HP ProtectTools features
The following table details the key features of HP ProtectTools modules.
Module
Key features
HP ProtectTools Security Manager Administrative
Console (for administrators)
●
Set up and configure levels of security and security logon methods
using the Security Manager Setup Wizard.
●
Configure options hidden from basic users.
●
Configure Device Access Manager configurations and user
access.
●
Add and remove HP ProtectTools users and view user status
using administrator tools.
HP ProtectTools Security Manager (for general users)
●
Organize, set up, and change user names and passwords.
●
Configure and change user credentials such as Windows
password and Smart Card.
●
Configure and change File Sanitizer Shred, Bleaching, and
Settings.
●
View settings for Device Access Manager.
●
Configure Preferences and Backup and Restore options.
Credential Manager for HP ProtectTools (Password
Manager)
●
Save, organize, and protect your names and passwords.
●
Set up the logon screens of Web sites and programs for quick and
secure access.
●
Save Web site user names and passwords by entering them into
Password Manager. The next time you visit this site, Password
Manager fills in and submits the information automatically.
●
Create stronger passwords for more account security. Password
Manager fills in and submits the information automatically.
Drive Encryption for HP ProtectTools (select models
only)
●
Provide complete, full-volume hard drive encryption.
●
Force pre-boot authentication in order to decrypt and access the
data.
Privacy Manager for HP ProtectTools (select models
only)
●
Use advanced logon techniques to verify the source, integrity, and
security of e-mail, Microsoft® Office documents, or instant
messaging (IM) communication.
File Sanitizer for HP ProtectTools
●
Shred digital assets (sensitive information including application
files, historical or Web-related content, or other confidential data)
on your computer and periodically bleach the hard drive.
Device Access Manager for HP ProtectTools (select
models only)
●
Allow IT managers to control access to devices based on user
profiles.
●
Prevent unauthorized users from removing data using external
storage media and from introducing viruses into the system from
external media.
●
Allow administrators to disable access to writable devices for
specific individuals or groups of users.
2
Chapter 1 Introduction to security