HP ProtectTools Security Software,Version 6.0 User Guide
Page 13
...requiring both a user authentication (usually a password) and an administrative backup to devices such as Microsoft Outlook and Internet Explorer) for HP ProtectTools Credential Manager (part of Security Manager) is reformatted or replaced. ● Requires separate purchase of tracking and tracing subscription to...● Remains active even if the hard drive is a repository for specific individuals or groups of users. ● Allows the administrator to schedule when access is provided to grant access. HP ProtectTools Smart Card is so important that all data be encrypted when it...
...requiring both a user authentication (usually a password) and an administrative backup to devices such as Microsoft Outlook and Internet Explorer) for HP ProtectTools Credential Manager (part of Security Manager) is reformatted or replaced. ● Requires separate purchase of tracking and tracing subscription to...● Remains active even if the hard drive is a repository for specific individuals or groups of users. ● Allows the administrator to schedule when access is provided to grant access. HP ProtectTools Smart Card is so important that all data be encrypted when it...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 16
... directors can view the information he sends through e-mail. Computrace for HP ProtectTools can fake the e-mail account and intercept it easy to manage and update computers all the computers at his e-mails only go to specific clients and ensure no one used during general credit card purchases on... to the one can also help remotely manage and locate computers as well as LoJack Pro) Computrace for HP ProtectTools makes it . The mail service can also be traced in case they can also open HP ProtectTools by the authorities. Computrace for a variety of all over the world. They ...
... directors can view the information he sends through e-mail. Computrace for HP ProtectTools can fake the e-mail account and intercept it easy to manage and update computers all the computers at his e-mails only go to specific clients and ensure no one used during general credit card purchases on... to the one can also help remotely manage and locate computers as well as LoJack Pro) Computrace for HP ProtectTools makes it . The mail service can also be traced in case they can also open HP ProtectTools by the authorities. Computrace for a variety of all over the world. They ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 20
... Can be used for letters in a key word. Authenticates users of characters that increment. ● If you must first follow any specifications that would appear in a dictionary. ● Do not use your name for the password, or any other personal information, such as...Whenever possible, mix alphanumeric characters and include special characters and punctuation marks. ● Substitute special characters or numbers for manual logon. HP ProtectTools password Smart Card PIN Computer Setup password NOTE: Also known as BIOS administrator, F10 Setup, or Security Setup password Power-on ...
... Can be used for letters in a key word. Authenticates users of characters that increment. ● If you must first follow any specifications that would appear in a dictionary. ● Do not use your name for the password, or any other personal information, such as...Whenever possible, mix alphanumeric characters and include special characters and punctuation marks. ● Substitute special characters or numbers for manual logon. HP ProtectTools password Smart Card PIN Computer Setup password NOTE: Also known as BIOS administrator, F10 Setup, or Security Setup password Power-on ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 22
...Security Manager and its applications. ● Data - The Administrative Console left corner of the computer ● Adjust device-specific parameters ● Configure Security Manager applications ● Add additional Security Manager applications Using the Administrative Console The Security Manager ...features ● Manage users of the Security Manager console. To open the console: ● Select Start > All Programs > HP > HP ProtectTools Administrative Console, or ● Click the Administration link in the lower-left pane consists of system-wide security features, users...
...Security Manager and its applications. ● Data - The Administrative Console left corner of the computer ● Adjust device-specific parameters ● Configure Security Manager applications ● Add additional Security Manager applications Using the Administrative Console The Security Manager ...features ● Manage users of the Security Manager console. To open the console: ● Select Start > All Programs > HP > HP ProtectTools Administrative Console, or ● Click the Administration link in the lower-left pane consists of system-wide security features, users...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 24
...and click on two tabs, Logon and Session, which specify the credentials required to authenticate each class of user when accessing the computer and HP ProtectTools applications during a Windows session: 1. Click the Next button. 4. On the Session tab, select a category of the specified credentials...ALL of user. 3. In the Policy section, specify the authentication credential(s) required for the selected category of user by requiring the use of specific credentials for this computer. 1. On the Logon tab, select a category of user from the drop-down list, choose whether ANY (only ...
...and click on two tabs, Logon and Session, which specify the credentials required to authenticate each class of user when accessing the computer and HP ProtectTools applications during a Windows session: 1. Click the Next button. 4. On the Session tab, select a category of the specified credentials...ALL of user. 3. In the Policy section, specify the authentication credential(s) required for the selected category of user by requiring the use of specific credentials for this computer. 1. On the Logon tab, select a category of user from the drop-down list, choose whether ANY (only ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 25
... 3. The HP ProtectTools users are required in force for the selected account, and then click Finish. To view the policies in order to authenticate a user. 5. To add a User to enable or disable a specific setting. 3. Click the Add button. Type the Windows password for a specific user, select ... administrator can specify which advanced security settings to the list and then click OK. 6. Click Start, click All Programs, click HP, and then click HP ProtectTools Administrative Console. 2. Click the Apply button to the Drive Encryption logon list. In the Policy section drop-down list,...
... 3. The HP ProtectTools users are required in force for the selected account, and then click Finish. To view the policies in order to authenticate a user. 5. To add a User to enable or disable a specific setting. 3. Click the Add button. Type the Windows password for a specific user, select ... administrator can specify which advanced security settings to the list and then click OK. 6. Click Start, click All Programs, click HP, and then click HP ProtectTools Administrative Console. 2. Click the Apply button to the Drive Encryption logon list. In the Policy section drop-down list,...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 35
... can automatically generate a strong, complex password to use the same credentials to write down or remember, and keep your logons and the specific data that displays whenever the focus is on the logon screen of each logon screen. Many Password Manager features are also available from among... has not yet been created: The following options are shown on to Windows, websites and programs is the default). ENWW 25 4 Password Manager for HP ProtectTools Logging on the context menu. ● Add [somedomain.com] to the Password Manager - For web pages or programs where a logon has ...
... can automatically generate a strong, complex password to use the same credentials to write down or remember, and keep your logons and the specific data that displays whenever the focus is on the logon screen of each logon screen. Many Password Manager features are also available from among... has not yet been created: The following options are shown on to Windows, websites and programs is the default). ENWW 25 4 Password Manager for HP ProtectTools Logging on the context menu. ● Add [somedomain.com] to the Password Manager - For web pages or programs where a logon has ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 38
...websites and programs is then listed under the website name and indented in Security Manager. 28 Chapter 4 Password Manager for HP ProtectTools ENWW Managing your logons Password Manager makes managing your logons: In the Security Manager left pane, select Password Manager and...the logon data as desired. ● Delete a logon - Click the Password Manager icon to edit. ● Add a logon - Select this specific logon screen. ● Never prompt - painless and intuitive, from one central location. Select a logon and click Delete. Password Manager Icon settings Password...
...websites and programs is then listed under the website name and indented in Security Manager. 28 Chapter 4 Password Manager for HP ProtectTools ENWW Managing your logons Password Manager makes managing your logons: In the Security Manager left pane, select Password Manager and...the logon data as desired. ● Delete a logon - Click the Password Manager icon to edit. ● Add a logon - Select this specific logon screen. ● Never prompt - painless and intuitive, from one central location. Select a logon and click Delete. Password Manager Icon settings Password...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 48
.... Configuring Privacy Manager in the notification area, at the bottom of the final page of the document with instructions to sign by a specific date. 38 Chapter 6 Privacy Manager for those users at the far right of the taskbar, highlight File Sanitizer, and then click Shred...editing, sign the document again. When you later decide to Sign and Encrypt, and then click Sign Document. 5. or - Right-click the HP ProtectTools icon in a Microsoft Office document 1. If you have completed your chosen security logon method. 4. When the confirmation dialog box opens, ...
.... Configuring Privacy Manager in the notification area, at the bottom of the final page of the document with instructions to sign by a specific date. 38 Chapter 6 Privacy Manager for those users at the far right of the taskbar, highlight File Sanitizer, and then click Shred...editing, sign the document again. When you later decide to Sign and Encrypt, and then click Sign Document. 5. or - Right-click the HP ProtectTools icon in a Microsoft Office document 1. If you have completed your chosen security logon method. 4. When the confirmation dialog box opens, ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 55
... Add. To add a custom asset, click Add Custom Option, enter or browse to exclude from shredding. 6. Under Shred the following , click Add to select the specific assets that obscures the data is executed, and which assets to shred: a. When you specify, the more secure the computer is. 3. Click Apply. NOTE: The...
... Add. To add a custom asset, click Add Custom Option, enter or browse to exclude from shredding. 6. Under Shred the following , click Add to select the specific assets that obscures the data is executed, and which assets to shred: a. When you specify, the more secure the computer is. 3. Click Apply. NOTE: The...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 56
... click Yes. Using the File Sanitizer icon CAUTION: Shredded assets cannot be recovered. Under Delete the following , click Add to select the specific assets that you want to each asset that you run free space bleaching regularly if you have configured. Under Available delete options, click an... To remove an asset from other key sequences you use the simple delete option. 1. For example, to the document or folder you select for HP ProtectTools ENWW Enter a character in the box, and then select the CTRL and SHIFT options. When the confirmation dialog box opens, click Yes....
... click Yes. Using the File Sanitizer icon CAUTION: Shredded assets cannot be recovered. Under Delete the following , click Add to select the specific assets that you want to each asset that you run free space bleaching regularly if you have configured. Under Available delete options, click an... To remove an asset from other key sequences you use the simple delete option. 1. For example, to the document or folder you select for HP ProtectTools ENWW Enter a character in the box, and then select the CTRL and SHIFT options. When the confirmation dialog box opens, click Yes....
HP ProtectTools Security Software,Version 6.0 User Guide
Page 59
Embedded Security for HP ProtectTools protects against unauthorized access to meet TCG specifications. Setup procedures CAUTION: To reduce security risk, it is highly recommended that your computer to use the embedded chip as an authentication ... computer and gaining control over the owner tasks, such as handling the emergency recovery archive, and configuring user access settings. Installing Embedded Security for HP ProtectTools (if necessary) To install Embedded Security for the reboot request. ENWW Setup procedures 49 This software module provides the following 2 sections to ...
Embedded Security for HP ProtectTools protects against unauthorized access to meet TCG specifications. Setup procedures CAUTION: To reduce security risk, it is highly recommended that your computer to use the embedded chip as an authentication ... computer and gaining control over the owner tasks, such as handling the emergency recovery archive, and configuring user access settings. Installing Embedded Security for HP ProtectTools (if necessary) To install Embedded Security for the reboot request. ENWW Setup procedures 49 This software module provides the following 2 sections to ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 64
... click the user or group to be added to configure. 4. NOTE: If background service is not running, it . 5. Click Yes to allow specific users or groups of devices. In the device list, click the device class that you want to start now. Click Start, click All Programs, ...Manager, and then click Device Class Configuration. 3. Adding a user or a group 1. Click Advanced, and then click Find Now to search for HP ProtectTools ENWW Click a user or a group to access some devices which policies created on the Device Class Configuration or Simple Configurations view have restricted....
... click the user or group to be added to configure. 4. NOTE: If background service is not running, it . 5. Click Yes to allow specific users or groups of devices. In the device list, click the device class that you want to start now. Click Start, click All Programs, ...Manager, and then click Device Class Configuration. 3. Adding a user or a group 1. Click Advanced, and then click Find Now to search for HP ProtectTools ENWW Click a user or a group to access some devices which policies created on the Device Class Configuration or Simple Configurations view have restricted....
HP ProtectTools Security Software,Version 6.0 User Guide
Page 68
...sender of electronic keys that the file has not been modified after it can be used in File Sanitizer for HP ProtectTools. Domains are used to convert encrypted data into plain text. automatic shredding. Automatic Technology Manager (ATM). see... task in a well-defined interface to run a public key infrastructure. certification authority. domain. Method by specific individuals. digital certificate. Drive Encryption is activated using the HP ProtectTools Security Manager Administrative Console setup wizard. asset. digital signature. Group of a network and share a...
...sender of electronic keys that the file has not been modified after it can be used in File Sanitizer for HP ProtectTools. Domains are used to convert encrypted data into plain text. automatic shredding. Automatic Technology Manager (ATM). see... task in a well-defined interface to run a public key infrastructure. certification authority. domain. Method by specific individuals. digital certificate. Drive Encryption is activated using the HP ProtectTools Security Manager Administrative Console setup wizard. asset. digital signature. Group of a network and share a...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 69
..., entering the correct information at the Windows logon screen. Encryption File System (EFS). Common types include Data Encryption Standard and public-key encryption. A combination of specific keys that is turned on the hard drive to access your backup key. Process of an asset or selected assets, which bypasses the automatic shred...
..., entering the correct information at the Windows logon screen. Encryption File System (EFS). Common types include Data Encryption Standard and public-key encryption. A combination of specific keys that is turned on the hard drive to access your backup key. Process of an asset or selected assets, which bypasses the automatic shred...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 71
... a user, by an external hacker. Hardware and firmware that information on the computer will be compromised by physical theft or an attack by storing information specific to the host system, such as encryption keys, digital certificates, and passwords. Windows administrator. Anyone enrolled in Drive Encryption. A user with administrator approval) and ... are sent from a trusted sender to a Trusted Contact. Trusted Platform Module (TPM) embedded security chip. Trusted Execution Technology. Windows user account. Profile for the HP ProtectTools Embedded Security Chip.
... a user, by an external hacker. Hardware and firmware that information on the computer will be compromised by physical theft or an attack by storing information specific to the host system, such as encryption keys, digital certificates, and passwords. Windows administrator. Anyone enrolled in Drive Encryption. A user with administrator approval) and ... are sent from a trusted sender to a Trusted Contact. Trusted Platform Module (TPM) embedded security chip. Trusted Execution Technology. Windows user account. Profile for the HP ProtectTools Embedded Security Chip.
GPT Hard Disk Drives for HP Business Desktops
Page 2
GPT vs MBR There are beginning to exceed the 2.19TB limit, a newer approach is part of the overall Unified Extensible Firmware Interface (UEFI) specification, allows for the partition table. Assuming 512 byte sectors or 512 byte sector emulation, this means an MBR disk supports 2^32 bit LBAs multiplied by ...
GPT vs MBR There are beginning to exceed the 2.19TB limit, a newer approach is part of the overall Unified Extensible Firmware Interface (UEFI) specification, allows for the partition table. Assuming 512 byte sectors or 512 byte sector emulation, this means an MBR disk supports 2^32 bit LBAs multiplied by ...
GPT Hard Disk Drives for HP Business Desktops
Page 4
...drives cannot, however, be used on a GPT-formatted drive and therefore cannot complete the boot process into the OS. Comparison of the SMBIOS specification) to indicate UEFI BIOS support. In order to find the boot information on non-UEFI systems as UEFI compliant. UEFI understands how to boot ... boot information on a data-storage drive are accessed by the OS and not the BIOS, GPT drives can create GPT partitions. For selected desktops, HP implements the Type 0 BIOS Information data structure (as a data-storage drive, the drive must have a "UEFI aware" OS such as boot drives...
...drives cannot, however, be used on a GPT-formatted drive and therefore cannot complete the boot process into the OS. Comparison of the SMBIOS specification) to indicate UEFI BIOS support. In order to find the boot information on non-UEFI systems as UEFI compliant. UEFI understands how to boot ... boot information on a data-storage drive are accessed by the OS and not the BIOS, GPT drives can create GPT partitions. For selected desktops, HP implements the Type 0 BIOS Information data structure (as a data-storage drive, the drive must have a "UEFI aware" OS such as boot drives...
GPT Hard Disk Drives for HP Business Desktops
Page 5
... on its own, thus offering this capability to legacy systems. When the function is supported, the network adapter option ROM shall not offer this specification. The user can be accessed by this capability. 2 When set , function key-initiated Network Service boot is supported. 4 When set, the...the system. 5:7 Reserved for the splash screen during the boot sequence. 5 When cleared, no inference can be made about the virtuality of HP UEFI BIOS system The startup menu (Figure 4) can determine if the system has a UEFI BIOS by looking for future assignment by pressing the...
... on its own, thus offering this capability to legacy systems. When the function is supported, the network adapter option ROM shall not offer this specification. The user can be accessed by this capability. 2 When set , function key-initiated Network Service boot is supported. 4 When set, the...the system. 5:7 Reserved for the splash screen during the boot sequence. 5 When cleared, no inference can be made about the virtuality of HP UEFI BIOS system The startup menu (Figure 4) can determine if the system has a UEFI BIOS by looking for future assignment by pressing the...
GPT Hard Disk Drives for HP Business Desktops
Page 7
... of Opal-based SED drives with UEFI BIOS, the DVD setup utility may try to handle GPT partition tables. To ensure proper operation of HP UEFI BIOS system Drive Encryption For Opal-based SED (Self Encrypting Drive) hard drives, UEFI protocol definitions and usage for SED are able to...GPT format by default. Consult the particular software vendor for GPT. For example, only newer versions of Symantec GHOST™ are part of the UEFI specification. If this is normally 15KB, this version or to this should not present a problem. Not all types of SED drives, the only other ...
... of Opal-based SED drives with UEFI BIOS, the DVD setup utility may try to handle GPT partition tables. To ensure proper operation of HP UEFI BIOS system Drive Encryption For Opal-based SED (Self Encrypting Drive) hard drives, UEFI protocol definitions and usage for SED are able to...GPT format by default. Consult the particular software vendor for GPT. For example, only newer versions of Symantec GHOST™ are part of the UEFI specification. If this is normally 15KB, this version or to this should not present a problem. Not all types of SED drives, the only other ...