Table Of Contents - HP 6930p - EliteBook - Core 2 Duo 2.8 GHz User Manual

Protecttools (select models only) - windows 7
Hide thumbs Also See for 6930p - EliteBook - Core 2 Duo 2.8 GHz:
Table of Contents

Advertisement

Table of contents

HP ProtectTools features ..................................................................................................................... 2
Accessing HP ProtectTools Security .................................................................................................... 4
Achieving key security objectives ......................................................................................................... 6
Protecting against targeted theft .......................................................................................... 6
Restricting access to sensitive data ..................................................................................... 6
Creating strong password policies ....................................................................................... 7
Additional security elements ................................................................................................................. 8
Assigning security roles ....................................................................................................... 8
Managing HP ProtectTools passwords ............................................................................... 8
Backing up and restoring HP ProtectTools credentials ..................................................... 10
Setup procedures ............................................................................................................................... 12
Logging on to Credential Manager .................................................................................... 12
Registering credentials ...................................................................................................... 12
General tasks ..................................................................................................................................... 15
Creating a virtual token ...................................................................................................... 15
Changing the Windows logon password ............................................................................ 15
Changing a token PIN ........................................................................................................ 15
Locking the computer (workstation) ................................................................................... 17
Using Windows Logon ....................................................................................................... 17
Using Single Sign On ......................................................................................................... 18
Creating a secure password ............................................................................. 10
Backing up credentials and settings .................................................................. 10
Using the Credential Manager Logon Wizard .................................................. 12
Registering fingerprints .................................................................................... 12
Setting up the fingerprint reader ....................................................... 13
Registering a Smart Card or Token .................................................................. 13
Registering other credentials ............................................................................ 14
Logging on to Windows with Credential Manager ............................................. 17
Registering a new application .......................................................................... 18
Using automatic registration ............................................................ 18
Using manual (drag and drop) registration ...................................... 19
Managing applications and credentials ............................................................. 19
Modifying application properties ...................................................... 19
Removing an application from Single Sign On ................................. 19
iii

Advertisement

Table of Contents
loading

Table of Contents