HP ProtectTools features
The following table details the key features of HP ProtectTools modules.
Module Key features
HP ProtectTools Administrative Console Administrators can perform the following functions:
● Use the Security Manager Setup Wizard to set up and configure
levels of security and security logon methods.
● Configure options hidden from users.
● Activate Drive Encryption and configure user access.
●
Configure Device Access Manager policies and user access.
● Use administrator tools to add and remove HP ProtectTools
users and view user status.
HP ProtectTools Security Manager General users can perform the following functions:
● Configure and change settings for File Sanitizer shredding and
bleaching.
●
View settings for Encryption Status and Device Access
Manager.
● Use Privacy Manager to increase security of emails and other
documents.
● Activate Computrace for HP ProtectTools.
● Configure Preferences and Backup and Restore options.
Credential Manager General users can perform the following functions:
●
Change user names and passwords.
● Configure and change user credentials such as a Windows
password, fingerprint, face images, smart card, proximity card,
or contactless card.
Password Manager General users can perform the following functions:
● Organize, and set up user names and passwords.
●
Create stronger passwords for enhanced account security.
Password Manager fills in and submits the information
automatically.
●
Streamline the logon process with the Single Sign On feature,
which automatically remembers and applies user credentials.
Drive Encryption for HP ProtectTools (select models
only)
● Provides complete, full-volume hard drive encryption.
● Forces pre-boot authentication in order to decrypt and access
the data.
● Offers the option to activate self-encrypting drives (select
models only).
Privacy Manager for HP ProtectTools (select models
only)
●
Used to obtain Privacy Manager Certificates, which verify the
source, integrity, and security of communication when using
email and Microsoft Office documents.
2 Chapter 1 Introduction to security
Kommentare zu diesen Handbüchern