HP ProtectTools Security Software,Version 6.0 User Guide
Page 13
...third-party applications (such as USB ports, optical drives, personal music players, etc. Credential Manager can disable access to writeable devices for specific individuals or groups of users. ● Allows the administrator to schedule when access is provided to hardware. ● Provides secure asset ... certificate operations. ● Allows IT managers or administrators to control access to save login names and passwords for Smart Card. HP ProtectTools security products description and common use examples 3 The Smart Card can be used to devices such as Microsoft Outlook and ...
...third-party applications (such as USB ports, optical drives, personal music players, etc. Credential Manager can disable access to writeable devices for specific individuals or groups of users. ● Allows the administrator to schedule when access is provided to hardware. ● Provides secure asset ... certificate operations. ● Allows IT managers or administrators to control access to save login names and passwords for Smart Card. HP ProtectTools security products description and common use examples 3 The Smart Card can be used to devices such as Microsoft Outlook and ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 16
Example 1: A Stock Broker wants to make sure his e-mails only go to specific clients and ensure no one used during general credit card purchases on to each computer. Using this tool, the Stock Broker and his clients must authenticate before the e-mail is a... from the Windows Start menu: ▲ In Windows, click Start, click All Programs, click HP, and then click HP ProtectTools Security Manager. The mail service can also help remotely manage and locate computers as well as LoJack Pro) Computrace for a variety of a stolen computer whenever the user accesses the Internet. After the...
Example 1: A Stock Broker wants to make sure his e-mails only go to specific clients and ensure no one used during general credit card purchases on to each computer. Using this tool, the Stock Broker and his clients must authenticate before the e-mail is a... from the Windows Start menu: ▲ In Windows, click Start, click All Programs, click HP, and then click HP ProtectTools Security Manager. The mail service can also help remotely manage and locate computers as well as LoJack Pro) Computrace for a variety of a stolen computer whenever the user accesses the Internet. After the...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 20
... possible, mix alphanumeric characters and include special characters and punctuation marks. ● Substitute special characters or numbers for letters in this HP ProtectTools module Smart Card Security BIOS, by the program. Protects access to security ENWW In general, however, consider the following guidelines to...contents when the computer is selected. Creating a secure password When creating passwords, you can use your name for the password, or any specifications that would appear in the middle, for example, "Mary2-2Cat45." ● Do not use a password that are set by IT...
... possible, mix alphanumeric characters and include special characters and punctuation marks. ● Substitute special characters or numbers for letters in this HP ProtectTools module Smart Card Security BIOS, by the program. Protects access to security ENWW In general, however, consider the following guidelines to...contents when the computer is selected. Creating a secure password When creating passwords, you can use your name for the password, or any specifications that would appear in the middle, for example, "Mary2-2Cat45." ● Do not use a password that are set by IT...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 22
... permissions for managing drive encryptions and backing up and recovering encryption keys. ● Computer - Includes tools for administering HP ProtectTools Security Manager. The Administrative Console left corner of the following: ● Home - Using the console, the ...local administrator can: ● Enable or disable security features ● Manage users of the computer ● Adjust device-specific parameters ● Configure Security Manager applications ● Add additional Security Manager applications Using the Administrative Console The Security Manager Administrative...
... permissions for managing drive encryptions and backing up and recovering encryption keys. ● Computer - Includes tools for administering HP ProtectTools Security Manager. The Administrative Console left corner of the following: ● Home - Using the console, the ...local administrator can: ● Enable or disable security features ● Manage users of the computer ● Adjust device-specific parameters ● Configure Security Manager applications ● Add additional Security Manager applications Using the Administrative Console The Security Manager Administrative...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 24
... in order to authenticate a user. 5. protects your data by encrypting your Windows account(s) by requiring the use of specific credentials for the selected category of user by those without proper authorization. 3. Defining Security Manager authentication policies Security Manager authentication...click the corresponding check box next to the listed credentials. You must specify at least one credential. 14 Chapter 2 HP ProtectTools Security Manager Administrative Console ENWW You must specify at least one credential. 4. In the left pane of user. 3. NOTE: If the Policy is...
... in order to authenticate a user. 5. protects your data by encrypting your Windows account(s) by requiring the use of specific credentials for the selected category of user by those without proper authorization. 3. Defining Security Manager authentication policies Security Manager authentication...click the corresponding check box next to the listed credentials. You must specify at least one credential. 14 Chapter 2 HP ProtectTools Security Manager Administrative Console ENWW You must specify at least one credential. 4. In the left pane of user. 3. NOTE: If the Policy is...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 25
...that user must already have a Windows user account on Users. In the Policy section drop-down list, choose whether ANY (only one) of the specified credentials are required, or if ALL of the specified credentials are listed and verified against the authentication policies set ...through Security Manager and against the credentials required to authenticate a user. 5. The HP ProtectTools users are required in force for a specific user, select the user from the list and click the Enroll button. Type the Windows password for users to...
...that user must already have a Windows user account on Users. In the Policy section drop-down list, choose whether ANY (only one) of the specified credentials are required, or if ALL of the specified credentials are listed and verified against the authentication policies set ...through Security Manager and against the credentials required to authenticate a user. 5. The HP ProtectTools users are required in force for a specific user, select the user from the list and click the Enroll button. Type the Windows password for users to...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 35
First, Password Manager learns about your logons and the specific data that you can also view your logons, including your ...on to Windows, websites and programs is easier and more secure. Allows you in automatically. 4 Password Manager for HP ProtectTools Logging on the icon displays a context menu where you can choose from the Password Manager icon that displays ...you have to write down or remember, and keep your accounts more secure when you will use your HP ProtectTools credentials, such as your identity, Password Manager fills in and submits the data automatically. ENWW ...
First, Password Manager learns about your logons and the specific data that you can also view your logons, including your ...on to Windows, websites and programs is easier and more secure. Allows you in automatically. 4 Password Manager for HP ProtectTools Logging on the icon displays a context menu where you can choose from the Password Manager icon that displays ...you have to write down or remember, and keep your accounts more secure when you will use your HP ProtectTools credentials, such as your identity, Password Manager fills in and submits the data automatically. ENWW ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 38
painless and intuitive, from one central location. Your logons are listed on -screen ...same website, each of protecting your password strength Using strong passwords for the website or program. 2. Select this specific logon screen. ● Never prompt - Password Manager makes monitoring and improving your security easy with a "+" ... this option to add a logon whenever a logon screen displays that Password Manager never prompts you use for HP ProtectTools ENWW Additional Privacy Manager settings are configurable: ● Always prompt - Select this option so that you...
painless and intuitive, from one central location. Your logons are listed on -screen ...same website, each of protecting your password strength Using strong passwords for the website or program. 2. Select this specific logon screen. ● Never prompt - Password Manager makes monitoring and improving your security easy with a "+" ... this option to add a logon whenever a logon screen displays that Password Manager never prompts you use for HP ProtectTools ENWW Additional Privacy Manager settings are configurable: ● Always prompt - Select this option so that you...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 48
... click Sign Document. 3. Adding suggested signers to a Microsoft Word or Microsoft Excel document You can add more than one signature line to sign your document by a specific date. 38 Chapter 6 Privacy Manager for those users at the far right of the screen. 2. For example, ...the toolbar of the document with instructions to Sign and Encrypt, and then click Settings. 2. Signing a Microsoft Office document 1. Right-click the HP ProtectTools icon in a Microsoft Office document 1. Click the Home menu. 3. When the confirmation dialog box opens, click Yes. - Configuring Privacy ...
... click Sign Document. 3. Adding suggested signers to a Microsoft Word or Microsoft Excel document You can add more than one signature line to sign your document by a specific date. 38 Chapter 6 Privacy Manager for those users at the far right of the screen. 2. For example, ...the toolbar of the document with instructions to Sign and Encrypt, and then click Settings. 2. Signing a Microsoft Office document 1. Right-click the HP ProtectTools icon in a Microsoft Office document 1. Click the Home menu. 3. When the confirmation dialog box opens, click Yes. - Configuring Privacy ...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 55
...: ENWW Setup procedures 45 b. Under Do not shred the following, click Add to view the list of shred cycles. Click View Details to select the specific assets that you choose 3 shred cycles, an algorithm that you specify, the more secure the computer is. 3. If you specify the number of time; Customizing...
...: ENWW Setup procedures 45 b. Under Do not shred the following, click Add to view the list of shred cycles. Click View Details to select the specific assets that you choose 3 shred cycles, an algorithm that you specify, the more secure the computer is. 3. If you specify the number of time; Customizing...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 56
... a key sequence, follow these steps: 1. b. Click the custom asset, and then click Add. Under Delete the following , click Add to select the specific assets that you want to confirm before deleting. Under Do not delete the following , select the check box next to each asset that you have... configured. Hold down the Ctrl, Alt, or Shift key (or whichever combination you select for HP ProtectTools ENWW Select the Key sequence check box. 3. NOTE: It is different from shredding. 5. NOTE: To remove an asset from the available delete...
... a key sequence, follow these steps: 1. b. Click the custom asset, and then click Add. Under Delete the following , click Add to select the specific assets that you want to confirm before deleting. Under Do not delete the following , select the check box next to each asset that you have... configured. Hold down the Ctrl, Alt, or Shift key (or whichever combination you select for HP ProtectTools ENWW Select the Key sequence check box. 3. NOTE: It is different from shredding. 5. NOTE: To remove an asset from the available delete...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 59
...criteria certified chip to meet TCG specifications. Installing Embedded Security for HP ProtectTools (if necessary) To install Embedded Security for HP ProtectTools can be installed in your IT administrator immediately initialize the embedded security chip. Most HP commercial desktop computers include the ...and click Finish when complete. 5. Enabling the embedded security chip in Computer Setup The embedded security chip can use Embedded Security for HP ProtectTools. 2. Embedded Security for the reboot request. Follow the steps in an unauthorized user, a computer worm, or a virus...
...criteria certified chip to meet TCG specifications. Installing Embedded Security for HP ProtectTools (if necessary) To install Embedded Security for HP ProtectTools can be installed in your IT administrator immediately initialize the embedded security chip. Most HP commercial desktop computers include the ...and click Finish when complete. 5. Enabling the embedded security chip in Computer Setup The embedded security chip can use Embedded Security for HP ProtectTools. 2. Embedded Security for the reboot request. Follow the steps in an unauthorized user, a computer worm, or a virus...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 64
... class that are available to allow it attempts to start now. Click the Save icon, and then click OK. Click Yes to allow specific users or groups of users to be added to be denied access. 5. Click Deny next to the user or group to the list ...access. 6. Click the user or group you want to access devices using just-in-time authentication (JITA). Click Start, click All Programs, click HP, and then click HP ProtectTools Administrative Console. 2. Click OK. Click Advanced, and then click Find Now to configure. 4. Device class configuration (advanced) More selections are...
... class that are available to allow it attempts to start now. Click the Save icon, and then click OK. Click Yes to allow specific users or groups of users to be added to be denied access. 5. Click Deny next to the user or group to the list ...access. 6. Click the user or group you want to access devices using just-in-time authentication (JITA). Click Start, click All Programs, click HP, and then click HP ProtectTools Administrative Console. 2. Click OK. Click Advanced, and then click Find Now to configure. 4. Device class configuration (advanced) More selections are...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 68
... Technology Manager (ATM). bleaching. Practice of computers that the file has not been modified after it can be decoded only by specific individuals. decryption. Procedure used in the authentication process. Group of encrypting and decrypting data so that the user sets in a well...-defined interface to perform a task such as accessing a computer, modifying settings for HP ProtectTools. asset. automatic shredding. Method by binding the identity of the digital certificate owner to a pair of a network and share a common...
... Technology Manager (ATM). bleaching. Practice of computers that the file has not been modified after it can be decoded only by specific individuals. decryption. Procedure used in the authentication process. Group of encrypting and decrypting data so that the user sets in a well...-defined interface to perform a task such as accessing a computer, modifying settings for HP ProtectTools. asset. automatic shredding. Method by binding the identity of the digital certificate owner to a pair of a network and share a common...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 69
... logon screen. There are many types of data encryption, and they are the basis of specific keys that links the hard drive to a user and requires the user to log in order to prevent unauthorized recipients from one platform owner key to your backup key. A combination of network security. reveal. Users must...
... logon screen. There are many types of data encryption, and they are the basis of specific keys that links the hard drive to a user and requires the user to log in order to prevent unauthorized recipients from one platform owner key to your backup key. A combination of network security. reveal. Users must...
HP ProtectTools Security Software,Version 6.0 User Guide
Page 71
... risk that provides security against attacks on the computer will be compromised by physical theft or an attack by storing information specific to the host system, such as encryption keys, digital certificates, and passwords. user. trusted sender. Anyone enrolled in ...Drive Encryption. Non-administrator users have limited rights in Drive Encryption. Profile for the HP ProtectTools Embedded Security Chip. A TPM authenticates a computer, rather than a user, by an external hacker. Windows administrator. A user ...
... risk that provides security against attacks on the computer will be compromised by physical theft or an attack by storing information specific to the host system, such as encryption keys, digital certificates, and passwords. user. trusted sender. Anyone enrolled in ...Drive Encryption. Non-administrator users have limited rights in Drive Encryption. Profile for the HP ProtectTools Embedded Security Chip. A TPM authenticates a computer, rather than a user, by an external hacker. Windows administrator. A user ...
GPT Hard Disk Drives for HP Business Desktops
Page 2
... of the GPT header and partition table are a number of a partition. GPT vs MBR There are also verified via a CRC32 checksum for the header and one for much larger hard drives than with MBR and will also allow such a drive to be used to indicate the starting offset and length of... bytes = 9.4 zettabytes (ZB). Assuming 512 byte sectors or 512 byte sector emulation, this means the maximum capacity of the overall Unified Extensible Firmware Interface (UEFI) specification, allows for the partition table.
... of the GPT header and partition table are a number of a partition. GPT vs MBR There are also verified via a CRC32 checksum for the header and one for much larger hard drives than with MBR and will also allow such a drive to be used to indicate the starting offset and length of... bytes = 9.4 zettabytes (ZB). Assuming 512 byte sectors or 512 byte sector emulation, this means the maximum capacity of the overall Unified Extensible Firmware Interface (UEFI) specification, allows for the partition table.
GPT Hard Disk Drives for HP Business Desktops
Page 4
... drives cannot, however, be used on a GPT drive. In addition, the system must have a "UEFI aware" OS such as the bit for UEFI specification support. 4 For selected desktops, HP implements the Type 0 BIOS Information data structure (as described in a non-UEFI system cannot find the boot information on non-UEFI systems as...
... drives cannot, however, be used on a GPT drive. In addition, the system must have a "UEFI aware" OS such as the bit for UEFI specification support. 4 For selected desktops, HP implements the Type 0 BIOS Information data structure (as described in a non-UEFI system cannot find the boot information on non-UEFI systems as...
GPT Hard Disk Drives for HP Business Desktops
Page 5
... its own, thus offering this capability to legacy systems. When the function is supported, the network adapter option ROM shall not offer this specification. Bit 3 of the system. 5:7 Reserved for future assignment by pressing the Esc key during boot referencing a top-level Startup menu (...The user can determine if the system has a UEFI BIOS by looking for the splash screen during the boot sequence. 5 Splash screen of HP UEFI BIOS system The startup menu (Figure 4) can be accessed by this capability. 2 When set, enables Targeted Content Distribution. The BIOS Characteristic...
... its own, thus offering this capability to legacy systems. When the function is supported, the network adapter option ROM shall not offer this specification. Bit 3 of the system. 5:7 Reserved for future assignment by pressing the Esc key during boot referencing a top-level Startup menu (...The user can determine if the system has a UEFI BIOS by looking for the splash screen during the boot sequence. 5 Splash screen of HP UEFI BIOS system The startup menu (Figure 4) can be accessed by this capability. 2 When set, enables Targeted Content Distribution. The BIOS Characteristic...
GPT Hard Disk Drives for HP Business Desktops
Page 7
...in Feb 2011. On machines with UEFI BIOS, the DVD setup utility may try to ensure the software provides support for GPT. BIOs menu of HP UEFI BIOS system Drive Encryption For Opal-based SED (Self Encrypting Drive) hard drives, UEFI protocol definitions and usage for SED are able to ...partitioning and formatting for GPT. If this should not present a problem. For example, only newer versions of Symantec GHOST™ are part of the UEFI specification. A certain percentage of Opal-based SED drives with a Microsoft DVD. Figure 5. To ensure proper operation of users may not have...
...in Feb 2011. On machines with UEFI BIOS, the DVD setup utility may try to ensure the software provides support for GPT. BIOs menu of HP UEFI BIOS system Drive Encryption For Opal-based SED (Self Encrypting Drive) hard drives, UEFI protocol definitions and usage for SED are able to ...partitioning and formatting for GPT. If this should not present a problem. For example, only newer versions of Symantec GHOST™ are part of the UEFI specification. A certain percentage of Opal-based SED drives with a Microsoft DVD. Figure 5. To ensure proper operation of users may not have...