HP 6930p - EliteBook - Core 2 Duo 2.8 GHz User Manual page 4

Protecttools (select models only) - windows 7
Hide thumbs Also See for 6930p - EliteBook - Core 2 Duo 2.8 GHz:
Table of Contents

Advertisement

Using Application Protection .............................................................................................. 21
Advanced tasks (administrator only) .................................................................................................. 23
Specifying how users and administrators log on ............................................................... 23
Configuring credential properties ....................................................................................... 23
Configuring Credential Manager settings .......................................................................... 24
Setup procedures ............................................................................................................................... 28
Opening Drive Encryption .................................................................................................. 28
General tasks ..................................................................................................................................... 29
Activating Drive Encryption ................................................................................................ 29
Deactivating Drive Encryption ............................................................................................ 29
Logging in after Drive Encryption is activated .................................................................... 29
Advanced tasks .................................................................................................................................. 30
Managing Drive Encryption (administrator task) ................................................................ 30
Backup and recovery (administrator task) ......................................................................... 30
Opening Privacy Manager .................................................................................................................. 33
Setup procedures ............................................................................................................................... 34
Managing Privacy Manager Certificates ............................................................................ 34
Requesting and installing a Privacy Manager Certificate .................................................. 34
Viewing Privacy Manager Certificate details ...................................................................... 35
Renewing a Privacy Manager Certificate ........................................................................... 35
Setting a default Privacy Manager Certificate .................................................................... 35
Deleting a Privacy Manager Certificate ............................................................................. 35
Restoring a Privacy Manager Certificate ........................................................................... 36
Revoking your Privacy Manager Certificate ....................................................................... 36
Managing Trusted Contacts ............................................................................................... 36
iv
Exporting an application .................................................................. 19
Importing an application ................................................................... 20
Modifying credentials ........................................................................ 20
Restricting access to an application .................................................................. 21
Removing protection from an application .......................................................... 21
Changing restriction settings for a protected application .................................. 22
from Credential Manager .................................................................................. 24
before Single Sign On ....................................................................................... 26
Encrypting or decrypting individual drives ......................................................... 30
Creating backup keys ........................................................................................ 30
Performing a recovery ....................................................................................... 31
Requesting a Privacy Manager Certificate ........................................................ 34
Installing a Privacy Manager Certificate ............................................................ 34
Adding Trusted Contacts ................................................................................... 37
Adding a Trusted Contact ................................................................. 37
book .................................................................................................. 38
Viewing Trusted Contact details ........................................................................ 38

Advertisement

Table of Contents
loading

Table of Contents