HP ProBook 4325s - Notebook PC User Manual
HP ProBook 4325s - Notebook PC User Manual

HP ProBook 4325s - Notebook PC User Manual

Hp protecttools user guide - windows xp, windows vista, windows 7
Hide thumbs Also See for ProBook 4325s - Notebook PC:
Table of Contents

Advertisement

HP ProtectTools
User Guide

Advertisement

Table of Contents
loading

Summary of Contents for HP ProBook 4325s - Notebook PC

  • Page 1 HP ProtectTools User Guide...
  • Page 2 © Copyright 2009 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Java is a US trademark of Sun Microsystems, Inc. Microsoft and Windows are U.S. registered trademarks of Microsoft Corporation.
  • Page 3: Table Of Contents

    Table of contents 1 Introduction to security HP ProtectTools features ........................2 Achieving key security objectives ......................3 Protecting against targeted theft ..................3 Restricting access to sensitive data ..................3 Preventing unauthorized access from internal or external locations ........3 Creating strong password policies ..................
  • Page 4 Applications tab ..........................20 6 Management tools Updates and Messages ........................22 7 HP ProtectTools Security Manager Opening HP ProtectTools Security Manager ..................24 Using the Security Manager dashboard ..................... 25 Setup procedures ..........................26 Registering credentials ...................... 26 Enrolling your fingerprints ................. 26 Enrolling scenes ....................
  • Page 5 Logging in after Drive Encryption is activated ..............39 Protect your data by encrypting your hard drive ..............40 Displaying encryption status ....................40 Advanced tasks ..........................41 Managing Drive Encryption (administrator task) ..............41 Encrypting or decrypting individual drives ............41 Backup and recovery (administrator task) .................
  • Page 6 Adding a suggested signer's signature line ........54 Encrypting a Microsoft Office document ............54 Removing encryption from a Microsoft Office document ........55 Sending an encrypted Microsoft Office document ..........55 Viewing a signed Microsoft Office document ............ 55 Viewing an encrypted Microsoft Office document ..........
  • Page 7 Viewing the log files ......................71 11 Device Access Manager for HP ProtectTools (select models only) Setup Procedures ..........................73 Opening Device Access Manager ..................73 Configuring device access ....................73 Device administrators group ................73 Simple Configuration ..................73 Starting background service .............
  • Page 8 viii...
  • Page 9: Introduction To Security

    Introduction to security HP ProtectTools Security Manager software provides security features that help protect against unauthorized access to the computer, networks, and critical data. Administration of HP ProtectTools Security Manager is provided through the Administrative Console feature. Using the HP ProtectTools Administrative Console, the local administrator can perform the following tasks: ●...
  • Page 10: Hp Protecttools Features

    HP ProtectTools features The following table details the key features of HP ProtectTools modules. Module Key features ● HP ProtectTools Security Manager Administrative Set up and configure levels of security and security logon methods Console (for administrators) using the Security Manager Setup Wizard. ●...
  • Page 11: Achieving Key Security Objectives

    Achieving key security objectives The HP ProtectTools modules can work together to provide solutions for a variety of security issues, including the following key security objectives: ● Protecting against targeted theft ● Restricting access to sensitive data ● Preventing unauthorized access from internal or external locations ●...
  • Page 12: Creating Strong Password Policies

    ● File Sanitizer allows secure deletion of data by shredding critical files and folders or bleaching the hard drive (writing over data that has been deleted but is still recoverable). ● DriveLock helps ensure that data cannot be accessed even if the hard drive is removed and installed into an unsecured system.
  • Page 13: Additional Security Elements

    Additional security elements Assigning security roles In managing computer security (particularly for large organizations), one important practice is to divide responsibilities and rights among various types of administrators and users. NOTE: In a small organization or for individual use, these roles may all be held by the same person. For HP ProtectTools, the security duties and privileges can be divided into the following roles: ●...
  • Page 14: Creating A Secure Password

    Creating a secure password When creating passwords, you must first follow any specifications that are set by the program. In general, however, consider the following guidelines to help you create strong passwords and reduce the chances of your password being compromised: ●...
  • Page 15: Getting Started With The Setup Wizard

    Getting started with the Setup Wizard The HP ProtectTools Setup Wizard guides you through setting up the most commonly used features of Security Manager. However, there is a wealth of additional functionality available through the HP ProtectTools Administrative Console. The same settings found in the wizard, as well as additional security features, can be configured through the console, which is accessed from the Windows®...
  • Page 16 The Setup Wizard asks you to verify your identity. Type your Windows password or scan your fingerprints with the fingerprint reader, and then click Next. If neither a fingerprint reader nor a smart card is available, you are prompted to enter your Windows password.
  • Page 17: Hp Protecttools Security Manager Administrative Console

    HP ProtectTools Security Manager Administrative Console Administration of HP ProtectTools Security Manager is provided through the Administrative Console. NOTE: Administration of HP ProtectTools requires administrator privileges. The console provides the following features: ● Enabling or disabling security features ● Managing users of the computer ●...
  • Page 18: Opening The Administrative Console

    Opening the Administrative Console For administrative tasks, such as setting system policies or configuring software, open the console as follows: Click Start, click All Programs, click HP, and then click HP ProtectTools Administrative ▲ Console. – or – In the left panel of the Security Manager dashboard, click Administration. For user tasks, such as registering fingerprints or using Security Manager, open the console as follows: Click Start, click All Programs, click HP, and then click HP ProtectTools Security Manager.
  • Page 19: Using The Administrative Console

    Using the Administrative Console The Security Manager Administrative Console is the central location for administering HP ProtectTools Security Manager. The console is composed of the following components: ● Tools—Displays the following categories for configuring security on your computer: ◦ Home—Allows you to select the security tasks to perform. ◦...
  • Page 20: Configuring Your System

    Configuring your system The System group is accessed from the Tools menu panel on the left side of the HP ProtectTools Administrative Console screen. You can use the applications in this group to manage the policies and settings for the computer, its users, and its devices. The following applications are included in the System group: ●...
  • Page 21: Setting Up Authentication For Your Computer

    Setting up authentication for your computer Within the Authentication application, you can select which security features should be implemented on this computer, set policies governing access to the computer, and configure additional advanced settings. You can specify the credentials required to authenticate each class of user when logging into Windows or logging into Web sites and programs during a user session.
  • Page 22: Settings

    Settings You can allow one or more of the following security settings: ● Allow One Step logon—Allows users of this computer to skip Windows logon if authentication was performed at the BIOS or encrypted disk level. ● Allow HP SpareKey authentication for Windows logon—Allows users of this computer to use the HP SpareKey feature to log on to Windows despite any other authentication policy required by Security Manager.
  • Page 23: Managing Users

    Managing users Within the Users application, you can monitor and manage this computer's HP ProtectTools users. All HP ProtectTools users are listed and verified against the policies set through Security Manager and whether or not they have registered the appropriate credentials enabling them to meet those policies. To manage users, select from the following settings: ●...
  • Page 24: Specifying Device Settings

    Specifying device settings Within the Device application, you can specify settings available for any built-in or attached security devices recognized by HP ProtectTools Security Manager. Fingerprints The Fingerprints page has three tabs: Enrollment, Sensitivity, and Advanced. Enrollment You can choose the minimum and maximum number of fingerprints that a user is allowed to enroll. You can also clear all of the data from the fingerprint reader.
  • Page 25: Advanced Settings

    For more convenience, click the slider to move it to the left, or for more accuracy, click the slider to move it to the right. ● Convenience—To make it easier for enrolled users to gain access in marginal situations, click the slider bar to move it to the Convenience position. ●...
  • Page 26: Configuring Your Applications

    Configuring your applications The Applications group is accessed from the Security Applications menu panel on the left side of HP ProtectTools Administrative Console. You can use Settings to customize the behavior of currently installed HP ProtectTools Security Manager applications. To edit your application settings: In the Tools menu, from the Applications group, click Settings.
  • Page 27: General Tab

    General tab The following settings are available on the General tab: ● Do not automatically launch the Setup Wizard for administrators—Select this option to prevent the wizard from automatically opening upon logon. ● Do not automatically launch the Getting Started wizard for users—Select this option to prevent user setup from automatically opening upon logon.
  • Page 28: Applications Tab

    Applications tab The settings displayed here can change when new applications are added to Security Manager. The minimal settings shown by default are as follows: ● Applications status—Enables status to be displayed for all applications. ● Password Manager—Enables the Password Manager application for all users of the computer. ●...
  • Page 29: Management Tools

    Management tools Additional applications may be available for adding new management tools to Security Manager. The administrator of this computer may disable this feature through the Settings application. To add additional management tools, click [+] Management tools.
  • Page 30: Updates And Messages

    Updates and Messages If an Internet connection is available, you can access the DigitalPersona Web site http://www.digitalpersona.com/ to check for new applications or to set up a schedule for automatic updates. To request information about new applications and updates, select the check box for Keep me informed about new applications and updates.
  • Page 31: Hp Protecttools Security Manager

    HP ProtectTools Security Manager HP ProtectTools Security Manager allows you to significantly increase the security of your computer. You can use preloaded Security Manager applications, as well as additional applications available for immediate download from the Web: ● Manage your logon and passwords ●...
  • Page 32: Opening Hp Protecttools Security Manager

    Opening HP ProtectTools Security Manager You can open HP ProtectTools Security Manager in any of the following ways: ● Click Start, click All Programs, click HP, and then click HP ProtectTools Security Manager. ● Double-click the HP ProtectTools icon in the notification area, at the far right of the taskbar. ●...
  • Page 33: Using The Security Manager Dashboard

    Using the Security Manager dashboard The Security Manager dashboard is the central location for easy access to Security Manager features, applications, and settings. To open the Security Manager dashboard, click Start, click All Programs, click HP, and then click ▲ HP ProtectTools Security Manager.
  • Page 34: Setup Procedures

    Setup procedures Registering credentials You can use the My Identity page to register your various authentication methods, or credentials. After they have been registered, you can use these methods to log on to Security Manager. Enrolling your fingerprints If your computer has a fingerprint reader built in or connected, the HP ProtectTools Security Manager Setup Wizard guides you through the process of setting up or “enrolling”...
  • Page 35: Advanced User Settings

    NOTE: If you are having difficulty enrolling scenes, try moving closer to the webcam. As with any type of photography or videography, lighting and contrast are extremely important. Ensure that the lighting for your session is primarily in the foreground and not primarily in the background. If you find that Face Recognition does not readily authenticate you, you might want to reenroll your scene with improved lighting.
  • Page 36: Setting Up A Smart Card

    To change your Windows password, follow these steps: From the Security Manager dashboard, click Credentials, and then click Password. Enter your current password in the Current Windows password text box. Type a new password in the New Windows password text box, and then type it again in the Confirm new password text box.
  • Page 37: General Tasks

    General tasks The applications included in this group assist you in managing various aspects of your digital identity. ● Security Manager—Creates and manages Quick Links, which allow you to launch and log on to Web sites and programs by authenticating with your Windows password, your fingerprint, or a smart card.
  • Page 38: Adding Logons

    ● Add a New Account—Allows you to add an account to a logon. ● Open Password Manager—Launches the Password Manager application. ● Help—Displays Password Manager software Help. NOTE: The administrator of this computer may have set up Security Manager to require more than one credential when verifying your identity.
  • Page 39: Editing Logons

    NOTE: After you use the manual mode of entering the logon data for a site, you must continue to use this method to log on to the same Web site in the future. NOTE: The manual mode of entering logon data is available only with Internet Explorer Click Close.
  • Page 40: Managing Your Logons

    To add a category: From the Security Manager dashboard, click Password Manager. Click the Manage tab, and then click Add Category. Enter a name for the category. Click OK. To add a logon to a category: Place your mouse pointer over the desired logon. Press and hold the left mouse button.
  • Page 41: Password Manager Icon Settings

    Password Manager icon settings Password Manager attempts to identify logon screens for Web sites and programs. When it detects a logon screen for which you have not created a logon, Password Manager prompts you to add a logon for the screen by displaying the Password Manager icon with a "+" sign. Click the icon arrow, and then click Icon Settings to customize how Password Manager handles possible logon sites.
  • Page 42: Your Personal Id Card

    Your personal ID card Your ID card uniquely identifies you as the owner of this Windows account, showing your name and a picture of your choice. It is prominently displayed in the upper-left corner of Security Manager pages, and as a Windows Sidebar gadget. Clicking your ID Card in the Windows Sidebar is one of the many ways to get quick access to Security Manager.
  • Page 43: Fingerprint

    Fingerprint The following settings are available on the Fingerprint tab: ● Quick Actions—Use Quick Actions to select the Security Manager task to be performed when you hold down a designated key while scanning your fingerprint. To assign a Quick Action to one of the listed keys, click a (Key) + Fingerprint option, and then select one of the available tasks from the menu.
  • Page 44: Discover More

    Select the previously created storage file. You can enter the path in the field provided, or click Browse. Enter the password used to protect the file. Select the modules whose data you want to restore. In most cases, this would be all of the modules listed.
  • Page 45: Drive Encryption For Hp Protecttools (Select Models Only)

    Drive Encryption for HP ProtectTools (select models only) CAUTION: If you decide to uninstall the Drive Encryption module, you must first decrypt all encrypted drives. If you do not, you will not be able to access the data on encrypted drives unless you have registered with the Drive Encryption recovery service.
  • Page 46: Setup Procedures

    Setup procedures Opening Drive Encryption Click Start, click All Programs, click HP, and then click HP ProtectTools Administrative Console. In the left pane, click Drive Encryption. Chapter 8 Drive Encryption for HP ProtectTools (select models only)
  • Page 47: General Tasks

    General tasks Activating Drive Encryption Use the HP ProtectTools Setup Wizard to activate Drive Encryption. NOTE: This wizard is also used to add and remove users. – or – Click Start, click All Programs, click HP, and then click HP ProtectTools Administrative Console.
  • Page 48: Protect Your Data By Encrypting Your Hard Drive

    NOTE: If the Windows administrator has enabled Pre-boot Security in the HP ProtectTools Security Manager, you will log on to the computer immediately after the computer is turned on, rather than at the Drive Encryption logon screen. Click your user name, and then type your Windows password or Java™ Card PIN, or swipe a registered finger.
  • Page 49: Advanced Tasks

    Advanced tasks Managing Drive Encryption (administrator task) The Encryption Management page allows administrators to view and change the status of Drive Encryption (active or inactive) and to view the encryption status of all of the hard drives on the computer. ●...
  • Page 50: Performing A Recovery

    CAUTION: Be sure to keep the storage device containing the backup key in a safe place, because if you forget your password or lose your Java Card, this device provides your only access to your hard drive. Open HP ProtectTools Administrative Console, click Drive Encryption, and then click Recovery.
  • Page 51: Privacy Manager For Hp Protecttools (Select Models Only)

    Privacy Manager for HP ProtectTools (select models only) Privacy Manager for HP ProtectTools enables you to use advanced security logon (authentication) methods to verify the source, integrity, and security of communication when using e-mail, Microsoft® Office documents, or instant messaging (IM). Privacy Manager leverages the security infrastructure provided by HP ProtectTools Security Manager, which includes the following security logon methods: ●...
  • Page 52: Setup Procedures

    Setup procedures Opening Privacy Manager To open Privacy Manager: Click Start, click All Programs, click HP, and then click HP ProtectTools Security Manager. Click Privacy Manager. – or – Right-click the HP ProtectTools icon in the notification area, at the far right of the taskbar, click Privacy Manager, and then click Configuration.
  • Page 53: Requesting A Privacy Manager Certificate

    Requesting a Privacy Manager Certificate Open Privacy Manager, and click Certificates. Click Request a Privacy Manager certificate. On the Welcome page, read the text, and then click Next. On the License Agreement page, read the license agreement. Be sure that the check box next to Check here to accept the terms of this license agreement is selected, and then click Next.
  • Page 54: Viewing Privacy Manager Certificate Details

    If you click Cancel, refer to for Adding a Trusted Contact on page 48 information on adding a Trusted Contact at a later time. Viewing Privacy Manager Certificate details Open Privacy Manager, and click Certificates. Click a Privacy Manager Certificate. Click Certificate details.
  • Page 55: Restoring A Privacy Manager Certificate

    Click Delete. When the confirmation dialog box opens, click Yes. Click Close, and then click Apply. Restoring a Privacy Manager Certificate During installation of your Privacy Manager certificate, you are required to create a backup copy of the certificate. You may also create a backup copy from the Migration page. This backup copy can be used when migrating to another computer or to restore a certificate to the same computer.
  • Page 56: Adding Trusted Contacts

    Trusted Contacts Manager allows you to perform the following tasks: ● View Trusted Contact details ● Delete Trusted Contacts ● Check revocation status for Trusted Contacts (advanced) Adding Trusted Contacts Adding Trusted Contacts is a 3-step process: You send an e-mail invitation to a Trusted Contact recipient. The Trusted Contact recipient responds to the e-mail.
  • Page 57: Adding Trusted Contacts Using Microsoft Outlook Contacts

    When you receive an e-mail response from a recipient accepting the invitation to become a Trusted Contact, click Accept in the lower-right corner of the e-mail. A dialog box opens, confirming that the recipient has been successfully added to your Trusted Contacts list.
  • Page 58: Deleting A Trusted Contact

    Deleting a Trusted Contact Open Privacy Manager, and click Trusted Contacts. Click the Trusted Contact you want to delete. Click Delete contact. When the confirmation dialog box opens, click Yes. Checking revocation status for a Trusted Contact To see if a Trusted Contact has revoked their Privacy Manager Certificate: Open Privacy Manager, and click Trusted Contacts.
  • Page 59: General Tasks

    General tasks You can use Privacy Manager with the following Microsoft products: ● Microsoft Outlook ● Microsoft Office ● Windows Live Messenger Using Privacy Manager in Microsoft Outlook When Privacy Manager in installed, a Privacy button is displayed on the Microsoft Outlook toolbar, and a Send Securely button is displayed on the toolbar of each Microsoft Outlook e-mail message.
  • Page 60: Sealing And Sending An E-Mail Message

    Click the down arrow next to Send Securely (Privacy in Outlook 2003), and then click Sign and Send. Authenticate using your chosen security logon method. Sealing and sending an e-mail message Sealed e-mail messages that are digitally signed and sealed (encrypted) can only be viewed by people you choose from your Trusted Contacts list.
  • Page 61: Configuring Privacy Manager For Microsoft Office

    Configuring Privacy Manager for Microsoft Office Open Privacy Manager, click Settings, and then click the Documents tab. – or – On the toolbar of a Microsoft Office document, click the down arrow next to Sign and Encrypt, and then click Settings. Select the actions you want to configure, and then click OK.
  • Page 62: Adding A Suggested Signer's Signature Line

    To add a suggested signer to a Microsoft Word or Microsoft Excel document: In Microsoft Word or Microsoft Excel, create and save a document. Click the Insert menu. In the Text group on the toolbar, click the arrow next to Signature Line, and then click Privacy Manager Signature Provider.
  • Page 63: Removing Encryption From A Microsoft Office Document

    NOTE: To select multiple Trusted Contact names, hold down the ctrl key and click the individual names. Click OK. If you later decide to edit the document, follow the steps in Removing encryption from a Microsoft Office document on page 55.
  • Page 64: Viewing An Encrypted Microsoft Office Document

    Viewing an encrypted Microsoft Office document To view an encrypted Microsoft Office document from another computer, Privacy Manager must be installed on that computer. In addition, you must restore the Privacy Manager Certificate that was used to encrypt the file. A Trusted Contact wanting to view an encrypted Microsoft Office document must have a Privacy Manager Certificate, and Privacy Manager must be installed on his or her computer.
  • Page 65: Configuring Privacy Manager For Windows Live Messenger

    – or – Right-click the ProtectTools icon in the notification area, click Privacy Manager for HP ProtectTools, and then select Start Chat. In Live Messenger, click Actions: Start an Activity, and then select Privacy Manager Chat. NOTE: Each user must be online in Live Messenger, and the users must be displayed in each other's Live Messenger online window.
  • Page 66: Viewing Chat History

    ● Send—Click this button to send an encrypted message to your contact. ● Send signed—Select this check box to electronically sign and encrypt your messages. Then, if the message is tampered with, it will be marked as invalid when the recipient receives it. You must authenticate each time you send a signed message.
  • Page 67: Reveal Sessions For A Specific Account

    Reveal sessions for a specific account Revealing a session displays the decrypted Contact Screen Name for the currently selected session. To reveal a specific chat history session: In the Live Messenger History Viewer, right-click any session, and then select Reveal Session. Authenticate using your chosen security logon method.
  • Page 68: Add Or Remove Columns

    Add or remove columns By default, the 3 most used columns are displayed in the Live Messenger History Viewer. You can add additional columns to the display, or you can remove columns from the display. To add columns to the display: Right-click on any column heading, and then select Add/Remove Columns.
  • Page 69: Advanced Tasks

    Advanced tasks Migrating Privacy Manager Certificates and Trusted Contacts to a different computer You can securely migrate your Privacy Manager Certificates and Trusted Contacts to another computer, or back up your data for safekeeping. To do this, back up the data as a password-protected file to a network location or any removable storage device, and then restore the file to the new computer.
  • Page 70: Central Administration Of Privacy Manager

    Central administration of Privacy Manager Your installation of Privacy Manager may be part of a centralized installation, that has been customized by your administrator. One or more of the following features may be either enabled or disabled: ● Certificate use policy—You may be restricted to the use of Privacy Manager certificates issued by Comodo, or you may be allowed to use digital certificates issued by other certificate authorities.
  • Page 71: 10 File Sanitizer For Hp Protecttools

    10 File Sanitizer for HP ProtectTools File Sanitizer is a tool that allows you to securely shred assets (personal information or files, historical or Web-related data, or other data components) on your computer and to periodically bleach your hard drive. NOTE: This version of File Sanitizer supports the system hard drive only.
  • Page 72: Shredding

    Shredding Shredding is different than a standard Windows® delete (also known as a simple delete in File Sanitizer) in that when you shred an asset using File Sanitizer, an algorithm that obscures the data is invoked, which makes it virtually impossible to retrieve the original asset. A Windows simple delete may leave the file (or asset) intact on the hard drive or in a state where forensic methods could be used to recover the file (or asset).
  • Page 73: Free Space Bleaching

    Free space bleaching Deleting an asset in Windows does not completely remove the contents of the asset from your hard drive. Windows only deletes the reference to the asset. The content of the asset still remains on the hard drive until another asset overwrites that same area on the hard drive with new information. Free space bleaching allows you to securely write random data over deleted assets, preventing users from viewing the original contents of the deleted asset.
  • Page 74: Setup Procedures

    Setup procedures Opening File Sanitizer To open File Sanitizer: Click Start, click All Programs, click HP, and then click HP ProtectTools Security Manager. Click File Sanitizer. – or – Double-click the File Sanitizer icon located on your desktop. ▲ – or – Right-click the HP ProtectTools icon in the notification area, at the far right of the taskbar, click ▲...
  • Page 75: Selecting Or Creating A Shred Profile

    To set a free space bleaching schedule: Open File Sanitizer, and click Free Space Bleaching. Select the Activate Scheduler check box, enter your Windows password, and then enter a day and time to bleach your hard drive. Click Apply, and then click OK. NOTE: The free space bleaching operation can take a long time.
  • Page 76: Customizing A Simple Delete Profile

    NOTE: To remove an asset from the available shred options, click the asset, and then click Delete. Under Shred the following, select the check box next to each asset that you want to confirm before shredding NOTE: To remove an asset from the shred list, click the asset, and then click Remove. To protect files or folders from automatic shredding, under Do not shred the following, click Add and then browse or type the path to the file name or folder.
  • Page 77: General Tasks

    General tasks You can use File Sanitizer to perform the following tasks: ● Use a key sequence to initiate shredding—This feature allows you to create a key sequence (for example, ctrl+alt+s) to initiate shredding. For details, refer to Using a key sequence to initiate shredding on page ●...
  • Page 78: Using The File Sanitizer Icon

    Using the File Sanitizer icon CAUTION: Shredded assets cannot be recovered. Carefully consider which items you select for manual shredding. Navigate to the document or folder you want to shred. Drag the asset to the File Sanitizer icon on the desktop. When the confirmation dialog box opens, click Yes.
  • Page 79: Manually Activating Free Space Bleaching

    Files that are successfully shredded or bleached do not appear in the log files. One log file is created for shred operations, and another log file is created for free space bleaching operations. Both log files are located on the hard drive at: ● C:\Program Files\Hewlett-Packard\File Sanitizer\[Username]_ShredderLog.txt ● C:\Program Files\Hewlett-Packard\File Sanitizer\[Username]_DiskBleachLog.txt General tasks...
  • Page 80: Device Access Manager For Hp Protecttools (Select Models Only)

    11 Device Access Manager for HP ProtectTools (select models only) Windows® operating system administrators use Device Access Manager for HP ProtectTools to control access to the devices on a system and to protect against unauthorized access: ● Device profiles are created for each user to define the devices that they are allowed or denied permission to access.
  • Page 81: Setup Procedures

    Setup Procedures Opening Device Access Manager To open Device Access Manager, follow these steps: Click Start, click All Programs, click HP, and then click HP ProtectTools Administrative Console. In the left pane, click Device Access Manager. Configuring device access Device Access Manager for HP ProtectTools offers three views: ●...
  • Page 82: Starting Background Service

    NOTE: In order to use this view to read device access information, the user or group must be granted "read" access in the User Access Settings view. In order to use this view to modify device access information, the user or group must be granted "change" access in the User Access Settings view. ●...
  • Page 83: Device Class Configuration

    Stopping the Device Locking/Auditing service does not stop the device locking. Two components enforce device locking: ● Device Locking/Auditing service ● DAMDrv.sys driver Starting the service starts the device driver, but stopping the service does not stop the driver. To determine whether the background service is running, open a command prompt window, and then type sc query flcdlock.
  • Page 84: Denying Access To A User Or Group

    The same user, the same group, or a member of the same group can be denied write access or read+write access only for the same device or a device below this device in the device hierarchy. Example 3—If a user or group is allowed read access for a device or class of devices: The same user, the same group, or a member of the same group can be denied read access or read+write access only for the same device or a device below this device in the device hierarchy.
  • Page 85: Allowing Access For A User Or A Group

    Allowing access for a user or a group To grant permission for a user or a group to access a device or a class of devices, follow these steps: In the left pane of HP ProtectTools Administrative Console, click Device Access Manager, and then click Device Class Configuration.
  • Page 86: Allowing Access To A Class Of Devices For One User Of A Group

    Allowing access to a class of devices for one user of a group To allow a user to access a class of devices while denying access to all other members of that user's group, follow these steps: In the left pane of HP ProtectTools Administrative Console, click Device Access Manager, and then click Device Class Configuration.
  • Page 87 To reset the configuration settings to the factory values, follow these steps: In the left pane of HP ProtectTools Administrative Console, click Device Access Manager, and then click Device Class Configuration. Click the Reset button. Click Yes to confirm. Click the Save icon. Setup Procedures...
  • Page 88: Advanced Tasks

    Advanced tasks Controlling access to the configuration settings In the User Access Settings view, administrators specify the groups or users who are allowed to use the Simple Configuration and the Device Class Configuration pages. NOTE: A user or group must have "Full User Administrator rights" in order to modify the settings in the User Access Settings view.
  • Page 89: Denying Access To An Existing Group Or User

    Denying access to an existing group or user To deny permission for an existing group or user to view or change the configuration settings, follow these steps: In the left pane of HP ProtectTools Administrative Console, click Device Access Manager, and then click User Access Settings.
  • Page 90: 12 Lojack Pro For Hp Protecttools

    12 LoJack Pro for HP ProtectTools Absolute Software’s line of Computrace products lets users track their HP computers and enhance data protection. The Computrace LoJack products also reduce machine loss and aid in recovery of stolen machines. To activate the Computrace product, follow these instructions: Click Start, click All Programs, and then click HP ProtectTools Security Manager.
  • Page 91: 13 Troubleshooting

    13 Troubleshooting HP ProtectTools Security Manager Short description Details Solution Smart cards and USB In order to use smart cards or USB Log on to Password Manager. tokens are not available in tokens in Security Manager, the In HP ProtectTools Security Manager, click Password Security Manager if supporting software (drivers, PKCS#11 Manager, click Credentials, and then click Smart Card...
  • Page 92 Short description Details Solution Password Manager does If the Single Sign On credentials for HP is researching a workaround for future product not recognize the Remote Desktop Connection (RDP) are enhancements. Connect button on set to Connect, when Single Sign On is screen.
  • Page 93: Device Access Manager For Hp Protecttools

    Device Access Manager for HP ProtectTools Users have been denied access to devices within Device Access Manager, but the devices are still accessible. ● Explanation—Simple Configuration and/or Device Class Configuration have been used within Device Access Manager to deny users access to devices. Despite being denied access, users can still access the devices.
  • Page 94 ◦ One workaround is to deny the Users group at the DVD/CD-ROM Drives level and to allow the Administrators group at the level below DVD/CD-ROM Drives. ◦ An alternate workaround is to create specific Windows groups, one for allowing access to DVD/CD and one for denying access to DVD/CD.
  • Page 95: Miscellaneous

    Miscellaneous Software Impacted— Details Solution Short description Security Manager— All security applications such as Java The Security Manager software must be installed Warning received: The Card Security and biometrics are before installing any security plug-in. security application can extendable plug-ins for the Security not be installed until the Manager interface.
  • Page 96: Glossary

    Glossary activation The task that must be completed before any of the Drive Encryption features are accessible. Drive Encryption is activated using the HP ProtectTools Setup Wizard. Only an administrator can activate Drive Encryption. The activation process consists of activating the software, encrypting the drive, creating a user account, and creating the initial backup encryption key on a removable storage device.
  • Page 97 dashboard A central location where you can access and manage the features and settings in Security Manager for HP ProtectTools. decryption Procedure used in cryptography to convert encrypted data into plain text. device access control policy The list of devices for which a user is allowed or denied access. device class All devices of a particular type, such as drives.
  • Page 98 key sequence A combination of specific keys that, when pressed, initiates an automatic shred—for example, ctrl+alt+s. Live Messenger History Viewer A Privacy Manager Chat component that allows you to search for and view encrypted chat history sessions. logon An object within Security Manager that consists of a user name and password (and possibly other selected information) that can be used to log on to Web sites or other programs.
  • Page 99 shred profile A specified erasure method and list of assets. Sign and Encrypt button A software button that is displayed on the toolbar of Microsoft Office applications. Clicking the button allows you to sign, encrypt, or removing encryption in a Microsoft Office document. signature line A placeholder for the visual display of a digital signature.
  • Page 100: Index

    Index chat history, viewing 58 defining aborting a shred or bleach chatting in the Communications which assets to confirm before operation 71 window 57 deleting 68 access configuration which assets to confirm before allowing 77 controlling access 80 shredding 68 controlling 72 device class 75 denying access 76...
  • Page 101 logging in after Drive Encryption HP ProtectTools features 2 Microsoft Word, adding a signature is activated 39 HP ProtectTools Security Manager line 53 managing Drive Encryption 41 Backup and Recovery opening 38 password 5 objectives, security 3 opening 24 opening setup procedures 26 e-mail message Device Access Manager for HP...
  • Page 102 Privacy Manager for HP selecting denying access 76 ProtectTools assets for shredding 67 removing 77 authentication methods 43 shred profile 67 using managing Privacy Manager setting HP ProtectTools Administrative certificates 44 free space bleaching Console 11 managing trusted contacts 47 schedule 66 migrating Privacy Manager shred schedule 66...

Table of Contents