HP ProtectTools Getting Started
Page 6
... ...59 Managing Drive Encryption (administrator task 59 Using Enhanced Security with TPM (select models only 60 Encrypting or decrypting individual drive partitions (software encryption only) ...61 Performing an HP SpareKey Recovery 61 Backup and recovery (administrator task 61 Backing up encryption... keys 61 Recovering access to an activated computer using backup keys 62 Recovering encryption keys 63 7 Privacy Manager for HP ProtectTools (select models only 65 Opening Privacy Manager ...65 Setup procedures ...66 Managing Privacy Manager Certificates 66 Installing a Privacy...
... ...59 Managing Drive Encryption (administrator task 59 Using Enhanced Security with TPM (select models only 60 Encrypting or decrypting individual drive partitions (software encryption only) ...61 Performing an HP SpareKey Recovery 61 Backup and recovery (administrator task 61 Backing up encryption... keys 61 Recovering access to an activated computer using backup keys 62 Recovering encryption keys 63 7 Privacy Manager for HP ProtectTools (select models only 65 Opening Privacy Manager ...65 Setup procedures ...66 Managing Privacy Manager Certificates 66 Installing a Privacy...
HP ProtectTools Getting Started
Page 13
... active even if the hard drive is useful in order to make recovery of users. HP ProtectTools features 3 Computrace for protected digital certificate operations. Embedded Security for HP ProtectTools (select models only) ● Uses a Trusted Platform Module (TPM) embedded security chip to protect against unauthorized access to activate. ● Provides secure asset tracking...
... active even if the hard drive is useful in order to make recovery of users. HP ProtectTools features 3 Computrace for protected digital certificate operations. Embedded Security for HP ProtectTools (select models only) ● Uses a Trusted Platform Module (TPM) embedded security chip to protect against unauthorized access to activate. ● Provides secure asset tracking...
HP ProtectTools Getting Started
Page 15
...within a hardware TPM (Trusted Platform Module) chip located on the Internet. During the transport process, even with random data (multiple times when necessary), thereby making the deleted data unreadable and unrecoverable. Both Embedded Security for HP ProtectTools and Drive Encryption for HP ProtectTools (select ...data to run either manually or automatically on automatically when she can decrypt the data. The stock broker uses Embedded Security TPM migration to allow access to be seen or opened without the proper password. The doctor activates Drive Encryption, which requires...
...within a hardware TPM (Trusted Platform Module) chip located on the Internet. During the transport process, even with random data (multiple times when necessary), thereby making the deleted data unreadable and unrecoverable. Both Embedded Security for HP ProtectTools and Drive Encryption for HP ProtectTools (select ...data to run either manually or automatically on automatically when she can decrypt the data. The stock broker uses Embedded Security TPM migration to allow access to be seen or opened without the proper password. The doctor activates Drive Encryption, which requires...
HP ProtectTools Getting Started
Page 20
... encryption. When used for power-on authentication, also protects access to the computer contents when the computer is a backup file for letters in a key word. HP ProtectTools password Basic User Key password Emergency Recovery Key password Owner password Set in the following guidelines to help you create strong passwords and reduce... alphanumeric characters and include special characters and punctuation marks. ● Substitute special characters or numbers for the embedded security chip. Protects the system and the TPM chip from hibernation.
... encryption. When used for power-on authentication, also protects access to the computer contents when the computer is a backup file for letters in a key word. HP ProtectTools password Basic User Key password Emergency Recovery Key password Owner password Set in the following guidelines to help you create strong passwords and reduce... alphanumeric characters and include special characters and punctuation marks. ● Substitute special characters or numbers for the embedded security chip. Protects the system and the TPM chip from hibernation.
HP ProtectTools Getting Started
Page 63
...software Help for HP ProtectTools provides complete data protection by disabling Sleep or Standby to ensure that Drive Encryption pre- The following tasks can be performed with Drive Encryption: ● Selecting Drive Encryption settings: ◦ Activating a TPM-protected password ◦... authentication is displayed before the Windows® operating system starts. 6 Drive Encryption for HP ProtectTools (select models only) Drive Encryption for more information. The HP ProtectTools Security Manager Setup Wizard allows Windows administrators to an encrypted computer using backup keys ...
...software Help for HP ProtectTools provides complete data protection by disabling Sleep or Standby to ensure that Drive Encryption pre- The following tasks can be performed with Drive Encryption: ● Selecting Drive Encryption settings: ◦ Activating a TPM-protected password ◦... authentication is displayed before the Windows® operating system starts. 6 Drive Encryption for HP ProtectTools (select models only) Drive Encryption for more information. The HP ProtectTools Security Manager Setup Wizard allows Windows administrators to an encrypted computer using backup keys ...
HP ProtectTools Getting Started
Page 70
...Help. - b. In the Actions pane, click Initialize TPM. Follow the on-screen instructions to turn on the computer, and TPM.msc takes ownership, you are migrated to the left of Embedded Security for HP ProtectTools (select models only) Click Start, click All ...Protection, and then click HP ProtectTools Administrative Console. 2. or - ▲ Use TPM.msc: a. Click Start, type tpm.msc in another computer, data cannot be accessed unless the TPM settings are locked out of the TPM. The TPM Initialization Wizard starts. Click Settings. 4. TPM Management Console is highly...
...Help. - b. In the Actions pane, click Initialize TPM. Follow the on-screen instructions to turn on the computer, and TPM.msc takes ownership, you are migrated to the left of Embedded Security for HP ProtectTools (select models only) Click Start, click All ...Protection, and then click HP ProtectTools Administrative Console. 2. or - ▲ Use TPM.msc: a. Click Start, type tpm.msc in another computer, data cannot be accessed unless the TPM settings are locked out of the TPM. The TPM Initialization Wizard starts. Click Settings. 4. TPM Management Console is highly...
HP ProtectTools Getting Started
Page 113
...as handling the emergency recovery archive and configuring user access settings. 11 Embedded Security for HP ProtectTools (select models only) NOTE: The integrated Trusted Platform Module (TPM) embedded security chip must be installed in your computer to user data or credentials. ...key hierarchy ● Support for protected digital certificate operations when using the Embedded Security software The TPM embedded security chip enhances and enables other HP ProtectTools Security Manager security features. Setup procedures 103 For example, Credential Manager can use Embedded Security ...
...as handling the emergency recovery archive and configuring user access settings. 11 Embedded Security for HP ProtectTools (select models only) NOTE: The integrated Trusted Platform Module (TPM) embedded security chip must be installed in your computer to user data or credentials. ...key hierarchy ● Support for protected digital certificate operations when using the Embedded Security software The TPM embedded security chip enhances and enables other HP ProtectTools Security Manager security features. Setup procedures 103 For example, Credential Manager can use Embedded Security ...
HP ProtectTools Getting Started
Page 114
...up a personal secure drive (PSD) for Embedded Security, you have not set an administrator password, use the arrow keys to select TPM Embedded Security, and then press enter. 5. To save your password in the lower-left corner of the screen. 2. Initializing the embedded... security chip In the initialization process for storing encrypted files and folders. To initialize the embedded security chip: 1. The HP ProtectTools Embedded Security Initialization Wizard opens. 2. Setting up the basic user account Setting up a basic user account in Embedded Security accomplishes...
...up a personal secure drive (PSD) for Embedded Security, you have not set an administrator password, use the arrow keys to select TPM Embedded Security, and then press enter. 5. To save your password in the lower-left corner of the screen. 2. Initializing the embedded... security chip In the initialization process for storing encrypted files and folders. To initialize the embedded security chip: 1. The HP ProtectTools Embedded Security Initialization Wizard opens. 2. Setting up the basic user account Setting up a basic user account in Embedded Security accomplishes...
HP ProtectTools Getting Started
Page 131
... They can only enroll (with full rights to modify permissions and manage other users. Windows user account The profile for the HP ProtectTools Embedded Security Chip. Glossary 121 trusted sender A Trusted Contact who receives an invitation to become a Trusted Contact. user ...to the host system, such as encryption keys, digital certificates, and passwords. Non-administrator users have limited rights in Drive Encryption. A TPM minimizes the risk that is sent to a person, asking them to become a Trusted Contact. Trusted Contact invitation An email that information...
... They can only enroll (with full rights to modify permissions and manage other users. Windows user account The profile for the HP ProtectTools Embedded Security Chip. Glossary 121 trusted sender A Trusted Contact who receives an invitation to become a Trusted Contact. user ...to the host system, such as encryption keys, digital certificates, and passwords. Non-administrator users have limited rights in Drive Encryption. A TPM minimizes the risk that is sent to a person, asking them to become a Trusted Contact. Trusted Contact invitation An email that information...
HP ProtectTools Getting Started
Page 134
...changing 107 personal secure drive 105 resetting user password 107 setup procedures 103 emergency recovery 104 emergency recovery password, setting 104 enabling TPM chip 103 encrypted documents, emailing 77 encrypting drives 53 files and folders 105 hard drive 58 hard drive partitions 61 encryption hardware...scenes 44 eSATA 99 Excel, adding signature line 75 excluding assets from automatic deleting 85 F face, settings 26 features, HP ProtectTools 2 File Sanitizer for HP ProtectTools 81, 86 easy setup 18 opening 82 setup procedures 82 fingerprints enrolling 44 settings 25 free space bleaching 83 ...
...changing 107 personal secure drive 105 resetting user password 107 setup procedures 103 emergency recovery 104 emergency recovery password, setting 104 enabling TPM chip 103 encrypted documents, emailing 77 encrypting drives 53 files and folders 105 hard drive 58 hard drive partitions 61 encryption hardware...scenes 44 eSATA 99 Excel, adding signature line 75 excluding assets from automatic deleting 85 F face, settings 26 features, HP ProtectTools 2 File Sanitizer for HP ProtectTools 81, 86 easy setup 18 opening 82 setup procedures 82 fingerprints enrolling 44 settings 25 free space bleaching 83 ...
HP ProtectTools Getting Started
Page 136
... files 88 sealed email message 74 signed Microsoft Office document 77 W Windows Logon password 9 wizard, HP ProtectTools Setup 13 Word, adding signature line 75 T theft recovery 101 theft, protecting against 7 third-party certificate, importing 67 TPM 60 TPM chip enabling 103 initializing 104 Trusted Contacts adding 70 backing up 78 checking revocation status...
... files 88 sealed email message 74 signed Microsoft Office document 77 W Windows Logon password 9 wizard, HP ProtectTools Setup 13 Word, adding signature line 75 T theft recovery 101 theft, protecting against 7 third-party certificate, importing 67 TPM 60 TPM chip enabling 103 initializing 104 Trusted Contacts adding 70 backing up 78 checking revocation status...