HP 4300 Guide de l'utilisateur

Naviguer en ligne ou télécharger Guide de l'utilisateur pour Postes de travail tout-en-un HP 4300. HP Compaq Pro 4300 Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 74
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 0
HP ProtectTools Security Software,
Version 6.0
User Guide
Vue de la page 0
1 2 3 4 5 6 ... 73 74

Résumé du contenu

Page 1 - Version 6.0

HP ProtectTools Security Software,Version 6.0User Guide

Page 2

x ENWW

Page 3 - About This Book

1 Introduction to securityHP ProtectTools security software provides security features that help protect against unauthorizedaccess to the computer, n

Page 4

HP ProtectTools featuresThe following table details the key features of HP ProtectTools modules:Module Key featuresHP ProtectTools Security Manager Ad

Page 5 - Table of contents

Module Key featuresSmart Card Security (part of Security Manager)●Provides a management software interface for Smart Card.HP ProtectTools Smart Card i

Page 6

Example 1: A Purchasing Agent for a large manufacturer makes most of her corporate transactionsover the Internet. She also frequently visits several p

Page 7

Both Embedded Security and Drive Encryption for HP ProtectTools will not allow access to theencrypted data even when the drive is removed because they

Page 8

Example 1: A Stock Broker wants to make sure his e-mails only go to specific clients and ensure noone can fake the e-mail account and intercept it. Th

Page 9

●Creating strong password policies● Addressing regulatory security mandatesProtecting against targeted theftAn example of this type of incident would

Page 10

Preventing unauthorized access from internal or external locationsUnauthorized access to an unsecured business PC presents a very tangible risk to cri

Page 11 - 1 Introduction to security

Additional security elementsAssigning security rolesIn managing computer security, one important practice is to divide responsibilities and rights amo

Page 12 - HP ProtectTools features

© Copyright 2009, 2010 Hewlett-PackardDevelopment Company, L.P. Theinformation contained herein is subject tochange without notice.Microsoft, Windows

Page 13

HP ProtectTools password Set in thisHP ProtectTools moduleFunctionSmart Card PIN Smart Card Security Can be used as a multifactor authenticationoption

Page 14

Backing up credentials and settingsYou can back up credentials in the following ways:●Use Drive Encryption for HP ProtectTools to select and back up H

Page 15

2 HP ProtectTools Security ManagerAdministrative ConsoleAbout HP ProtectTools Administrative ConsoleAdministration of HP ProtectTools Security Manager

Page 16

●Management Tools - Opens your default browser to a web page where you can discoveradditional management applications and tools that extend the featur

Page 17

Enabling security featuresThe security features enabled here apply to all users of this computer.1. In the left pane of the Administrative Console, ex

Page 18

4. In the Policy section drop-down list, choose whether ANY (only one) of the specified credentialsare required, or if ALL of the specified credential

Page 19 - Additional security elements

Removing a userNOTE: This procedure does not delete the Windows user account. It only removes that accountfrom Security Manager. To completely remove

Page 20 - Creating a secure password

Encrypting DrivesDrive Encryption for HP ProtectTools allows you to encrypt computer hard drives, making the harddrive unreadable and inaccessible to

Page 21

3 HP ProtectTools Security ManagerHP ProtectTools Security Manager allows you to significantly increase the security of your computer.Through the use

Page 22 - Administrative Console

NOTE: If the HP Password Manager level of security has not been configured, users must stillenter their Windows password at the Windows login screen,

Page 23 - Configuring your system

About This BookThis guide provides basic information for upgrading this computer model.WARNING! Text set off in this manner indicates that failure to

Page 24 - Enabling security features

Initializing the Smart CardHP ProtectTools Security Manager can support a number of different Smart Cards. The number andtype of characters used as PI

Page 25 - Defining Settings

Shredding or bleaching filesFile Sanitizer for HP ProtectTools deletes files by overwriting them with meaningless data. Thisprocess, referred to as “s

Page 26 - Specifying device settings

Adding applicationsAdditional applications may be available to add new features to this program.1. Click Start, click All Programs, click HP, and then

Page 27 - Managing Device Access

5. Enter your password to verify your identity, then click the arrow button.6. Enter a path and name for the storage file. By default, the file will b

Page 28

Changing your Windows user name and pictureYour Windows user name and a picture are displayed in the upper left corner of Security Manager.To change y

Page 29 - Setting credentials

4 Password Manager forHP ProtectToolsLogging on to Windows, websites and programs is easier and more secure when you use PasswordManager.Password Mana

Page 30 - Registering the Smart Card

●Open Password Manager - Launches the Security Manager dashboard on the PasswordManager page.●Help - Displays online help for the Password Manager app

Page 31 - Activating theft recovery

4. Edit your logon information.● Click the arrows to the right of a logon field to populate it with one of several preformattedchoices.●Optionally, cl

Page 32 - Backup and Restore

Managing your logonsPassword Manager makes managing your logon information - user names, passwords and multiplelogon accounts - painless and intuitive

Page 33 - Restoring your data

5 Drive Encryption for HP ProtectToolsNOTE: Drive Encryption for HP ProtectTools is available on some models only.In today’s world, a computer belongi

Page 34

iv About This Book ENWW

Page 35 - HP ProtectTools

Setup proceduresOpening Drive Encryption1. Click Start, click All Programs, click HP, and then click HP ProtectTools AdministrativeConsole.2. Click Dr

Page 36 - Editing logons

Encrypting or decrypting individual drives1. In the Administrative Console left pane, expand Drive Encryption, and click EncryptionManagement.2. Click

Page 37 - Using the Logons menu

6 Privacy Manager for HP ProtectToolsPrivacy Manager is a tool used to obtain Certificates of Authority, which verify the source, integrity,and securi

Page 38 - Managing your logons

set up as an account within Microsoft Outlook on the same computer from which you are requestingthe Privacy Manager Certificate.Requesting a Privacy M

Page 39

Renewing a Privacy Manager CertificateWhen your Privacy Manager Certificate nears expiration, you will be notified that you need to renewit:1. In the

Page 40 - Advanced tasks

3. On the “Migration File” page, click Browse to search for the .dppsm file that you created whenyou installed or exported the Privacy Manager Certifi

Page 41 - Creating backup keys

Adding a Trusted Contact1. In the Security Manager left pane, expand Privacy Manager and click Trusted Contacts, andthen click the Invite Contacts but

Page 42 - Opening Privacy Manager

NOTE: When the e-mail is received by the Trusted Contact recipient, the recipient must openthe e-mail and click Accept in the lower-right corner of th

Page 43

Configuring Privacy Manager in a Microsoft Office document1. Right-click the HP ProtectTools icon in the notification area, at the far right of the ta

Page 44

To add a suggested signer to a Microsoft Word or Microsoft Excel document:1. In Microsoft Word or Microsoft Excel, create and save a document.2. Click

Page 45 - Managing Trusted Contacts

Table of contents1 Introduction to security ...

Page 46

5. Click OK.6. Authenticate using your chosen security logon method.If you later decide to edit the document, follow the steps in Signing a Microsoft

Page 47

Using Privacy Manager in Microsoft OutlookWhen Privacy Manager is installed, a Privacy button is displayed on the Microsoft Outlook toolbar,and a Send

Page 48

Advanced tasksMigrating Privacy Manager Certificates and Trusted Contacts to a differentcomputerYou can securely migrate your Privacy Manager Certific

Page 49

7 File Sanitizer for HP ProtectToolsFile Sanitizer is a tool that allows you to securely erase critical files and folders (personal informationor file

Page 50

Setting a free space bleaching scheduleNOTE: Free space bleaching is for those assets that you delete using the Windows Recycle Bin orfor manually del

Page 51

To select a predefined shred profile:1. In the Security Manager left pane, expand File Sanitizer and click Settings.2. Click a predefined shred profil

Page 52

NOTE: It is highly recommended that you run free space bleaching regularly if you use the simpledelete option.1. In the Security Manager left pane, ex

Page 53

Manually shredding one assetCAUTION: Shredded assets cannot be recovered. Carefully consider which items you select formanual shredding.1. Right-click

Page 54 - Setting a shred schedule

Aborting a shred or free space bleaching operationWhen a shred or free space bleaching operation is in progress, a message above theHP ProtectTools Se

Page 55

8 Embedded Security forHP ProtectToolsNOTE: The integrated Trusted Platform Module (TPM) embedded security chip must be installed inyour computer to u

Page 56

Specifying device settings ... 16Configuring Applicatio

Page 57 - Manually shredding one asset

To enable the embedded security chip in Computer Setup:1. Open Computer Setup by turning on or restarting the computer, and then pressing F10 while th

Page 58 - Viewing the log files

NOTE: To use secure e-mail, you must first configure the e-mail client to use a digitalcertificate that is created with Embedded Security. If a digita

Page 59 - 8 Embedded Security for

Advanced tasksBacking up and restoringThe Embedded Security backup feature creates an archive that contains certification information tobe restored in

Page 60

9 Device Access Manager forHP ProtectToolsThis security tool is available to administrators only. Device Access Manager for HP ProtectTools hasthe fol

Page 61

NOTE: If background service is not running, it attempts to start now. Click Yes to allow it.5. Click OK.Device class configuration (advanced)More sele

Page 62

Scenario: A Simple Configuration policy is configured to deny all non-Device Administrators accessto the DVD/CD-ROM drive.Result: A JITA enabled user

Page 63 - 9 Device Access Manager for

5. Set the JITA period to the required time.6. Click the Extendable check box.7. Click the Apply button.The selected user can now login, authenticate

Page 64 - Removing a user or a group

10 Computrace for HP ProtectToolsComputrace for HP ProtectTools is a tool that can remotely monitor, manage, and track yourcomputer.Once activated, Co

Page 65

Glossaryactivation.The task that must be completed before any of the Drive Encryption features are accessible. Drive Encryption isactivated using the

Page 66 - Advanced Settings

Drive Encryption key recovery service.The SafeBoot Recovery Service. It stores a copy of the encryption key, enabling you to access your computer ifyo

Page 67

Logging in after Drive Encryption is activated ... 30Advanced tasks ...

Page 68 - Glossary

A task that allows the user to decrypt one or more chat history sessions, displaying the Contact Screen Name(s)in plain text and making the session av

Page 69

A communication session during which trusted messages are sent from a trusted sender to a Trusted Contact.trusted message.A communication session duri

Page 70

IndexAaccesscontrolling 53preventing unauthorized 8accessing HP ProtectToolsSecurity 6accountbasic user 50advanced tasksDevice Access Manager 54Embedd

Page 71

changing Windows username 24changing your picture 24device access 21drive encryption status 21logging in 18managing communicationprivacy 20managing pa

Page 72

viewing Privacy Managercertificate details 33viewing trusted contactdetails 37Rrestrictingaccess to sensitive data 7device access 53Ssecuritykey objec

Page 73

Setting a shred schedule ....... 44Selecting or creating a

Page 74

Creating an extendable JITA for a user or group ................ 55Disabling a JITA for a user or group

Commentaires sur ces manuels

Pas de commentaire