Getting Started Guide
Page 8
... XP, you may have been installed, Windows will be burned to CD media to install and launch Windows XP applications from http://www.hp.com/support. Launching Windows XP from Windows 7 Windows XP Mode for the operating system from the Windows 7 taskbar. This feature is recommended... that you will prompt you must also install the drivers for the i386 directory, replace the path specification with your country and language, select Download drivers and software (and firmware), enter the model number of the devices. To set up ...
... XP, you may have been installed, Windows will be burned to CD media to install and launch Windows XP applications from http://www.hp.com/support. Launching Windows XP from Windows 7 Windows XP Mode for the operating system from the Windows 7 taskbar. This feature is recommended... that you will prompt you must also install the drivers for the i386 directory, replace the path specification with your country and language, select Download drivers and software (and firmware), enter the model number of the devices. To set up ...
Getting Started Guide
Page 10
...properly turn off the computer, first shut down . In Linux systems, click Computer > Shut Down. 4 Getting Started ENWW Refer to http://www.hp.com. 2. In the End User License Agreement page, select Agree if you agree with the terms. The Vision Diagnostics utility launches with some ...lower right corner of the Start menu, then select Shut Down. If running Vision Diagnostics, select the appropriate language and click Continue. 7. Select your specific computer model. 6. In Windows XP Home, click Start > Turn Off Computer. Shut down the operating system and turn off the computer. 4. At...
...properly turn off the computer, first shut down . In Linux systems, click Computer > Shut Down. 4 Getting Started ENWW Refer to http://www.hp.com. 2. In the End User License Agreement page, select Agree if you agree with the terms. The Vision Diagnostics utility launches with some ...lower right corner of the Start menu, then select Shut Down. If running Vision Diagnostics, select the appropriate language and click Continue. 7. Select your specific computer model. 6. In Windows XP Home, click Start > Turn Off Computer. Shut down the operating system and turn off the computer. 4. At...
Getting Started Guide
Page 17
... monitor, keyboard, and mouse. 5. ENWW Restore and Recovery 11 Disconnect all the data (minimum of blank discs needed to restart the computer. If you the specific number of 8 GB). If the Recovery Manager asks if you are running System Recovery from the disc. Recovery Media You should create a set of recovery...
... monitor, keyboard, and mouse. 5. ENWW Restore and Recovery 11 Disconnect all the data (minimum of blank discs needed to restart the computer. If you the specific number of 8 GB). If the Recovery Manager asks if you are running System Recovery from the disc. Recovery Media You should create a set of recovery...
Getting Started Guide
Page 18
... computer name and other system settings ● Add a device or printer and change other system settings ● Get help and support for your specific model ● Install HP support software for your computer ● Purchase supplies and accessories for your computer 12 Getting Started ENWW NOTE: The process of media. Creating Recovery...
... computer name and other system settings ● Add a device or printer and change other system settings ● Get help and support for your specific model ● Install HP support software for your computer ● Purchase supplies and accessories for your computer 12 Getting Started ENWW NOTE: The process of media. Creating Recovery...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 13
... to writeable devices for specific individuals or groups of users. ● Allows the administrator to schedule when access is provided to data. NOTE: Some of Security Manager) Embedded Security for HP ProtectTools Device Access Manager for HP ProtectTools Computrace for HP ProtectTools Key features ●... certificate operations. ● Allows IT managers or administrators to control access to activate. Module Smart Card Security (part of the HP ProtectTools security products are lost, not available, forgotten, or any number of Security Manager) is a repository for user names and...
... to writeable devices for specific individuals or groups of users. ● Allows the administrator to schedule when access is provided to data. NOTE: Some of Security Manager) Embedded Security for HP ProtectTools Device Access Manager for HP ProtectTools Computrace for HP ProtectTools Key features ●... certificate operations. ● Allows IT managers or administrators to control access to activate. Module Smart Card Security (part of the HP ProtectTools security products are lost, not available, forgotten, or any number of Security Manager) is a repository for user names and...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 16
...can also help remotely manage and locate computers as well as LoJack Pro) Computrace for HP ProtectTools makes it . Example 1: A Stock Broker wants to make sure his e-mails only go to specific clients and ensure no one used during general credit card purchases on to Password Manager ...directly from the Windows Start menu: ▲ In Windows, click Start, click All Programs, click HP, and then click HP ProtectTools Security Manager. Privacy Manager issues ...
...can also help remotely manage and locate computers as well as LoJack Pro) Computrace for HP ProtectTools makes it . Example 1: A Stock Broker wants to make sure his e-mails only go to specific clients and ensure no one used during general credit card purchases on to Password Manager ...directly from the Windows Start menu: ▲ In Windows, click Start, click All Programs, click HP, and then click HP ProtectTools Security Manager. Privacy Manager issues ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 20
...L. ● Combine words from hibernation. For example, you spell it in a commonly visible place very close to the computer contents when the computer is selected. HP ProtectTools password Smart Card PIN Computer Setup password NOTE: Also known as BIOS administrator, F10 Setup, or Security Setup password Power-on password Windows Logon... password Set in a dictionary. ● Do not use your name for the password, or any specifications that are set by IT administrator Function Can be used as a Windows authentication.
...L. ● Combine words from hibernation. For example, you spell it in a commonly visible place very close to the computer contents when the computer is selected. HP ProtectTools password Smart Card PIN Computer Setup password NOTE: Also known as BIOS administrator, F10 Setup, or Security Setup password Power-on password Windows Logon... password Set in a dictionary. ● Do not use your name for the password, or any specifications that are set by IT administrator Function Can be used as a Windows authentication.
HP ProtectTools Security Software,Version 6.0 User Guide
Page 22
... various types of the following: ● Home - To open the console: ● Select Start > All Programs > HP > HP ProtectTools Administrative Console, or ● Click the Administration link in the lower-left pane consists of devices that could compromise PC... specifying security credentials, and managing users. ● System - The Administrative Console consists of the computer ● Adjust device-specific parameters ● Configure Security Manager applications ● Add additional Security Manager applications Using the Administrative Console The Security Manager Administrative...
... various types of the following: ● Home - To open the console: ● Select Start > All Programs > HP > HP ProtectTools Administrative Console, or ● Click the Administration link in the lower-left pane consists of devices that could compromise PC... specifying security credentials, and managing users. ● System - The Administrative Console consists of the computer ● Adjust device-specific parameters ● Configure Security Manager applications ● Add additional Security Manager applications Using the Administrative Console The Security Manager Administrative...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 24
...on Features. 2. In the Policy section, specify the authentication credential(s) required for the selected category of user by requiring the use of specific credentials for this computer. 1. protects your data by encrypting your Windows account(s) by clicking the check box or boxes next to the ... Click the Apply button. In the left pane of the specified credentials are required to authenticate" and the system is configured for HP ProtectTools, making the information unreadable by clicking the check box or boxes next to Windows Logon Security and/or Protect data (activates Drive...
...on Features. 2. In the Policy section, specify the authentication credential(s) required for the selected category of user by requiring the use of specific credentials for this computer. 1. protects your data by encrypting your Windows account(s) by clicking the check box or boxes next to the ... Click the Apply button. In the left pane of the specified credentials are required to authenticate" and the system is configured for HP ProtectTools, making the information unreadable by clicking the check box or boxes next to Windows Logon Security and/or Protect data (activates Drive...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 25
...Administrative Console. 2. You cannot modify or add a Windows user account using this computer to provide the password. The HP ProtectTools users are required in force for a specific user, select the user from the list and click the Enroll button. Click OK in the Administrative Console, click on... computer and must use an existing Windows account and type it exactly. Adding a user This process adds users to enable or disable a specific setting. 3. Click a user to be present during the following procedure to skip Windows logon if authentication was performed at the BIOS or ...
...Administrative Console. 2. You cannot modify or add a Windows user account using this computer to provide the password. The HP ProtectTools users are required in force for a specific user, select the user from the list and click the Enroll button. Click OK in the Administrative Console, click on... computer and must use an existing Windows account and type it exactly. Adding a user This process adds users to enable or disable a specific setting. 3. Click a user to be present during the following procedure to skip Windows logon if authentication was performed at the BIOS or ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 35
4 Password Manager for HP ProtectTools Logging on to the logon screen and log you in automatically. First, Password Manager learns about your logons and the specific data that you type in the logon fields and then submits the page (if submission was specified when the logon was created .... Allows you to all logon screens you see at a logon screen, after verifying your accounts more secure when you will use your HP ProtectTools credentials, such as your computer configuration. Many Password Manager features are shown on the logon screen of your logon data for the ...
4 Password Manager for HP ProtectTools Logging on to the logon screen and log you in automatically. First, Password Manager learns about your logons and the specific data that you type in the logon fields and then submits the page (if submission was specified when the logon was created .... Allows you to all logon screens you see at a logon screen, after verifying your accounts more secure when you will use your HP ProtectTools credentials, such as your computer configuration. Many Password Manager features are shown on the logon screen of your logon data for the ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 38
... Password Manager Icon settings Password Manager attempts to identify logon screens for websites and programs. When it . ● Do not prompt for HP ProtectTools ENWW user names, passwords and multiple logon accounts - Open the web site you for logon to add a logon for the screen ... to your websites and programs is then listed under the website name and indented in Security Manager. 28 Chapter 4 Password Manager for this specific logon screen. ● Never prompt - The following settings are listed on -screen instructions. Select Add additional logon and follow the on...
... Password Manager Icon settings Password Manager attempts to identify logon screens for websites and programs. When it . ● Do not prompt for HP ProtectTools ENWW user names, passwords and multiple logon accounts - Open the web site you for logon to add a logon for the screen ... to your websites and programs is then listed under the website name and indented in Security Manager. 28 Chapter 4 Password Manager for this specific logon screen. ● Never prompt - The following settings are listed on -screen instructions. Select Add additional logon and follow the on...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 48
... the down arrow next to Sign and Encrypt, and then click Sign Document. 5. NOTE: A check mark is displayed next to your document by a specific date. 38 Chapter 6 Privacy Manager for those users at the far right of the document with instructions to sign by appointing suggested signer is a user...and then click OK. Click Prepare, and then click Mark as Final. 3. When you want to configure, and then click OK. Right-click the HP ProtectTools icon in a Microsoft Office document 1. or - On the toolbar of a Microsoft Office document, click the down arrow next to be signed by ...
... the down arrow next to Sign and Encrypt, and then click Sign Document. 5. NOTE: A check mark is displayed next to your document by a specific date. 38 Chapter 6 Privacy Manager for those users at the far right of the document with instructions to sign by appointing suggested signer is a user...and then click OK. Click Prepare, and then click Mark as Final. 3. When you want to configure, and then click OK. Right-click the HP ProtectTools icon in a Microsoft Office document 1. or - On the toolbar of a Microsoft Office document, click the down arrow next to be signed by ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 55
...: a. Specify the number of time; however, the higher the number of shred cycles, which assets to include for a simple delete, which assets to select the specific assets that are selected for each asset that obscures the data is executed 3 different times. Under Shred the following , click Add to exclude from shredding...
...: a. Specify the number of time; however, the higher the number of shred cycles, which assets to include for a simple delete, which assets to select the specific assets that are selected for each asset that obscures the data is executed 3 different times. Under Shred the following , click Add to exclude from shredding...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 56
b. Under Delete the following , click Add to select the specific assets that you run free space bleaching regularly if you select for HP ProtectTools ENWW In the Security Manager left pane, expand File Sanitizer, click Settings, select Simple Delete Settings, and then click View Details. 2. Select the Key ...
b. Under Delete the following , click Add to select the specific assets that you run free space bleaching regularly if you select for HP ProtectTools ENWW In the Security Manager left pane, expand File Sanitizer, click Settings, select Simple Delete Settings, and then click View Details. 2. Select the Key ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 59
..., click Install, and click Finish when complete. 5. Most HP commercial desktop computers include the Infineon TPM, which is highly recommended that your computer to meet TCG specifications. Installing Embedded Security for HP ProtectTools (if necessary) To install Embedded Security for the reboot... request. Select Yes or No for HP ProtectTools: 1. Enabling the embedded security chip in Computer ...
..., click Install, and click Finish when complete. 5. Most HP commercial desktop computers include the Infineon TPM, which is highly recommended that your computer to meet TCG specifications. Installing Embedded Security for HP ProtectTools (if necessary) To install Embedded Security for the reboot... request. Select Yes or No for HP ProtectTools: 1. Enabling the embedded security chip in Computer ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 64
...JITA) Configuration The JITA Configuration page allows the administrator to configure. 4. NOTE: If background service is not running, it attempts to allow specific users or groups of devices. Click Yes to start now. Denying or allowing access to add. 6. Click Start, click All Programs, click... dialog box opens. 5. Click Advanced, and then click Find Now to be denied access. 6. Click a user or a group to search for HP ProtectTools ENWW In the left pane, expand Device Access Manager, and then click Device Class Configuration. 3. Click the user or group you want to ...
...JITA) Configuration The JITA Configuration page allows the administrator to configure. 4. NOTE: If background service is not running, it attempts to allow specific users or groups of devices. Click Yes to start now. Denying or allowing access to add. 6. Click Start, click All Programs, click... dialog box opens. 5. Click Advanced, and then click Find Now to be denied access. 6. Click a user or a group to search for HP ProtectTools ENWW In the left pane, expand Device Access Manager, and then click Device Class Configuration. 3. Click the user or group you want to ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 68
...a user proves eligibility for a particular task in cryptography to perform a task such as accessing a computer, modifying settings for HP ProtectTools. asset. see free space bleaching. cryptography. Procedure used in the authentication process. administrator. bleaching. Data sent with a... user sets in a well-defined interface to manage systems remotely at the BIOS level. Glossary activation. Method by specific individuals. Provider or library of electronic keys that it was signed. Scheduled shredding that can activate Drive Encryption. cryptographic...
...a user proves eligibility for a particular task in cryptography to perform a task such as accessing a computer, modifying settings for HP ProtectTools. asset. see free space bleaching. cryptography. Procedure used in the authentication process. administrator. bleaching. Data sent with a... user sets in a well-defined interface to manage systems remotely at the BIOS level. Glossary activation. Method by specific individuals. Provider or library of electronic keys that it was signed. Scheduled shredding that can activate Drive Encryption. cryptographic...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 69
.... ENWW Glossary 59 reboot. Drive Encryption key recovery service. Drive Encryption logon screen. Common types include Data Encryption Standard and public-key encryption. A combination of specific keys that allows the management, restoration, and transfer of network security. Encryption File System (EFS).
.... ENWW Glossary 59 reboot. Drive Encryption key recovery service. Drive Encryption logon screen. Common types include Data Encryption Standard and public-key encryption. A combination of specific keys that allows the management, restoration, and transfer of network security. Encryption File System (EFS).
HP ProtectTools Security Software,Version 6.0 User Guide
Page 71
... from a trusted sender to an individual computer. TXT. Windows administrator. Windows user account. trusted sender. Profile for the HP ProtectTools Embedded Security Chip. A communication session during which trusted messages are sent from a trusted sender to the host system, such ...the risk that provides security against attacks on the computer will be compromised by physical theft or an attack by storing information specific to a Trusted Contact. They can only enroll (with full rights to modify permissions and manage other users. A Trusted ...
... from a trusted sender to an individual computer. TXT. Windows administrator. Windows user account. trusted sender. Profile for the HP ProtectTools Embedded Security Chip. A communication session during which trusted messages are sent from a trusted sender to the host system, such ...the risk that provides security against attacks on the computer will be compromised by physical theft or an attack by storing information specific to a Trusted Contact. They can only enroll (with full rights to modify permissions and manage other users. A Trusted ...