Table of contents
1 Introduction to security
HP ProtectTools features ..................................................................................................................... 2
Accessing HP ProtectTools Security .................................................................................................... 4
Achieving key security objectives ......................................................................................................... 5
Protecting against targeted theft .......................................................................................... 5
Restricting access to sensitive data ..................................................................................... 5
Preventing unauthorized access from internal or external locations ................................... 6
Creating and using strong passwords ................................................................................. 6
Additional security elements ................................................................................................................. 7
Assigning security roles ....................................................................................................... 7
Managing HP ProtectTools passwords ................................................................................ 7
Creating a secure password ............................................................................... 8
HP ProtectTools Backup and Restore ................................................................................. 9
Backing up credentials and settings .................................................................... 9
Restoring credentials ........................................................................................ 10
Configuring settings .......................................................................................... 10
2 Credential Manager for HP ProtectTools
Setup procedures ............................................................................................................................... 12
Logging on to Credential Manager .................................................................................... 12
Using the Credential Manager Logon Wizard ................................................... 12
Logging on for the first time ............................................................................... 12
Registering credentials ...................................................................................................... 12
Registering fingerprints ..................................................................................... 12
Setting up the fingerprint reader ....................................................... 13
Using your registered fingerprint to log on to Windows .................... 13
Registering a Java Card, USB eToken, or virtual token .................................... 13
Registering a USB eToken ................................................................................ 13
Registering other credentials ............................................................................ 13
General tasks ..................................................................................................................................... 14
Creating a virtual token ...................................................................................................... 14
Changing the Windows logon password ............................................................................ 14
Changing a token PIN ........................................................................................................ 14
Managing identity ............................................................................................................... 15
Clearing an identity from the system ................................................................. 15
Locking the computer ........................................................................................................ 15
Using Windows Logon ....................................................................................................... 15
Logging on to Windows with Credential Manager ............................................. 15
Adding an account ............................................................................................ 16
Removing an account ....................................................................................... 16
Using Single Sign On ......................................................................................................... 16
Registering a new application ........................................................................... 16
Using automatic registration ............................................................. 16
iii