beautypg.com

HP HP ProtectTools Security Software, Version 6.0 (User Guide) User Manual

Page 8

background image

Setting a shred schedule ................................................................................................... 44
Selecting or creating a shred profile .................................................................................. 44
Selecting a predefined shred profile .................................................................................. 44
Customizing an advanced security shred profile ............................................................... 45
Customizing a simple delete profile ................................................................................... 45

General tasks ..................................................................................................................................... 46

Using a key sequence to initiate shredding ....................................................................... 46
Using the File Sanitizer icon .............................................................................................. 46
Manually shredding one asset ........................................................................................... 47
Manually shredding all selected items ............................................................................... 47
Manually activating free space bleaching .......................................................................... 47
Aborting a shred or free space bleaching operation .......................................................... 48
Viewing the log files ........................................................................................................... 48

8 Embedded Security for HP ProtectTools .................................................................................................... 49

Setup procedures ............................................................................................................................... 49

Installing Embedded Security for HP ProtectTools (if necessary) ..................................... 49
Enabling the embedded security chip in Computer Setup ................................................. 49
Initializing the embedded security chip .............................................................................. 50
Setting up the basic user account ...................................................................................... 50

General tasks ..................................................................................................................................... 51

Using the Personal Secure Drive ....................................................................................... 51
Encrypting files and folders ................................................................................................ 51
Sending and receiving encrypted e-mail ............................................................................ 51

Advanced tasks .................................................................................................................................. 52

Backing up and restoring ................................................................................................... 52

Creating a backup file ....................................................................................... 52
Restoring certification data from the backup file ............................................... 52

Changing the owner password .......................................................................................... 52
Resetting a user password ................................................................................................ 52
Migrating keys with the Migration Wizard .......................................................................... 52

9 Device Access Manager for HP ProtectTools ............................................................................................ 53

Starting background service ............................................................................................................... 53
Simple configuration ........................................................................................................................... 53
Device class configuration (advanced) ............................................................................................... 54

Adding a user or a group ................................................................................................... 54
Removing a user or a group .............................................................................................. 54
Denying or allowing access to a user or group .................................................................. 54

Just In Time Authentication (JITA) Configuration ............................................................................... 54

Creating a JITA for a user or group ................................................................................... 55

viii

ENWW