HP Compaq Elite 8200 AIO User Manual page 8

Security software
Table of Contents

Advertisement

General tasks ..................................................................................................................................... 46
8 Embedded Security for HP ProtectTools .................................................................................................... 49
Setup procedures ............................................................................................................................... 49
General tasks ..................................................................................................................................... 51
Advanced tasks .................................................................................................................................. 52
9 Device Access Manager for HP ProtectTools ............................................................................................ 53
Starting background service ............................................................................................................... 53
Simple configuration ........................................................................................................................... 53
Device class configuration (advanced) ............................................................................................... 54
Just In Time Authentication (JITA) Configuration ............................................................................... 54
viii
Setting a shred schedule ................................................................................................... 44
Selecting or creating a shred profile .................................................................................. 44
Selecting a predefined shred profile .................................................................................. 44
Customizing an advanced security shred profile ............................................................... 45
Customizing a simple delete profile ................................................................................... 45
Using a key sequence to initiate shredding ....................................................................... 46
Using the File Sanitizer icon .............................................................................................. 46
Manually shredding one asset ........................................................................................... 47
Manually shredding all selected items ............................................................................... 47
Manually activating free space bleaching .......................................................................... 47
Aborting a shred or free space bleaching operation .......................................................... 48
Viewing the log files ........................................................................................................... 48
Enabling the embedded security chip in Computer Setup ................................................. 49
Initializing the embedded security chip .............................................................................. 50
Setting up the basic user account ...................................................................................... 50
Using the Personal Secure Drive ....................................................................................... 51
Encrypting files and folders ................................................................................................ 51
Sending and receiving encrypted e-mail ............................................................................ 51
Backing up and restoring ................................................................................................... 52
Creating a backup file ....................................................................................... 52
Restoring certification data from the backup file ............................................... 52
Changing the owner password .......................................................................................... 52
Resetting a user password ................................................................................................ 52
Migrating keys with the Migration Wizard .......................................................................... 52
Adding a user or a group ................................................................................................... 54
Removing a user or a group .............................................................................................. 54
Denying or allowing access to a user or group .................................................................. 54
Creating a JITA for a user or group ................................................................................... 55
ENWW

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents