Hp Protecttools Features - HP Pro 3130 MT User Manual

Security software
Table of Contents

Advertisement

HP ProtectTools features

The following table details the key features of HP ProtectTools for Small Business modules:
Module
HP ProtectTools Security Manager Administrative
Console
HP ProtectTools Security Manager (for general
users)
Credential Manager for HP ProtectTools (Password
Manager)
Drive Encryption for HP ProtectTools
2
Chapter 1 Introduction to security
Key features
The Security Manager setup wizard is used by administrators to
set up and configure levels of security and security logon methods.
Configure options hidden from basic users.
Configure Device Access Manager configurations and user
access.
Administrator tools are used to add and remove HP ProtectTools
users and view user status.
Organize, set up and change user names and passwords.
Configure and change user credentials such as Windows
password and Smart Card.
Configure and change File Sanitizer Shred, Bleaching, and
Settings.
View settings for Device Access Manager.
Configure Preferences and Backup and Restore options.
Is designed to save, organize, and protect your user names and
passwords.
Allows you to set up the logon screens of websites and programs
for quick and secure access.
As you access various websites and you want to save your user
name and passwords, enter them into Password Manager so that
you won't have to remember them again. The next time you visit
this site, Password Manager will fill in and submit the data
automatically.
Allows you to create stronger passwords that you don't have to
write down or remember, and keeps your accounts more secure.
Provides complete, full-volume hard drive encryption.
Forces pre-boot authentication in order to decrypt and access the
data on the hard drive.
Helps you comply with legal or industry requirements for
protecting confidential and sensitive data.
Protects your data from unauthorized access by encrypting the
entire hard drive. If the PC is ever stolen and the drive is removed
from the original system and placed in a different system, the data
will not be compromised.
ENWW

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents