HP (Hewlett-Packard) 6000 Personal Computer User Manual


 
Setting a shred schedule ................................................................................................... 44
Selecting or creating a shred profile .................................................................................. 44
Selecting a predefined shred profile .................................................................................. 44
Customizing an advanced security shred profile ............................................................... 45
Customizing a simple delete profile ................................................................................... 45
General tasks ..................................................................................................................................... 46
Using a key sequence to initiate shredding ....................................................................... 46
Using the File Sanitizer icon .............................................................................................. 46
Manually shredding one asset ........................................................................................... 47
Manually shredding all selected items ............................................................................... 47
Manually activating free space bleaching .......................................................................... 47
Aborting a shred or free space bleaching operation .......................................................... 48
Viewing the log files ........................................................................................................... 48
8 Embedded Security for HP ProtectTools .................................................................................................... 49
Setup procedures ............................................................................................................................... 49
Installing Embedded Security for HP ProtectTools (if necessary) ..................................... 49
Enabling the embedded security chip in Computer Setup ................................................. 49
Initializing the embedded security chip .............................................................................. 50
Setting up the basic user account ...................................................................................... 50
General tasks ..................................................................................................................................... 51
Using the Personal Secure Drive ....................................................................................... 51
Encrypting files and folders ................................................................................................ 51
Sending and receiving encrypted e-mail ............................................................................ 51
Advanced tasks .................................................................................................................................. 52
Backing up and restoring ................................................................................................... 52
Creating a backup file ....................................................................................... 52
Restoring certification data from the backup file ............................................... 52
Changing the owner password .......................................................................................... 52
Resetting a user password ................................................................................................ 52
Migrating keys with the Migration Wizard .......................................................................... 52
9 Device Access Manager for HP ProtectTools ............................................................................................ 53
Starting background service ............................................................................................................... 53
Simple configuration ........................................................................................................................... 53
Device class configuration (advanced) ............................................................................................... 54
Adding a user or a group ................................................................................................... 54
Removing a user or a group .............................................................................................. 54
Denying or allowing access to a user or group .................................................................. 54
Just In Time Authentication (JITA) Configuration ............................................................................... 54
Creating a JITA for a user or group ................................................................................... 55
viii ENWW