HP (Hewlett-Packard) 3130 Personal Computer User Manual


 
Table of contents
1 Introduction to security .................................................................................................................................. 1
HP ProtectTools features ..................................................................................................................... 2
HP ProtectTools security products description and common use examples ........................................ 3
Credential Manager (Password Manager) for HP ProtectTools .......................................... 3
Embedded Security for HP ProtectTools ............................................................................. 4
Drive Encryption for HP ProtectTools .................................................................................. 4
File Sanitizer for HP ProtectTools ........................................................................................ 5
Device Access Manager for HP ProtectTools ...................................................................... 5
Privacy Manager for HP ProtectTools ................................................................................. 5
Computrace for HP ProtectTools (formerly known as LoJack Pro) ..................................... 6
Accessing HP ProtectTools Security .................................................................................................... 6
Achieving key security objectives ......................................................................................................... 6
Protecting against targeted theft .......................................................................................... 7
Restricting access to sensitive data ..................................................................................... 7
Preventing unauthorized access from internal or external locations ................................... 8
Creating strong password policies ....................................................................................... 8
Additional security elements ................................................................................................................. 9
Assigning security roles ....................................................................................................... 9
Managing HP ProtectTools passwords ................................................................................ 9
Creating a secure password ............................................................................. 10
Backing up credentials and settings .................................................................................. 11
2 HP ProtectTools Security Manager Administrative Console .................................................................... 12
About HP ProtectTools Administrative Console ................................................................................. 12
Using the Administrative Console ...................................................................................................... 12
Getting Started - Setup Wizard .......................................................................................................... 13
Configuring your system ..................................................................................................................... 13
Enabling security features ................................................................................................. 14
Defining Security Manager authentication policies ............................................................ 14
Logon tab .......................................................................................................... 14
Session tab ....................................................................................................... 14
Defining Settings ................................................................................................................ 15
Managing Users ................................................................................................................. 15
Adding a user .................................................................................................... 15
Removing a user ............................................................................................... 16
Checking user status ......................................................................................... 16
ENWW v