background image

3.

Select the previously created storage file. You can enter the path in the field provided, or click

Browse

.

4.

Enter the password used to protect the file.

5.

Select the modules whose data you want to restore. In most cases, this would be all of the modules
listed.

6.

Click 

Finish

.

Discover more

Additional applications that provide new features for this program may be available.

From the Security Manager dashboard, click 

[+] Discover more

 to browse additional applications.

NOTE:

If there is no 

[+] Discover more

 link in the lower-left portion of the dashboard, it has been

disabled by the administrator of this computer.

Updates and Messages

1.

To request information about new applications and updates, select the check box for 

Keep me

informed about new applications and updates.

2.

To set up a schedule for automatic updates, select the number of days.

3.

To check for updates, click 

Check Now

.

Security Applications Status

The Security Manager Applications Status page displays the overall status of your installed security
applications. The page shows the applications that are set up and the setup status for each. The
summary is displayed automatically when you open the Security Manager dashboard and click 

Check

the status of the security applications

, when you click 

Security Applications

, or when you click

Check Now

 on the 

Gadget

 icon, on the Windows Sidebar at the right side of the screen.

36

Chapter 7   HP ProtectTools Security Manager

Summary of Contents for Device Access Manager for HP ProtectTools

Page 1: ...HP ProtectTools User Guide ...

Page 2: ...s of Microsoft Corporation The information contained herein is subject to change without notice The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services Nothing herein should be construed as constituting an additional warranty HP shall not be liable for technical or editorial errors or omissions contained herein First...

Page 3: ... ProtectTools passwords 5 Creating a secure password 6 Backing up and restoring HP ProtectTools credentials 6 2 Getting started with the Setup Wizard 3 HP ProtectTools Security Manager Administrative Console Opening the Administrative Console 10 Using the Administrative Console 11 4 Configuring your system Setting up authentication for your computer 13 Logon Policy 13 Session Policy 13 Settings 14...

Page 4: ... 29 For Web pages or programs where a logon has already been created 29 Adding logons 30 Editing logons 31 Using the Logons menu 31 Organizing logons into categories 31 Managing your logons 32 Assessing your password strength 32 Password Manager icon settings 33 Settings 33 Credentials 33 Your personal ID card 34 Setting your preferences 34 General 34 Fingerprint 35 Backing up and restoring your d...

Page 5: ...tting a default Privacy Manager Certificate 46 Deleting a Privacy Manager Certificate 46 Restoring a Privacy Manager Certificate 47 Revoking your Privacy Manager Certificate 47 Managing Trusted Contacts 47 Adding Trusted Contacts 48 Adding a Trusted Contact 48 Adding Trusted Contacts using Microsoft Outlook contacts 49 Viewing Trusted Contact details 49 Deleting a Trusted Contact 50 Checking revoc...

Page 6: ...splayed sessions 60 Advanced tasks 61 Migrating Privacy Manager Certificates and Trusted Contacts to a different computer 61 Backing up Privacy Manager Certificates and Trusted Contacts 61 Restoring Privacy Manager Certificates and Trusted Contacts 61 Central administration of Privacy Manager 62 10 File Sanitizer for HP ProtectTools Shredding 64 Free space bleaching 65 Setup procedures 66 Opening ...

Page 7: ... group 77 Allowing access to a class of devices for one user of a group 78 Allowing access to a specific device for one user of a group 78 Resetting the configuration 78 Advanced tasks 80 Controlling access to the configuration settings 80 Granting access to an existing group or user 80 Denying access to an existing group or user 81 Adding a new group or user 81 Removing group or user access 81 Re...

Page 8: ...viii ...

Page 9: ...ation Specifying required credentials for authentication Managing users of the computer Adjusting device specific parameters Configuring installed Security Manager applications Adding additional Security Manager applications Using the Security Manager dashboard general users can perform the following tasks Configuring options provided by an administrator Allowing limited controls of some HP Protec...

Page 10: ... them into Password Manager The next time you visit this site Password Manager fills in and submits the information automatically Create stronger passwords for more account security Password Manager fills in and submits the information automatically Drive Encryption for HP ProtectTools select models only Provide complete full volume hard drive encryption Force pre boot authentication in order to d...

Page 11: ...files or save them to a writeable device such as a CD The following feature helps restrict access to data Device Access Manager for HP ProtectTools allows IT managers to restrict access to writeable devices so sensitive information cannot be printed or copied from the hard drive onto removable media Preventing unauthorized access from internal or external locations Unauthorized access to an unsecu...

Page 12: ...sure that data cannot be accessed even if the hard drive is removed and installed into an unsecured system Creating strong password policies If a mandate goes into effect that requires the use of strong password policy for dozens of Web based applications and databases Security Manager provides a protected repository for passwords and Single Sign On convenience 4 Chapter 1 Introduction to security...

Page 13: ...rd PIN and use the card for authentication CAUTION Administrators are encouraged to follow best practices in restricting end user privileges and restricting user access Unauthorized users should not be granted administrative privileges Managing HP ProtectTools passwords Most of the HP ProtectTools Security Manager features are secured by passwords The following table lists the commonly used passwo...

Page 14: ...es Split a word or phrase with numbers or special characters in the middle for example Mary2 2Cat45 Do not use a password that would appear in a dictionary Do not use your name for the password or any other personal information such as birth date pet names or mother s maiden name even if you spell it backwards Change passwords regularly You might change only a couple of characters that increment I...

Page 15: ...you through the basic steps in configuring the program A video tutorial on setting up the computer starts automatically or Open HP ProtectTools Security Manager from the Gadget icon in Windows Sidebar or the task bar icon in the notification area at the far right of the taskbar The color of the top bar on the Gadget icon indicates one of the following conditions Red HP ProtectTools has not been se...

Page 16: ...s your Windows accounts by requiring the use of specific credentials for access Drive Encryption protects your data by encrypting your hard drives making the information unreadable by those without proper authorization Pre Boot Security protects your computer by prohibiting access by unauthorized persons prior to Windows startup NOTE Pre Boot Security is not available if your computer BIOS does no...

Page 17: ...y features Managing users of the computer Adjusting device specific parameters Configuring Security Manager applications Adding additional Security Manager applications To use the HP ProtectTools Security Manager applications launch HP ProtectTools Security Manager from the Start menu or right click the Security Manager icon in the notification area located at the far right of the taskbar HP Prote...

Page 18: ... the left panel of the Security Manager dashboard click Administration For user tasks such as registering fingerprints or using Security Manager open the console as follows Click Start click All Programs click HP and then click HP ProtectTools Security Manager or Double click the HP ProtectTools Security Manager icon in the notification area at the far right of the taskbar 10 Chapter 3 HP ProtectT...

Page 19: ...curity Manager applications Data Provides an expanding menu of links to Security Manager applications that protect your data Management Tools Provides information on additional tools The panel displays the following choices HP ProtectTools Security Manager Setup Wizard Guides you through setting up HP ProtectTools Security Manager Help Displays this Help file which provides information about Secur...

Page 20: ...the policies and settings for the computer its users and its devices The following applications are included in the System group Security Manage features authentication and settings governing how users interact with this computer Users Set up manage and register users of this computer Devices Manage settings for security devices built into or attached to the computer 12 Chapter 4 Configuring your ...

Page 21: ... then click Authentication 2 On the Logon Policy tab click a category of user 3 Specify the authentication credential s required for the selected category of user You must specify at least one credential 4 Choose whether ANY only one of the specified credentials are required or if ALL of the specified credentials are required in order to authenticate a user You can also prevent any user from acces...

Page 22: ...S or encrypted disk level Allow HP SpareKey authentication for Windows logon Allows users of this computer to use the HP SpareKey feature to log on to Windows despite any other authentication policy required by Security Manager To edit the settings 1 Click to enable or disable a specific setting 2 Click Apply to save the changes that you have made 14 Chapter 4 Configuring your system ...

Page 23: ...registered the appropriate credentials enabling them to meet those policies To manage users select from the following settings To add additional users click Add To delete a user click the user and then click Delete To enroll fingerprints or to set up additional credentials for the user click the user and then click Enroll To view the policies for a specific user select the user and view the polici...

Page 24: ... setting may be necessary A higher setting increases the sensitivity to variations in fingerprint scans and therefore decreases the possibility of a false acceptance The Medium High setting provides a good mix of security and convenience Advanced You can configure the fingerprint reader to conserve power when the computer is running on battery power Smart card You can configure the computer to aut...

Page 25: ...all users 4 Click Apply Advanced settings 1 Click Start click All Programs click HP and then click HP ProtectTools Administrative Console 2 Click Devices and then click Face 3 Click Advanced Do not require user name for Windows logon Select the check box to enable users to log on to Windows without a user name Clear the check box to require a user name for logon Enforce the use of PIN for face log...

Page 26: ...onsole You can use Settings to customize the behavior of currently installed HP ProtectTools Security Manager applications To edit your application settings 1 In the Tools menu from the Applications group click Settings 2 Click to enable or disable a specific setting 3 Click Apply to save the changes that you have made 18 Chapter 5 Configuring your applications ...

Page 27: ...ally launch the Setup Wizard for administrators Select this option to prevent the wizard from automatically opening upon logon Do not automatically launch the Getting Started wizard for users Select this option to prevent user setup from automatically opening upon logon General tab 19 ...

Page 28: ...er Enables the Password Manager application for all users of the computer Privacy Manager Enables the Privacy Manager application for all users of the computer Enable the Discover more button Allows all users of this computer to add applications to HP ProtectTools Security Manager by clicking the Discover more button To return all applications to their factory settings click the Restore Defaults b...

Page 29: ...plications may be available for adding new management tools to Security Manager The administrator of this computer may disable this feature through the Settings application To add additional management tools click Management tools 21 ...

Page 30: ...or new applications or to set up a schedule for automatic updates 1 To request information about new applications and updates select the check box for Keep me informed about new applications and updates 2 To set up a schedule for automatic updates select the number of days 3 To check for updates click Check Now 22 Chapter 6 Management tools ...

Page 31: ...as well as additional applications available for immediate download from the Web Manage your logon and passwords Easily change your Windows operating system password Set program preferences Use fingerprints for extra security and convenience Enroll one or more scenes for authentication Set up a smart card for authentication Back up and restore your program data Add more applications 23 ...

Page 32: ...ity Manager Double click the HP ProtectTools icon in the notification area at the far right of the taskbar Right click the HP ProtectTools icon and click Open HP ProtectTools Security Manager Click the Security Manager ID Card gadget on the Windows Sidebar Press the hot key combination ctrl Windows h to open the Security Manager Quick Links menu 24 Chapter 7 HP ProtectTools Security Manager ...

Page 33: ... expanding menu of links for configuring the following categories of security Credential Manager My Data Discover more Opens a page where you can find additional applications to enhance the security of your identity data and communications Main area Displays application specific screens Administration Opens the HP ProtectTools Administrative Console Help button Displays information about the curre...

Page 34: ...structions on the screen NOTE When enrolling fingerprints through the Getting Started process fingerprint information is not saved until you click Next If you leave the computer inactive for a while or close the program the changes you made are not saved Enrolling scenes You must enroll one or more scenes in order to use face logon To enroll a new scene from the HP ProtectTools Security Manager Se...

Page 35: ...w PIN by reentering it b Select additional settings if desired These settings apply only to the current user Play sound on face recognition events Select the check box to play a sound when face recognition succeeds or fails Clear the check box to disable this option Prompt to update scenes when logon fails Select the check box to allow the user to update scenes if face logon fails If the verificat...

Page 36: ...smart card reader is built in or connected to your computer the Security Manager Setup Wizard prompts you to set up a smart card PIN personal identification number To set up a smart card PIN 1 Under Set up smart card enter and confirm a PIN You can also change your PIN Enter your curent PIN and then enter a new one 2 To continue click Next and then follow the instructions on the screen or From the...

Page 37: ...or program after it has been set up Drag and drop to organize your Quick Links into categories See at a glance whether any of your passwords are a security risk and automatically generate a complex strong password to use for new sites Many Password Manager features are also available from the Password Manager icon that is displayed when a Web page or program logon screen has the focus Click the ic...

Page 38: ...can also display this dialog box by clicking Add Logon from the Password Manager Manage tab Some options depend on the security devices connected to the computer for example using the ctrl Windows h hot key scanning your fingerprint or inserting a smart card a To populate a logon field with one of the preformatted choices click the arrows to the right of the field b To view the password for this l...

Page 39: ...ne of the preformatted choices click the arrows to the right of the field To add additional fields from the screen to your logon click More fields To have the logon fields filled in but not submitted clear the Submit logon data check box To view the password for this logon click Show password 4 Click OK Using the Logons menu Password Manager provides a fast easy way to launch the Web sites and pro...

Page 40: ...b If multiple logons have been created for the same Web site each logon is then listed under the Web site name and indented in the logon list To manage your logons From the Security Manager dashboard click Password Manager and then click the Manage tab Add a logon Click Add Logon and follow the on screen instructions Edit a logon Click a logon click Edit and then change the logon data Delete a log...

Page 41: ...ogram logon screen is detected indicating that you can add a logon for this screen to the password vault To disable this feature in the Icon Settings dialog box clear the check box beside Prompt to add logons for logon screens 2 Open Password Manager with ctrl Windows h The default hot key that opens the Password Manager Quick Links menu is ctrl Windows h To change the hot key click this option an...

Page 42: ...ame you entered for your account in Windows The system will display your Windows user name for this account 3 To change this name type the new name and then click the Save button To change the displayed picture 1 From the Security Manager dashboard click the ID Card in the upper left corner 2 Click the Choose picture button click an image and then click the Save button Setting your preferences You...

Page 43: ... the check box Backing up and restoring your data It is recommended that you back up your Security Manager data on a regular basis How often you back it up depends on how often the data changes For instance if you add new logons on a daily basis you should probably back up your data daily Backups can also be used to migrate from one computer to another also called importing and exporting NOTE Only...

Page 44: ...es and Messages 1 To request information about new applications and updates select the check box for Keep me informed about new applications and updates 2 To set up a schedule for automatic updates select the number of days 3 To check for updates click Check Now Security Applications Status The Security Manager Applications Status page displays the overall status of your installed security applica...

Page 45: ... by encrypting your computer hard drive When Drive Encryption is activated you must log on at the Drive Encryption logon screen which is displayed before the Windows operating system starts up The HP ProtectTools Setup Wizard allows Windows administrators to activate Drive Encryption back up the encryption key add and remove users and deactivate Drive Encryption Refer to the HP ProtectTools Securi...

Page 46: ...g Drive Encryption 1 Click Start click All Programs click HP and then click HP ProtectTools Administrative Console 2 In the left pane click Drive Encryption 38 Chapter 8 Drive Encryption for HP ProtectTools select models only ...

Page 47: ...o save encryption key select the check box for the storage device where the encryption key will be saved 7 Click Apply Drive encryption begins Refer to the HP ProtectTools Security Manager software Help for more information Deactivating Drive Encryption Use the HP ProtectTools Setup Wizard to deactivate Drive Encryption Refer to the HP ProtectTools Security Manager software Help for more informati...

Page 48: ...urity Manager features starts You can also start Security Manager from the Drive Encryption page 2 In the left pane click Drive Encryption and then click Encryption Management 3 Click Change Encryption 4 Select the drive or drives to be encrypted NOTE It is highly recommended that you encrypt the hard drive Displaying encryption status Users can display encryption status from HP ProtectTools Secur...

Page 49: ...istrative Console click Drive Encryption and then click Encryption Management 2 Click Change Encryption 3 In the Change Encryption dialog box select or clear the check box next to each hard drive you want to encrypt or decrypt and then click OK NOTE When the drive is being encrypted or decrypted the progress bar shows the time remaining to complete the process during the current session If the com...

Page 50: ... the storage device you selected 5 When the confirmation dialog box opens click Finish Performing a recovery To perform a recovery if you forget your password follow these steps 1 Turn on the computer 2 Insert the removable storage device that contains your backup key 3 When the Drive Encryption for HP ProtectTools logon dialog box opens click Cancel 4 Click Options in the lower left corner of the...

Page 51: ...rprint authentication Windows password HP ProtectTools Java Card You may use any of the above security logon methods in Privacy Manager Privacy Manager requires the following HP ProtectTools Security Manager 5 00 or higher Windows 7 Windows Vista or Windows XP operating system Microsoft Outlook 2007 or Microsoft Outlook 2003 Valid e mail account NOTE A Privacy Manager Certificate a digital certifi...

Page 52: ...ost data encryption and authentication software that only requires you to authenticate periodically Privacy Manager requires authentication each time you sign an e mail message or a Microsoft Office document using a cryptographic key Privacy Manager makes the process of saving and sending your important information safe and secure You can perform the following tasks Request and install a Privacy M...

Page 53: ...To install the certificate refer to Installing a Privacy Manager Certificate on page 45 Installing a Privacy Manager Certificate 1 When you receive the e mail with your Privacy Manager Certificate attached open the e mail and click the Setup button in the lower right corner of the message in Outlook 2007 or in the upper left corner in Outlook 2003 2 Authenticate using your chosen security logon me...

Page 54: ...dditional certificates from other certificate authorities are installed on your computer If you have more than one Privacy Manager Certificate on your computer that was installed from within Privacy Manager you can specify one as the default certificate 1 Open Privacy Manager and click Certificates 2 Click the Privacy Manager Certificate that you want to use as the default and then click Set defau...

Page 55: ...k OK Refer to Installing a Privacy Manager Certificate on page 45 or Backing up Privacy Manager Certificates and Trusted Contacts on page 61 for more information Revoking your Privacy Manager Certificate If you feel that the security of your Privacy Manager Certificate has been jeopardized you may revoke your own certificate NOTE A revoked Privacy Manager Certificate is not deleted The certificate...

Page 56: ...r click Trusted Contacts Manager and then click Invite Contacts or In Microsoft Outlook click the down arrow next to Send Securely on the toolbar and then click Invite Contacts 2 If the Select Certificate dialog box opens click the Privacy Manager Certificate you want to use and then click OK 3 When the Trusted Contact Invitation dialog box opens read the text and then click OK An e mail is automa...

Page 57: ...l 5 Click Send NOTE If you have not obtained a Privacy Manager Certificate a message informs you that you must have a Privacy Manager Certificate in order to send a Trusted Contact request Click OK to launch the Certificate Request Wizard Refer to Requesting and installing a Privacy Manager Certificate on page 44 for more information 6 Authenticate using your chosen security logon method NOTE When...

Page 58: ... Yes Checking revocation status for a Trusted Contact To see if a Trusted Contact has revoked their Privacy Manager Certificate 1 Open Privacy Manager and click Trusted Contacts 2 Click a Trusted Contact 3 Click the Advanced button The Advanced Trusted Contact Management dialog box opens 4 Click Check Revocation 5 Click Close 50 Chapter 9 Privacy Manager for HP ProtectTools select models only ...

Page 59: ...g a Trusted Contact on page 48 for more information Invite Outlook Contacts This option allows you to send a Trusted Contact invitation to all the contacts in your Microsoft Outlook address book Refer to Adding Trusted Contacts using Microsoft Outlook contacts on page 49 for more information Open the Privacy Manager software Certificates Trusted Contacts and Settings options allow you to open the ...

Page 60: ...rivacy Manager can be used only with Microsoft Office 2007 documents After you install your Privacy Manager Certificate a Sign and Encrypt button is displayed on the right side of the toolbar of all Microsoft Word Microsoft Excel and Microsoft PowerPoint documents When you click the down arrow next to Sign and Encrypt you can choose from the following options Sign Document This option adds your di...

Page 61: ...ent Privacy Manager allows you to add a signature line when you sign a Microsoft Word or Microsoft Excel document 1 In Microsoft Word or Microsoft Excel create and save a document 2 Click the Home menu 3 Click the down arrow next to Sign and Encrypt and then click Add Signature Line Before Signing NOTE A check mark is displayed next to Add Signature Line Before Signing when this option is selected...

Page 62: ...ble to display the date and or title in the signature line even if the suggested signer s document settings are configured to do so 8 Click OK Adding a suggested signer s signature line When suggested signers open the document they will see their name in brackets indicating that their signature is required To sign the document 1 Double click the appropriate signature line 2 Authenticate using your...

Page 63: ...ng or encrypting the e mail itself To do this create and send an e mail with a signed or encrypted document just as you normally would a regular e mail with an attachment However for optimum security it is recommended that you encrypt the e mail when attaching a signed or encrypted Microsoft Office document To send a sealed e mail with an attached signed and or encrypted Microsoft Office document ...

Page 64: ...ed with it will be marked as invalid when the recipient receives it Hide show feature You can hide any or all messages in the Privacy Manager Chat window You can also send a message where the content is hidden Authentication is required before the message is displayed Secure chat history Logs of your chat sessions are encrypted before they are saved and require authentication in order to be viewed...

Page 65: ... a history folder for your chat sessions click Browse to search for a folder and then click OK 4 To automatically encrypt and save your sessions when you close them select the Automatically save secure chat history check box 5 Click OK Chatting in the Privacy Manager Chat window After starting Privacy Manager Chat a Privacy Manager Chat window opens in Windows Live Messenger Using Privacy Manager ...

Page 66: ... menu to select only specific accounts to view The viewer allows you to perform the following tasks Reveal all sessions on page 58 Reveal sessions for a specific account on page 59 View a session ID on page 59 View a session on page 59 Search sessions for specific text on page 59 Delete a session on page 59 Add or remove columns on page 60 Filter displayed sessions on page 60 To start the Live Mes...

Page 67: ...n the Live Messenger History Viewer right click any revealed session and select View session ID View a session Viewing a session opens the file for viewing If the session has not been revealed displaying the decrypted Contact Screen Name previously it is revealed at the same time To view a Live Messenger history session 1 In the Live Messenger History Viewer right click any session and then select...

Page 68: ...ange of dates For details refer to Displaying sessions for a range of dates on page 60 Different folders For details refer to Displaying sessions that are saved in a folder other than the default folder on page 60 Displaying sessions for a specific account In the Live Messenger History Viewer select an account from the Display history for menu Displaying sessions for a range of dates 1 In the Live...

Page 69: ...ation file and then click Next 4 On the Migration File page enter a file name or click Browse to search for a location and then click Next 5 Enter and confirm a password and then click Next NOTE Store this password in a safe place because you will need it when you restore the migration file 6 Authenticate using your chosen security logon method 7 On the Migration File Saved page click Finish Resto...

Page 70: ...abled or disabled Certificate use policy You may be restricted to the use of Privacy Manager certificates issued by Comodo or you may be allowed to use digital certificates issued by other certificate authorities Encryption policy Encryption capabilities may be individually enabled or disabled in Microsoft Office or Outlook and in Windows Live Messenger 62 Chapter 9 Privacy Manager for HP ProtectT...

Page 71: ...l that allows you to securely shred assets personal information or files historical or Web related data or other data components on your computer and to periodically bleach your hard drive NOTE This version of File Sanitizer supports the system hard drive only 63 ...

Page 72: ...ase method is automatically selected for shredding You can also customize a shred profile which allows you to specify the number of shred cycles which assets to include for shredding which assets to confirm before shredding and which assets to exclude from shredding For more information refer to Selecting or creating a shred profile on page 67 You can set up an automatic shred schedule and you can...

Page 73: ...rs from viewing the original contents of the deleted asset NOTE Free space bleaching is for those assets that you delete using the Windows Recycle Bin or when you manually delete an asset Free space bleaching provides no additional security to shredded assets You can set an automatic free space bleaching schedule or you can manually activate free space bleaching using the HP ProtectTools icon in t...

Page 74: ...shutdown asking if you want to continue with shredding selected assets or if you want to bypass the procedure Click Yes to bypass the shred procedure or click No to continue with shredding Web browser open Choose this option to shred all selected Web related assets such as browser URL history when you open a Web browser Web browser quit Choose this option to shred all selected Web related assets s...

Page 75: ...f assets that are selected for shredding 4 Under Shred the following select the check box next to each asset that you want to confirm before shredding 5 Click Apply and then click OK Customizing a shred profile When you create a shred profile you specify the number of shred cycles which assets to include for shredding which assets to confirm before shredding and which assets to exclude from shredd...

Page 76: ...you use the simple delete option free space bleaching can be performed occasionally on the assets that have been deleted manually or by using the Windows Recycle Bin To customize a simple delete profile 1 Open File Sanitizer click Settings click Simple Delete Setting and then click View Details 2 Select the assets you want to delete a Under Available delete options click an asset and then click Ad...

Page 77: ...space bleaching operation on page 71 View the log files This feature allows you to view shred and free space bleaching log files which contain any errors or failures from the last shred or free space bleaching operation For details refer to Viewing the log files on page 71 NOTE The shred or free space bleaching operation can take a significant length of time Even though shredding and free space bl...

Page 78: ...e file or folder 3 When the confirmation dialog box opens click Yes or 1 Right click the File Sanitizer icon on the desktop and then click Shred One 2 When the Browse dialog box opens navigate to the asset you want to shred and then click OK 3 When the confirmation dialog box opens click Yes or 1 Open File Sanitizer and click Shred 2 Click the Browse button 3 When the Browse dialog box opens navig...

Page 79: ... displayed The message provides details on the shred or free space bleaching process percentage complete and gives you the option to abort the operation To abort the operation Click the message and then click Stop to cancel the operation Viewing the log files Each time a shred or free space bleaching operation is performed log files of any errors or failures are generated The log files are always ...

Page 80: ...are also organized into groups such as the predefined Device Administrator group or groups can be defined using the Computer Management option in the Administrative Tools section of the Control Panel Device access can be granted or denied on the basis of group membership For device classes such as CD ROM drives and DVD drives read acess and write access can be allowed or denied separately Limited ...

Page 81: ... trusted regarding device access The recommended way to distinguish between device trusted users and not device trusted users is to make all device trusted users a member of the Device Administrators group Granting members of the Device Administrators group access to devices via the Simple Configuration or Device Configuration views will therefore ensure that device trusted users have full access ...

Page 82: ...a check box is grayed out values affecting the access scenario have been changed from within the Device Class Configuration view To reset the values back to simple settings click the check box to clear it or set it and then click Yes to confirm 3 Click the Save icon NOTE If background service is not running a dialog box opens to ask if you would like to start it Click Yes 4 Click OK Starting backg...

Page 83: ...ly applied for a device class A user or group selected will be able to access any device in the device class Protection may also be applied to specific devices User List shows all users and groups that are allowed or denied access to the selected device class or specific device The User List entry may be made for a specific user or for a group of which the user is a member If a user or group entry...

Page 84: ... write access or read write access only for the same device or a device below this device in the device hierarchy Example 6 If a user or group is denied read write access for a device or class of devices The same user the same group or a member of the same group can be granted read access or read write access only for a device below this device in the device hierarchy Denying access to a user or g...

Page 85: ...Click a user or a group to be added to the list of available users and groups and then click OK 6 Click OK again 7 Click Allow to grant access for this user or group 8 Click the Save icon Removing access for a user or a group To remove permission for a user or a group to access a device or a class of devices follow these steps 1 In the left pane of HP ProtectTools Administrative Console click Devi...

Page 86: ...In the left pane of HP ProtectTools Administrative Console click Device Access Manager and then click Device Class Configuration 2 In the device list click the device class that you want to configure and then navigate to the folder below that 3 Click Add The Select Users or Groups dialog box opens 4 Click Advanced and then click Find Now to search for the user s group that is to be denied access t...

Page 87: ...ry values follow these steps 1 In the left pane of HP ProtectTools Administrative Console click Device Access Manager and then click Device Class Configuration 2 Click the Reset button 3 Click Yes to confirm 4 Click the Save icon Setup Procedures 79 ...

Page 88: ... Configuration views NOTE After evaluating the access levels for all users and groups if a user does not have either Allow or Deny selected for a particular access level the user is denied access at that level Granting access to an existing group or user To grant permission for an existing group or user to view or change the configuration settings follow these steps 1 In the left pane of HP Protec...

Page 89: ... 2 Click Add The Select Users or Groups dialog box opens 3 Click Advanced and then click Find Now to search for users or groups to add 4 Click a group or user click OK and then click OK again 5 Click Allow to grant this user access 6 Click the Save icon Removing group or user access To remove permission for a group or user to view or change the configuration settings follow these steps 1 In the le...

Page 90: ...orting Computrace LoJack Pro Includes remote data delete device freeze basic asset tracking and reporting and managed theft recovery Computrace LoJack Pro Premium Includes remote data delete device freeze advanced asset tracking and reports geolocation and geofencing and managed theft recovery The Computrace Agent is embedded in the BIOS of HP business notebooks though the Agent is turned off when...

Page 91: ...pport through your HP Service contact The option to Browse for Virtual Token is not displayed during the logon process The user cannot move the location of a registered virtual token in Password Manager because the option to browse was removed to reduce security risks The browse option was removed because it allowed non users to delete and rename files and take control of Windows Domain administra...

Page 92: ...ft com for more information on the cause of the issue In order to log on the user must select Password Manager and log on After logging on to Password Manager the user is prompted to log on to Windows the user may have to select the Windows logon option to complete the logon process If the user logs on to Windows first then the user must manually log on to Password Manager The security Restore Ide...

Page 93: ...ger should allow Solution Use the Device Class Configuration within Device Access Manager to investigate the user s device settings Click Security Manager click Device Access Manager and then click Device Class Configuration Expand the levels in the Device Class tree and review the settings applicable to this user Check for any Deny permissions that may be set on the user or any Windows Group of w...

Page 94: ...DVD CD and one for denying access to DVD CD Specific users would then be added to the appropriate group The Simple Configuration view has been used to define a device access control policy but administrative users cannot access devices Explanation Simple Configuration denies access for Users and Guests and allows Device Administrators Solution Add the Administrative user to the Device Administrato...

Page 95: ...a timing dependency on plug in services load time when closing and restarting Security Manager Since PTHOST exe is the shell housing the other applications plug ins it depends on the ability of the plug in to complete its load time services Closing the shell before the plug in has had time to complete loading is the root cause Allow Security Manager to complete the services loading message seen at...

Page 96: ...tant program information to a location outside the program It can then be used for restoring the information at a later date to the same computer or another one background service The HP ProtectTools Device Locking Auditing background service which must be running for device access control policies to be applied It can be viewed from within the Services application under the Administrative Tools o...

Page 97: ...d requires the user to correctly type the DriveLock password when the computer starts up emergency recovery archive Protected storage area that allows the reencryption of basic user keys from one platform owner key to another encryption Procedure such as use of an algorithm employed in cryptography to convert plain text into cipher text in order to prevent unauthorized recipients from reading that...

Page 98: ...nts PSD Personal secure drive which provides a protected storage area for sensitive information reboot Process of restarting the computer restore A process that copies program information from a previously saved backup file into this program reveal A task that allows the user to decrypt one or more chat history sessions displaying the Contact Screen Name s in plain text and making the session avai...

Page 99: ...is sent to a person asking them to become a Trusted Contact Trusted Contact list A listing of Trusted Contacts Trusted Contact recipient A person who receives an invitation to become a Trusted Contact trusted IM communication A communication session during which trusted messages are sent from a trusted sender to a Trusted Contact trusted message A communication session during which trusted message...

Page 100: ...r for a Microsoft Office document 53 Privacy Manager for Microsoft Outlook 51 Privacy Manager for Windows Live Messenger 57 controlling device access 72 creating backup keys 41 shred profile 67 credentials 33 34 credentials registering 26 customizing shred profile 67 simple delete profile 68 D dashboard settings 25 data backing up 35 restoring 35 restricting access to 3 deactivating Drive Encrypti...

Page 101: ...g in to the computer 39 Logons menu 31 logons adding 30 categories 31 editing 31 managing 32 LoJack Pro 82 M management tools adding 21 managing credentials 33 passwords 20 29 users 15 manually shredding all selected items 70 one asset 70 Microsoft Excel adding a signature line 53 Microsoft Office e mailing an encrypted document 55 encrypting a document 54 removing encryption 55 signing a document...

Page 102: ...tting free space bleaching schedule 66 shred schedule 66 settings adding 20 25 36 advanced 17 advanced user 27 applications 20 25 36 General tab 19 icon 33 Setup Wizard 7 shred cycle 67 signing e mail message 51 Microsoft Office document 53 Simple Configuration 73 simple delete 68 smart card settings 16 specifying security settings 14 starting Privacy Manager Chat session 56 suggested signer addin...

Page 103: ......

Reviews: