beautypg.com

HP Compaq dc5750 Microtower-PC User Manual

Page 3

background image

Table of contents

1 Introduction to security

HP ProtectTools features ..................................................................................................................... 2
Accessing HP ProtectTools Security .................................................................................................... 3
Achieving key security objectives ......................................................................................................... 4

Protecting against targeted theft .......................................................................................... 4
Restricting access to sensitive data ..................................................................................... 4
Preventing unauthorized access from internal or external locations ................................... 4
Creating strong password policies ....................................................................................... 5

Additional security elements ................................................................................................................. 6

Assigning security roles ....................................................................................................... 6
Managing HP ProtectTools passwords ................................................................................ 6

Creating a secure password ............................................................................... 8

HP ProtectTools Backup and Restore ................................................................................. 8

Backing up credentials and settings .................................................................... 8
Restoring credentials .......................................................................................... 9
Configuring settings .......................................................................................... 10

2 Credential Manager for HP ProtectTools

Setup procedures ............................................................................................................................... 12

Logging on to Credential Manger ...................................................................................... 12

Using the Credential Manager Logon Wizard ................................................... 12
Logging on for the first time ............................................................................... 13

Registering credentials ...................................................................................................... 13

Registering fingerprints ..................................................................................... 13

Setting up the fingerprint reader ....................................................... 14
Using your registered fingerprint to log on to Windows .................... 14

Registering a Java Card, USB eToken, or virtual token .................................... 14
Registering a USB eToken ................................................................................ 14
Registering other credentials ............................................................................ 14

General tasks ..................................................................................................................................... 15

Creating a virtual token ...................................................................................................... 15
Changing the Windows logon password ............................................................................ 15
Changing a token PIN ........................................................................................................ 15
Managing identity ............................................................................................................... 16

Clearing an identity from the system ................................................................. 16

Locking the computer ........................................................................................................ 17
Using Windows Logon ....................................................................................................... 17

Logging on to Windows with Credential Manager ............................................. 17
Adding an account ............................................................................................ 17
Removing an account ....................................................................................... 18

Using Single Sign On ......................................................................................................... 18

Registering a new application ........................................................................... 18

Using automatic registration ............................................................. 18

ENWW

iii