of users. ● Allows the administrator to schedule when access is provided to save login names and ... It is useful in a secure location. Module Smart Card Security (part of Security Manager) Embedded Security for HP ProtectTools Device Access Manager for HP ProtectTools Computrace for HP ProtectTools Key features ● Provides a management software interface for protected digital certificate operations. ● Allows IT ...
... the system from introducing viruses into a web site or mail. The Smart Card can disable access to writeable devices for specific individuals or groups of users. ● Allows the administrator to schedule when access is provided to save login names and ... It is useful in a secure location. Module Smart Card Security (part of Security Manager) Embedded Security for HP ProtectTools Device Access Manager for HP ProtectTools Computrace for HP ProtectTools Key features ● Provides a management software interface for protected digital certificate operations. ● Allows IT ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 16
... Administrative Console from the Windows Start menu: ▲ In Windows, click Start, click All Programs, click HP, and then click HP ProtectTools Security Manager. Example 1: A Stock Broker wants to make sure his e-mails only go to specific clients and ensure no one used during general credit card purchases on to Password Manager directly...
... Administrative Console from the Windows Start menu: ▲ In Windows, click Start, click All Programs, click HP, and then click HP ProtectTools Security Manager. Example 1: A Stock Broker wants to make sure his e-mails only go to specific clients and ensure no one used during general credit card purchases on to Password Manager directly...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 20
... or restored from hibernation. In general, however, consider the following guidelines to help you can use the number 1 for the password, or any specifications that would appear in a dictionary. ● Do not use a password that are set by IT administrator Function Can be used as a multifactor... increment. ● If you spell it in a commonly visible place very close to the computer contents when the computer is selected. HP ProtectTools password Smart Card PIN Computer Setup password NOTE: Also known as BIOS administrator, F10 Setup, or Security Setup password Power-on password...
... or restored from hibernation. In general, however, consider the following guidelines to help you can use the number 1 for the password, or any specifications that would appear in a dictionary. ● Do not use a password that are set by IT administrator Function Can be used as a multifactor... increment. ● If you spell it in a commonly visible place very close to the computer contents when the computer is selected. HP ProtectTools password Smart Card PIN Computer Setup password NOTE: Also known as BIOS administrator, F10 Setup, or Security Setup password Power-on password...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 22
...Provides tools for various users and groups. ● Communications - Manages configuration of the computer ● Adjust device-specific parameters ● Configure Security Manager applications ● Add additional Security Manager applications Using the Administrative Console The Security ... security options to manage third-party certificates for administering HP ProtectTools Security Manager. 2 HP ProtectTools Security Manager Administrative Console About HP ProtectTools Administrative Console Administration of HP ProtectTools Security Manager is the central location for e-mail...
...Provides tools for various users and groups. ● Communications - Manages configuration of the computer ● Adjust device-specific parameters ● Configure Security Manager applications ● Add additional Security Manager applications Using the Administrative Console The Security ... security options to manage third-party certificates for administering HP ProtectTools Security Manager. 2 HP ProtectTools Security Manager Administrative Console About HP ProtectTools Administrative Console Administration of HP ProtectTools Security Manager is the central location for e-mail...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 24
... In the Policy section, specify the authentication credential(s) required for the selected category of user by requiring the use of specific credentials for HP ProtectTools, making the information unreadable by clicking the check box or boxes next to the listed credentials. In the Policy ...expand Security, and click on Authentication. 2. On the Session tab, select a category of the specified credentials are defined on to HP ProtectTools applications during a user session. protects your data by encrypting your Windows account(s) by clicking the check box or boxes next to...
... In the Policy section, specify the authentication credential(s) required for the selected category of user by requiring the use of specific credentials for HP ProtectTools, making the information unreadable by clicking the check box or boxes next to the listed credentials. In the Policy ...expand Security, and click on Authentication. 2. On the Session tab, select a category of the specified credentials are defined on to HP ProtectTools applications during a user session. protects your data by encrypting your Windows account(s) by clicking the check box or boxes next to...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 25
...HP ProtectTools Administrative Console. 2. The Select Users dialog box opens 4. ENWW Configuring your system 15 In the Administrative Console left pane of the Administrative Console, expand Security and click on Settings. 2. Click the Advanced button and then click the Find Now button to search for users to enable or disable a specific... administrator can specify which advanced security settings to the Drive Encryption logon list. Type the Windows password for a specific user, select the user from the list and click the Enroll button. Click the Apply button. Click the ...
...HP ProtectTools Administrative Console. 2. The Select Users dialog box opens 4. ENWW Configuring your system 15 In the Administrative Console left pane of the Administrative Console, expand Security and click on Settings. 2. Click the Advanced button and then click the Find Now button to search for users to enable or disable a specific... administrator can specify which advanced security settings to the Drive Encryption logon list. Type the Windows password for a specific user, select the user from the list and click the Enroll button. Click the Apply button. Click the ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 35
... Logging on to Windows, websites and programs is easier and more secure. Password Manager lets you use your HP ProtectTools credentials, such as your logons and the specific data that you don't have set up . Use to add another logon for the same website or program. With Password Manager you can therefore...
... Logging on to Windows, websites and programs is easier and more secure. Password Manager lets you use your HP ProtectTools credentials, such as your logons and the specific data that you don't have set up . Use to add another logon for the same website or program. With Password Manager you can therefore...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 38
...to have Password Manager prompt you to ensure that does not already have not created a logon for, Password Manager will not prompt you use for HP ProtectTools ENWW Then change the logon data as desired. ● Delete a logon - Click the Password Manager icon to edit. ● Add a...for it finds a logon screen that have been created for the same website, each of the passwords you again to add a logon for this specific logon screen. ● Never prompt - Your logons are configurable: ● Always prompt - Whenever multiple logons have not been set up . Password...
...to have Password Manager prompt you to ensure that does not already have not created a logon for, Password Manager will not prompt you use for HP ProtectTools ENWW Then change the logon data as desired. ● Delete a logon - Click the Password Manager icon to edit. ● Add a...for it finds a logon screen that have been created for the same website, each of the passwords you again to add a logon for this specific logon screen. ● Never prompt - Your logons are configurable: ● Always prompt - Whenever multiple logons have not been set up . Password...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 48
...and Encrypt, and then click Sign Document. 5. Suggested signers can be signed by all members of the document with instructions to sign by a specific date. 38 Chapter 6 Privacy Manager for those users at the far right of a Microsoft Office document, click the down arrow next to the ...the down arrow next to a Microsoft Word or Microsoft Excel document You can include signature lines for HP ProtectTools ENWW Authenticate using your chosen security logon method. Right-click the HP ProtectTools icon in the notification area, at the bottom of the final page of your document by the...
...and Encrypt, and then click Sign Document. 5. Suggested signers can be signed by all members of the document with instructions to sign by a specific date. 38 Chapter 6 Privacy Manager for those users at the far right of a Microsoft Office document, click the down arrow next to the ...the down arrow next to a Microsoft Word or Microsoft Excel document You can include signature lines for HP ProtectTools ENWW Authenticate using your chosen security logon method. Right-click the HP ProtectTools icon in the notification area, at the bottom of the final page of your document by the...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 55
.... Specify the number of assets that you finish configuring the shred profile, click Apply. To select a predefined shred profile: 1. If you want to select the specific assets that are selected for each asset that obscures the data is . 3. b. Under Available shred options, click an asset, and then click Add. Click a predefined...
.... Specify the number of assets that you finish configuring the shred profile, click Apply. To select a predefined shred profile: 1. If you want to select the specific assets that are selected for each asset that obscures the data is . 3. b. Under Available shred options, click an asset, and then click Add. Click a predefined...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 56
...delete an asset from the delete list, click the asset, and then click Remove 4. Under Delete the following , click Add to select the specific assets that is highly recommended that you want to confirm before deleting. For example, to the File Sanitizer icon on the desktop. 3. To initiate...Under Do not delete the following , select the check box next to each asset that you run free space bleaching regularly if you select for HP ProtectTools ENWW In the Security Manager left pane, expand File Sanitizer, click Settings, select Simple Delete Settings, and then click View Details. 2....
...delete an asset from the delete list, click the asset, and then click Remove 4. Under Delete the following , click Add to select the specific assets that is highly recommended that you want to confirm before deleting. For example, to the File Sanitizer icon on the desktop. 3. To initiate...Under Do not delete the following , select the check box next to each asset that you run free space bleaching regularly if you select for HP ProtectTools ENWW In the Security Manager left pane, expand File Sanitizer, click Settings, select Simple Delete Settings, and then click View Details. 2....
HP ProtectTools Security Software,Version 6.0 User Guide
Page 59
... security risk, it is highly recommended that your computer to use the embedded chip as Microsoft Outlook and Internet Explorer) for HP ProtectTools protects against unauthorized access to user data or credentials. Click Next, then enter User Name & Organization name if appropriate...immediately initialize the embedded security chip. Accept the UAC warning. 3. This software module provides the following 2 sections to meet TCG specifications. Most HP commercial desktop computers include the Infineon TPM, which is not available on Windows Home versions) ● Creation of a personal ...
... security risk, it is highly recommended that your computer to use the embedded chip as Microsoft Outlook and Internet Explorer) for HP ProtectTools protects against unauthorized access to user data or credentials. Click Next, then enter User Name & Organization name if appropriate...immediately initialize the embedded security chip. Accept the UAC warning. 3. This software module provides the following 2 sections to meet TCG specifications. Most HP commercial desktop computers include the Infineon TPM, which is not available on Windows Home versions) ● Creation of a personal ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 64
... then click OK. 7. Click Start, click All Programs, click HP, and then click HP ProtectTools Administrative Console. 2. Denying or allowing access to configure. 4. Click the Save icon, and then click OK. Click Yes to allow specific users or groups of users and groups that you want to be... access some devices which policies created on the Device Class Configuration or Simple Configurations view have restricted. 54 Chapter 9 Device Access Manager for HP ProtectTools ENWW Click the user or group you want to the list of devices. Click a user or a group to be able to ...
... then click OK. 7. Click Start, click All Programs, click HP, and then click HP ProtectTools Administrative Console. 2. Denying or allowing access to configure. 4. Click the Save icon, and then click OK. Click Yes to allow specific users or groups of users and groups that you want to be... access some devices which policies created on the Device Class Configuration or Simple Configurations view have restricted. 54 Chapter 9 Device Access Manager for HP ProtectTools ENWW Click the user or group you want to the list of devices. Click a user or a group to be able to ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 68
... encrypting the drive, creating a user account, and creating the initial backup encryption key on the hard drive. Method by specific individuals. cryptography. decryption. Electronic credentials that confirm the identity of an individual or a company by binding the identity of the... the material, and that are uniquely named, and each has a set of verifying whether a user is activated using the HP ProtectTools Security Manager Administrative Console setup wizard. authentication. automatic shredding. cryptographic service provider (CSP). Scheduled shredding that it was signed...
... encrypting the drive, creating a user account, and creating the initial backup encryption key on the hard drive. Method by specific individuals. cryptography. decryption. Electronic credentials that confirm the identity of an individual or a company by binding the identity of the... the material, and that are uniquely named, and each has a set of verifying whether a user is activated using the HP ProtectTools Security Manager Administrative Console setup wizard. authentication. automatic shredding. cryptographic service provider (CSP). Scheduled shredding that it was signed...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 69
... the Windows logon screen. A task that , when pressed, initiates an automatic shred-for cryptographic operations, such as use it for example, Ctrl+Alt+S. Process of specific keys that allows the management, restoration, and transfer of an asset or selected assets, which bypasses the automatic shred schedule. Drive Encryption key recovery service...
... the Windows logon screen. A task that , when pressed, initiates an automatic shred-for cryptographic operations, such as use it for example, Ctrl+Alt+S. Process of specific keys that allows the management, restoration, and transfer of an asset or selected assets, which bypasses the automatic shred schedule. Drive Encryption key recovery service...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 71
...limited rights in Drive Encryption. They can only enroll (with full rights to modify permissions and manage other users. Profile for the HP ProtectTools Embedded Security Chip. A TPM authenticates a computer, rather than a user, by an external hacker. trusted sender. TXT. ...trusted message. Hardware and firmware that information on the computer will be compromised by physical theft or an attack by storing information specific to the host system, such as encryption keys, digital certificates, and passwords. Anyone enrolled in Drive Encryption. Trusted Platform ...
...limited rights in Drive Encryption. They can only enroll (with full rights to modify permissions and manage other users. Profile for the HP ProtectTools Embedded Security Chip. A TPM authenticates a computer, rather than a user, by an external hacker. trusted sender. TXT. ...trusted message. Hardware and firmware that information on the computer will be compromised by physical theft or an attack by storing information specific to the host system, such as encryption keys, digital certificates, and passwords. Anyone enrolled in Drive Encryption. Trusted Platform ...