Compaq dc5800 - Microtower PC User Manual page 4

Hp protect tools guide
Hide thumbs Also See for dc5800 - Microtower PC:
Table of Contents

Advertisement

Using Application Protection .............................................................................................. 19
Advanced tasks (administrator only) .................................................................................................. 21
Specifying how users and administrators log on ............................................................... 21
Configuring custom authentication requirements .............................................................. 21
Configuring credential properties ....................................................................................... 22
Configuring Credential Manager settings .......................................................................... 22
Setup procedures ............................................................................................................................... 25
Enabling the embedded security chip ................................................................................ 25
Initializing the embedded security chip .............................................................................. 25
Setting up the basic user account ...................................................................................... 26
General tasks ..................................................................................................................................... 27
Using the Personal Secure Drive ....................................................................................... 27
Encrypting files and folders ................................................................................................ 27
Sending and receiving encrypted e-mail ............................................................................ 27
Changing the Basic User Key password ........................................................................... 27
Advanced tasks .................................................................................................................................. 28
Backing up and restoring ................................................................................................... 28
Changing the owner password .......................................................................................... 28
Resetting a user password ................................................................................................ 28
Enabling and disabling Embedded Security ...................................................................... 28
Migrating keys with the Migration Wizard .......................................................................... 29
General tasks ..................................................................................................................................... 31
Changing a Java Card PIN ................................................................................................ 31
Selecting the card reader ................................................................................................... 31
Advanced tasks (administrators only) ................................................................................................ 32
Assigning a Java Card PIN ................................................................................................ 32
Assigning a name to a Java Card ...................................................................................... 32
Setting power-on authentication ........................................................................................ 32
iv
Using manual (drag and drop) registration ....................................... 17
Managing applications and credentials ............................................................. 17
Modifying application properties ....................................................... 17
Removing an application from Single Sign On ................................. 17
Exporting an application ................................................................... 18
Importing an application ................................................................... 18
Modifying credentials ........................................................................ 18
Restricting access to an application .................................................................. 19
Removing protection from an application .......................................................... 19
Changing restriction settings for a protected application .................................. 19
from Credential Manager .................................................................................. 23
before Single Sign On ....................................................................................... 23
Creating a backup file ....................................................................................... 28
Restoring certification data from the backup file ............................................... 28
Permanently disabling Embedded Security ...................................................... 29
Enabling Embedded Security after permanent disable ..................................... 29
Java Card .......................................................................................................... 33
Creating a user Java Card ................................................................................ 33

Advertisement

Table of Contents
loading

Table of Contents