HP (Hewlett-Packard) 3130 Personal Computer User Manual


 
HP ProtectTools features
The following table details the key features of HP ProtectTools modules:
Module Key features
HP ProtectTools Security Manager Administrative
Console
The Security Manager setup wizard is used by administrators to
set up and configure levels of security and security logon
methods.
Configure options hidden from basic users.
Activate Drive Encryption and configure user access.
Configure Device Access Manager configurations and user
access.
Administrator tools are used to add and remove
HP ProtectTools users and view user status.
HP ProtectTools Security Manager (for general
users)
Configure and change File Sanitizer Shred, Bleaching, and
Settings.
View settings for Encryption Status and Device Access
Manager.
Use Privacy Manager to increase security of e-mails and
documents.
Activate Computrace for HP ProtectTools
Configure Preferences and Backup and Restore options.
Credential Manager for HP ProtectTools (part of
Security Manager)
Organize, set up and change user names and passwords.
Configure and change user credentials such as Windows
password and Smart Card.
Acts as a personal password vault, streamlining the logon
process with the Single Sign On feature, which automatically
remembers and applies user credentials.
Create and Organize single sign on user names and passwords.
Drive Encryption for HP ProtectTools
Provides complete, full-volume hard drive encryption.
Forces pre-boot authentication in order to decrypt and access
the data on the hard drive.
Offers the option to activate SED drives (Self Encrypting
Drives), if equipped.
Privacy Manager for HP ProtectTools Used to obtain Certificates of Authority, which verify the source,
integrity, and security of communication when using Microsoft e-
mail and Microsoft Office documents.
File Sanitizer for HP ProtectTools
Allows you to securely shred digital assets (securely delete
sensitive information including application files, historical or
Web-related content, or other confidential data) on your
computer and periodically bleach the hard drive (write over data
that has been previously deleted but is still present on the hard
drive in order to make recovery of the data more difficult).
2 Chapter 1 Introduction to security ENWW