beautypg.com

Creating strong password policies, Additional security elements, Assigning security roles – HP Pro 3120 Small Form Factor-PC User Manual

Page 26

background image

Preventing unauthorized access from internal or external locations

Unauthorized access to an unsecured business PC presents a very tangible risk to critical data such as
information from financial services, an executive, or R&D team, and to private information such as patient
records or personal financial records. The following features help prevent unauthorized access:

The pre-boot authentication feature, if enabled, helps prevent access to the operating system. See
the following chapters:

Credential Manager for HP ProtectTools (Password Manager) on page 34

Drive Encryption for HP ProtectTools on page 31

Credential Manager for HP ProtectTools helps ensure that an unauthorized user cannot get
passwords or access to password-protected applications. See the following chapter

Credential Manager for HP ProtectTools (Password Manager) on page 34

Device Access Manager for HP ProtectTools allows administrators to restrict access to writeable
devices so sensitive information cannot be copied from the hard drive. See the following chapter:

Device Access Manager for HP ProtectTools on page 44

File Sanitizer allows you to securely delete data by shredding critical files and folders or bleaching
the hard drive (write over data that has been previously deleted but is still present on the hard drive
in order to make recovery of the data more difficult). See the following chapter:

File Sanitizer for HP ProtectTools on page 38

Creating strong password policies

If you require the use of strong password policy (a complicated password that is difficult to hack) for
dozens of Web-based applications and databases, Credential Manager for HP ProtectTools provides a
protected repository for passwords and Single Sign On convenience. See the following chapter:

Credential Manager for HP ProtectTools (Password Manager) on page 34

Additional security elements

Assigning security roles

To properly protect the data, one important practice is to divide responsibilities and rights among various
types of administrators and users.

NOTE:

In a small organization or for individual use, these roles may all be held by the same person.

For HP ProtectTools for Small Business, the security duties and privileges can be divided into the
following roles:

Administrator—Applies and manages the security features. Can also enable and disable some
features.

User—Uses the security features.

18

Chapter 3 Benefits of HP ProtectTools for Small Business

ENWW