EasyManua.ls Logo

HP Compaq Elite 8200 AIO - Page 8

HP Compaq Elite 8200 AIO
74 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Setting a shred schedule ................................................................................................... 44
Selecting or creating a shred profile .................................................................................. 44
Selecting a predefined shred profile .................................................................................. 44
Customizing an advanced security shred profile ............................................................... 45
Customizing a simple delete profile ................................................................................... 45
General tasks ..................................................................................................................................... 46
Using a key sequence to initiate shredding ....................................................................... 46
Using the File Sanitizer icon .............................................................................................. 46
Manually shredding one asset ........................................................................................... 47
Manually shredding all selected items ............................................................................... 47
Manually activating free space bleaching .......................................................................... 47
Aborting a shred or free space bleaching operation .......................................................... 48
Viewing the log files ........................................................................................................... 48
8 Embedded Security for HP ProtectTools .................................................................................................... 49
Setup procedures ............................................................................................................................... 49
Installing Embedded Security for HP ProtectTools (if necessary) ..................................... 49
Enabling the embedded security chip in Computer Setup ................................................. 49
Initializing the embedded security chip .............................................................................. 50
Setting up the basic user account ...................................................................................... 50
General tasks ..................................................................................................................................... 51
Using the Personal Secure Drive ....................................................................................... 51
Encrypting files and folders ................................................................................................ 51
Sending and receiving encrypted e-mail ............................................................................ 51
Advanced tasks .................................................................................................................................. 52
Backing up and restoring ................................................................................................... 52
Creating a backup file ....................................................................................... 52
Restoring certification data from the backup file ............................................... 52
Changing the owner password .......................................................................................... 52
Resetting a user password ................................................................................................ 52
Migrating keys with the Migration Wizard .......................................................................... 52
9 Device Access Manager for HP ProtectTools ............................................................................................ 53
Starting background service ............................................................................................................... 53
Simple configuration ........................................................................................................................... 53
Device class configuration (advanced) ............................................................................................... 54
Adding a user or a group ................................................................................................... 54
Removing a user or a group .............................................................................................. 54
Denying or allowing access to a user or group .................................................................. 54
Just In Time Authentication (JITA) Configuration ............................................................................... 54
Creating a JITA for a user or group ................................................................................... 55
viii ENWW

Table of Contents

Related product manuals