8 Device Access Manager for HP ProtectTools (select models only) ......................................................... 79
Opening Device Access Manager ...................................................................................................... 80
Setup Procedures ............................................................................................................................... 81
Configuring device access ................................................................................................. 81
Simple Configuration ......................................................................................... 81
Starting the background service ....................................................... 82
Device Class Configuration ............................................................................... 82
Denying access to a user or group ................................................... 84
Allowing access for a user or a group .............................................. 84
Allowing access to a class of devices for one user of a group ......... 85
Allowing access to a specific device for one user of a group ........... 85
Removing settings for a user or a group .......................................... 86
Resetting the configuration ............................................................... 86
JITA Configuration ............................................................................................ 86
Creating a JITA for a user or group .................................................. 87
Creating an extendable JITA for a user or group ............................. 87
Disabling a JITA for a user or group ................................................. 88
Advanced Settings ............................................................................................................................. 89
Device Administrators group .............................................................................................. 89
eSATA Support .................................................................................................................. 90
Unmanaged Device Classes ............................................................................................. 90
9 Theft recovery ............................................................................................................................................... 92
10 Embedded Security for HP ProtectTools (select models only) .............................................................. 93
Setup procedures ............................................................................................................................... 94
Enabling the embedded security chip in Computer Setup ................................................. 94
Initializing the embedded security chip .............................................................................. 95
Setting up the basic user account ...................................................................................... 96
General tasks ..................................................................................................................................... 97
Using the personal secure drive ........................................................................................ 97
Encrypting files and folders ................................................................................................ 97
Sending and receiving encrypted e-mail ............................................................................ 97
Changing the Basic User Key password ........................................................................... 98
Advanced tasks .................................................................................................................................. 99
Backing up and restoring ................................................................................................... 99
Creating a backup file ....................................................................................... 99
Restoring certification data from the backup file ............................................... 99
Changing the owner password ........................................................................................ 100
Resetting a user password .............................................................................................. 100
vii
Komentarze do niniejszej Instrukcji