HP Compaq dc7900 Small Form Factor PC User Manual
Page 5

Table of contents
HP ProtectTools features ..................................................................................................................... 2
Accessing HP ProtectTools Security .................................................................................................... 4
Achieving key security objectives ......................................................................................................... 4
Protecting against targeted theft .......................................................................................... 5
Restricting access to sensitive data ..................................................................................... 5
Preventing unauthorized access from internal or external locations ................................... 5
Creating strong password policies ....................................................................................... 6
2 HP ProtectTools Security Manager for Administrators
About HP ProtectTools Security Manager for Administrators ............................................................ 10
Getting Started - Configuring HP ProtectTools Security Manager for Administrators ........................ 11
Getting Started - Configuring user security login methods ................................................................. 13
Logging in after Security Manager is configured ................................................................................ 14
Administrator Tools - Managing users (administrator task) ................................................................ 15
Adding a user ..................................................................................................................... 15
Removing a user ................................................................................................................ 15
Checking user status ......................................................................................................... 16
Backup and Restore ........................................................................................................................... 16
Using the Backup wizard .................................................................................................................... 17
Security Modules ............................................................................................................... 17
File Location ...................................................................................................................... 17
Backup Complete .............................................................................................................. 18
File Location ...................................................................................................................... 18
Security Modules ............................................................................................................... 18
Confirmation ...................................................................................................................... 19
Restore Complete .............................................................................................................. 19
ENWW
v