Hp protecttools features – HP Pro 3120 Small Form Factor-PC User Manual
Page 10
HP ProtectTools features
The following table details the key features of HP ProtectTools for Small Business modules:
Module
Key features
HP ProtectTools Security Manager Administrative
Console
●
The Security Manager setup wizard is used by administrators to
set up and configure levels of security and security logon methods.
●
Configure options hidden from basic users.
●
Configure Device Access Manager configurations and user
access.
●
Administrator tools are used to add and remove HP ProtectTools
users and view user status.
HP ProtectTools Security Manager (for general
users)
●
Organize, set up and change user names and passwords.
●
Configure and change user credentials such as Windows
password and Smart Card.
●
Configure and change File Sanitizer Shred, Bleaching, and
Settings.
●
View settings for Device Access Manager.
●
Configure Preferences and Backup and Restore options.
Credential Manager for HP ProtectTools (Password
Manager)
●
Is designed to save, organize, and protect your user names and
passwords.
●
Allows you to set up the logon screens of websites and programs
for quick and secure access.
●
As you access various websites and you want to save your user
name and passwords, enter them into Password Manager so that
you won’t have to remember them again. The next time you visit
this site, Password Manager will fill in and submit the data
automatically.
●
Allows you to create stronger passwords that you don't have to
write down or remember, and keeps your accounts more secure.
Drive Encryption for HP ProtectTools
●
Provides complete, full-volume hard drive encryption.
●
Forces pre-boot authentication in order to decrypt and access the
data on the hard drive.
●
Helps you comply with legal or industry requirements for
protecting confidential and sensitive data.
●
Protects your data from unauthorized access by encrypting the
entire hard drive. If the PC is ever stolen and the drive is removed
from the original system and placed in a different system, the data
will not be compromised.
2
Chapter 1 Introduction to security
ENWW