Hp Protecttools Features - HP ProBook 4325s - Notebook PC User Manual

Hp protecttools user guide - windows xp, windows vista, windows 7
Hide thumbs Also See for ProBook 4325s - Notebook PC:
Table of Contents

Advertisement

HP ProtectTools features

The following table details the key features of HP ProtectTools modules.
Module
HP ProtectTools Security Manager Administrative
Console (for administrators)
HP ProtectTools Security Manager (for general users)
Credential Manager for HP ProtectTools (Password
Manager)
Drive Encryption for HP ProtectTools (select models
only)
Privacy Manager for HP ProtectTools (select models
only)
File Sanitizer for HP ProtectTools
Device Access Manager for HP ProtectTools (select
models only)
2
Chapter 1 Introduction to security
Key features
Set up and configure levels of security and security logon methods
using the Security Manager Setup Wizard.
Configure options hidden from basic users.
Configure Device Access Manager configurations and user
access.
Add and remove HP ProtectTools users and view user status
using administrator tools.
Organize, set up, and change user names and passwords.
Configure and change user credentials such as Windows
password and Smart Card.
Configure and change File Sanitizer Shred, Bleaching, and
Settings.
View settings for Device Access Manager.
Configure Preferences and Backup and Restore options.
Save, organize, and protect your names and passwords.
Set up the logon screens of Web sites and programs for quick and
secure access.
Save Web site user names and passwords by entering them into
Password Manager. The next time you visit this site, Password
Manager fills in and submits the information automatically.
Create stronger passwords for more account security. Password
Manager fills in and submits the information automatically.
Provide complete, full-volume hard drive encryption.
Force pre-boot authentication in order to decrypt and access the
data.
Use advanced logon techniques to verify the source, integrity, and
security of e-mail, Microsoft® Office documents, or instant
messaging (IM) communication.
Shred digital assets (sensitive information including application
files, historical or Web-related content, or other confidential data)
on your computer and periodically bleach the hard drive.
Allow IT managers to control access to devices based on user
profiles.
Prevent unauthorized users from removing data using external
storage media and from introducing viruses into the system from
external media.
Allow administrators to disable access to writable devices for
specific individuals or groups of users.

Advertisement

Table of Contents
loading

Table of Contents