beautypg.com

Hp protecttools features – HP Pro 3120 Small Form Factor-PC User Manual

Page 10

background image

HP ProtectTools features

The following table details the key features of HP ProtectTools for Small Business modules:

Module

Key features

HP ProtectTools Security Manager Administrative
Console

The Security Manager setup wizard is used by administrators to
set up and configure levels of security and security logon methods.

Configure options hidden from basic users.

Configure Device Access Manager configurations and user
access.

Administrator tools are used to add and remove HP ProtectTools
users and view user status.

HP ProtectTools Security Manager (for general
users)

Organize, set up and change user names and passwords.

Configure and change user credentials such as Windows
password and Smart Card.

Configure and change File Sanitizer Shred, Bleaching, and
Settings.

View settings for Device Access Manager.

Configure Preferences and Backup and Restore options.

Credential Manager for HP ProtectTools (Password
Manager)

Is designed to save, organize, and protect your user names and
passwords.

Allows you to set up the logon screens of websites and programs
for quick and secure access.

As you access various websites and you want to save your user
name and passwords, enter them into Password Manager so that
you won’t have to remember them again. The next time you visit
this site, Password Manager will fill in and submit the data
automatically.

Allows you to create stronger passwords that you don't have to
write down or remember, and keeps your accounts more secure.

Drive Encryption for HP ProtectTools

Provides complete, full-volume hard drive encryption.

Forces pre-boot authentication in order to decrypt and access the
data on the hard drive.

Helps you comply with legal or industry requirements for
protecting confidential and sensitive data.

Protects your data from unauthorized access by encrypting the
entire hard drive. If the PC is ever stolen and the drive is removed
from the original system and placed in a different system, the data
will not be compromised.

2

Chapter 1 Introduction to security

ENWW