Accessing Hp Protecttools Security; Achieving Key Security Objectives - HP 8000 - Elite Convertible Minitower PC User Manual

Security software, version 5.0
Hide thumbs Also See for 8000 - Elite Convertible Minitower PC:
Table of Contents

Advertisement

Module
Embedded Security for HP ProtectTools
Device Access Manager for HP ProtectTools
LoJack Pro for HP ProtectTools

Accessing HP ProtectTools Security

To access HP ProtectTools Security Manager from the Windows Start menu:
In Windows, click Start, click All Programs, and then click HP ProtectTools Security Manager.
To access HP ProtectTools Security Manager Administrative Console from the Windows Start menu:
In Windows, click Start, click All Programs, and then click HP ProtectTools Administrative
Console.
NOTE:
After you have configured the Password Manager module, you can also open HP ProtectTools
by logging on to Password Manager directly from the Windows logon screen.

Achieving key security objectives

The HP ProtectTools modules can work together to provide solutions for a variety of security issues,
including the following key security objectives:
Protecting against targeted theft
Restricting access to sensitive data
Preventing unauthorized access from internal or external locations
ENWW
Key features
Uses a Trusted Platform Module (TPM) embedded security chip
to help protect against unauthorized access to sensitive user data
or credentials stored locally on a PC.
Allows creation of a personal secure drive (PSD), which is useful
in protecting user file and folder information.
Supports third-party applications (such as Microsoft Outlook and
Internet Explorer) for protected digital certificate operations.
Allows IT managers or administrators to control access to devices
such as USB ports, optical drives, personal music players, etc.
based on user profiles.
Prevents unauthorized users from removing data using external
storage media and from introducing viruses into the system from
external media.
The administrator can disable access to writeable devices for
specific individuals or groups of users.
Provides secure asset tracking.
Can monitor user activity along with hardware and software
changes.
Remains active even if the hard drive is reformatted or replaced.
Requires separate purchase of tracking and tracing subscription
to activate.
Accessing HP ProtectTools Security
3

Advertisement

Table of Contents
loading

This manual is also suitable for:

Protecttools8100 - elite convertible minitower pc

Table of Contents