Creating Strong Password Policies - HP dc5750 - Microtower PC User Manual

Security manager software
Hide thumbs Also See for dc5750 - Microtower PC:
Table of Contents

Advertisement

financial services, an executive, or R&D team, or private information such as patient records or personal
financial data. The following features help prevent unauthorized access:
The pre-boot authentication feature, if enabled, helps prevent access to the operating system. See
the following procedures:
"Enabling and disabling smart card power-on authentication support on page
"Enabling and disabling power-on authentication support for Embedded Security
on page
"Assigning a name to a Java Card on page
"Drive Encryption for HP ProtectTools on page
Embedded Security for HP ProtectTools helps protect sensitive user data or credentials stored
locally on a PC using the following procedures:
Embedded Security
"Using the Personal Secure Drive on page
Using the following procedures, Credential Manager for HP ProtectTools helps ensure that an
unauthorized user cannot get passwords or access to password-protected applications:
Credential Manager
"Using Single Sign On on page
The Personal Secure Drive feature encrypts sensitive data to help ensure it cannot be accessed
without authentication using the following procedures:
Embedded Security
"Using the Personal Secure Drive on page

Creating strong password policies

If a mandate goes into effect that requires the use of strong password policy for dozens of Web-based
applications and databases, Credential Manager for HP ProtectTools provides a protected repository
for passwords and Single Sign On convenience using the following procedures:
Credential Manager
"Using Single Sign On on page
For stronger security, Embedded Security for HP ProtectTools then protects that repository of user
names and passwords. This allows users to maintain multiple strong passwords without having to write
them down or try to remember them. See Embedded Security
ENWW
47"
"Setup procedures on page
"Setup procedures on page
"Setup procedures on page
"Setup procedures on page
18"
39"
52"
28"
31"
12"
18"
28"
31"
12"
"Setup procedures on page
Achieving key security objectives
46"
28."
5

Advertisement

Table of Contents
loading

Table of Contents