HP ProtectTools ackbone.net

[Pages:100]HP ProtectTools

Getting Started

? Copyright 2011 Hewlett-Packard Development Company, L.P.

Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Intel is a trademark of Intel Corporation in the U.S. and other countries and is used under license. Microsoft, Windows, and Windows Vista are U.S. registered trademarks of Microsoft Corporation.

The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.

First Edition: January 2011

Document Part Number: 638391-001

Table of contents

1 Introduction to security .................................................................................................................................. 1 HP ProtectTools features ..................................................................................................................... 2 HP ProtectTools security product description and common use examples ......................................... 4 Credential Manager for HP ProtectTools ............................................................................. 4 Drive Encryption for HP ProtectTools .................................................................................. 4 File Sanitizer for HP ProtectTools ........................................................................................ 5 Device Access Manager for HP ProtectTools ...................................................................... 5 Privacy Manager for HP ProtectTools ................................................................................. 6 Computrace for HP ProtectTools (formerly LoJack Pro) ..................................................... 6 Embedded Security for HP ProtectTools (select models only) ............................................ 6 Achieving key security objectives ......................................................................................................... 8 Protecting against targeted theft .......................................................................................... 8 Restricting access to sensitive data ..................................................................................... 8 Preventing unauthorized access from internal or external locations ................................... 8 Creating strong password policies ....................................................................................... 9 Additional security elements ............................................................................................................... 10 Assigning security roles ..................................................................................................... 10 Managing HP ProtectTools passwords .............................................................................. 10 Creating a secure password ............................................................................. 12 Backing up and restoring HP ProtectTools credentials ..................................... 12

2 Getting started with the Setup Wizard ........................................................................................................ 13

3 HP ProtectTools Security Manager Administrative Console .................................................................... 15 Opening HP ProtectTools Administrative Console ............................................................................. 16 Using Administrative Console ............................................................................................................ 17 Configuring your system ..................................................................................................................... 18 Setting up authentication for your computer ...................................................................... 18 Logon Policy ...................................................................................................... 18 Session Policy ................................................................................................... 19 Settings .............................................................................................................................. 19

iii

Managing users ................................................................................................................. 19 Credentials ......................................................................................................................... 20

SpareKey .......................................................................................................... 20 Fingerprints ....................................................................................................... 20 Smart card ......................................................................................................... 21 Face .................................................................................................................. 21 Configuring your applications ............................................................................................................. 22 General tab ........................................................................................................................ 22 Applications tab ................................................................................................................. 22 Central Management ......................................................................................................... 22

4 HP ProtectTools Security Manager ............................................................................................................. 23 Opening Security Manager ................................................................................................................. 24 Using the Security Manager dashboard ............................................................................................. 25 Security Applications Status ............................................................................................................... 26 My Logons .......................................................................................................................................... 27 Password Manager ............................................................................................................ 27 For Web pages or programs where a logon has not yet been created ............. 27 For Web pages or programs where a logon has already been created ............ 28 Adding logons ................................................................................................... 28 Editing logons .................................................................................................... 29 Using the Logons menu .................................................................................... 30 Organizing logons into categories ..................................................................... 30 Managing your logons ....................................................................................... 30 Assessing your password strength ................................................................... 31 Password Manager icon settings ...................................................................... 31 VeriSign Identity Protection (VIP) ...................................................................... 32 Settings ............................................................................................................. 33 Credential Manager ........................................................................................................... 33 Changing your Windows password ................................................................... 33 Setting up your SpareKey ................................................................................. 34 Enrolling your fingerprints ................................................................................. 34 Setting up a smart card ..................................................................................... 35 Initializing the smart card .................................................................. 35 Registering the smart card ............................................................... 35 Configuring the smart card ............................................................... 36 Enrolling scenes for face logon ......................................................................... 36 Advanced User Settings ................................................................... 37 Your personal ID card ........................................................................................................ 39 Setting your preferences .................................................................................................... 39 Backing up and restoring your data ................................................................................... 40

iv

5 Drive Encryption for HP ProtectTools (select models only) ..................................................................... 42 Opening Drive Encryption .................................................................................................................. 43 General tasks ..................................................................................................................................... 44 Activating Drive Encryption for standard hard drives ......................................................... 44 Activating Drive Encryption for self-encrypting drives ........................................................ 44 Deactivating Drive Encryption ............................................................................................ 46 Logging in after Drive Encryption is activated .................................................................... 46 Protect your data by encrypting your hard drive ................................................................ 48 Displaying encryption status .............................................................................................. 48 Advanced tasks .................................................................................................................................. 49 Managing Drive Encryption (administrator task) ................................................................ 49 Encrypting or decrypting individual drives (software encryption only) ............... 49 Backup and recovery (administrator task) ......................................................................... 50 Backing up encryption keys .............................................................................. 50 Recovering encryption keys .............................................................................. 50

6 Privacy Manager for HP ProtectTools (select models only) ..................................................................... 51 Opening Privacy Manager .................................................................................................................. 52 Setup procedures ............................................................................................................................... 53 Managing Privacy Manager Certificates ............................................................................ 53 Requesting a Privacy Manager Certificate ........................................................ 53 Obtaining a preassigned Corporate Privacy Manager Certificate ..................... 54 Setting up a Privacy Manager Certificate .......................................................... 54 Importing a third-party certificate ....................................................................... 54 Viewing Privacy Manager Certificate details ..................................................... 55 Renewing a Privacy Manager Certificate .......................................................... 55 Setting a default Privacy Manager Certificate ................................................... 55 Deleting a Privacy Manager Certificate ............................................................. 56 Restoring a Privacy Manager Certificate ........................................................... 56 Revoking your Privacy Manager Certificate ...................................................... 56 Managing Trusted Contacts ............................................................................................... 57 Adding Trusted Contacts ................................................................................... 57 Adding a Trusted Contact ................................................................. 57 Adding Trusted Contacts using Microsoft Outlook contacts ............. 58 Viewing Trusted Contact details ........................................................................ 59 Deleting a Trusted Contact ............................................................................... 59 Checking revocation status for a Trusted Contact ............................................ 59 General tasks ..................................................................................................................................... 60 Using Privacy Manager in Microsoft Outlook ..................................................................... 60 Configuring Privacy Manager for Microsoft Outlook .......................................... 60 Signing and sending an e-mail message .......................................................... 60

v

Sealing and sending an e-mail message .......................................................... 61 Viewing a sealed e-mail message ..................................................................... 61 Using Privacy Manager in a Microsoft Office 2007 document ........................................... 61 Configuring Privacy Manager for Microsoft Office ............................................. 62 Signing a Microsoft Office document ................................................................ 62 Adding a signature line when signing a Microsoft Word or Microsoft Excel document .......................................................................................................... 62

Adding suggested signers to a Microsoft Word or Microsoft Excel document .......................................................................................... 62 Adding a suggested signer's signature line ...................................... 63 Encrypting a Microsoft Office document ........................................................... 63 Removing encryption from a Microsoft Office document .................................. 64 Sending an encrypted Microsoft Office document ............................................ 64 Viewing a signed Microsoft Office document .................................................... 64 Viewing an encrypted Microsoft Office document ............................................. 65 Advanced tasks .................................................................................................................................. 66 Migrating Privacy Manager Certificates and Trusted Contacts to a different computer ..... 66 Backing up Privacy Manager Certificates and Trusted Contacts ...................... 66 Restoring Privacy Manager Certificates and Trusted Contacts ........................ 66 Central administration of Privacy Manager ........................................................................ 67

7 File Sanitizer for HP ProtectTools ............................................................................................................... 68 Shredding ........................................................................................................................................... 69 Free space bleaching ......................................................................................................................... 70 Opening File Sanitizer ........................................................................................................................ 71 Setup procedures ............................................................................................................................... 72 Setting a shred schedule ................................................................................................... 72 Setting a free space bleaching schedule ........................................................................... 72 Selecting or creating a shred profile .................................................................................. 73 Selecting a predefined shred profile .................................................................. 73 Customizing a shred profile ............................................................................... 73 Customizing a simple delete profile .................................................................. 74 General tasks ..................................................................................................................................... 76 Using a key sequence to initiate shredding ....................................................................... 76 Using the File Sanitizer icon .............................................................................................. 77 Manually shredding one asset ........................................................................................... 77 Manually shredding all selected items ............................................................................... 77 Manually activating free space bleaching .......................................................................... 78 Aborting a shred or free space bleaching operation .......................................................... 78 Viewing the log files ........................................................................................................... 78

vi

8 Device Access Manager for HP ProtectTools (select models only) ......................................................... 79 Opening Device Access Manager ...................................................................................................... 80 Setup Procedures ............................................................................................................................... 81 Configuring device access ................................................................................................. 81 Simple Configuration ......................................................................................... 81 Starting the background service ....................................................... 82 Device Class Configuration ............................................................................... 82 Denying access to a user or group ................................................... 84 Allowing access for a user or a group .............................................. 84 Allowing access to a class of devices for one user of a group ......... 85 Allowing access to a specific device for one user of a group ........... 85 Removing settings for a user or a group .......................................... 86 Resetting the configuration ............................................................... 86 JITA Configuration ............................................................................................ 86 Creating a JITA for a user or group .................................................. 87 Creating an extendable JITA for a user or group ............................. 87 Disabling a JITA for a user or group ................................................. 88 Advanced Settings ............................................................................................................................. 89 Device Administrators group .............................................................................................. 89 eSATA Support .................................................................................................................. 90 Unmanaged Device Classes ............................................................................................. 90

9 Theft recovery ............................................................................................................................................... 92

10 Embedded Security for HP ProtectTools (select models only) .............................................................. 93 Setup procedures ............................................................................................................................... 94 Enabling the embedded security chip in Computer Setup ................................................. 94 Initializing the embedded security chip .............................................................................. 95 Setting up the basic user account ...................................................................................... 96 General tasks ..................................................................................................................................... 97 Using the personal secure drive ........................................................................................ 97 Encrypting files and folders ................................................................................................ 97 Sending and receiving encrypted e-mail ............................................................................ 97 Changing the Basic User Key password ........................................................................... 98 Advanced tasks .................................................................................................................................. 99 Backing up and restoring ................................................................................................... 99 Creating a backup file ....................................................................................... 99 Restoring certification data from the backup file ............................................... 99 Changing the owner password ........................................................................................ 100 Resetting a user password .............................................................................................. 100

vii

Migrating keys with the Migration Wizard ........................................................................ 101 11 Localized password exceptions .............................................................................................................. 102

Windows IMEs not supported at the Preboot Security level or the HP Drive Encryption level ......... 102 Password changes using keyboard layout that is also supported .................................................... 103 Special key handling ........................................................................................................................ 104 What to do when a password is rejected .......................................................................................... 106 Glossary ........................................................................................................................................................... 107 Index ................................................................................................................................................................. 112

viii

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download