Getting started with HP Client Security

加密或解密个别驱动器分区(仅软件加密) ...................................................... 28
磁盘管理 ............................................................................................................................ 28
备份和恢复(管理员任务) ................................................................................................ 28
备份加密密钥 ..................................................................................................... 28
使用备份密钥恢复访问激活的计算机 ................................................................. 29
执行 HP SpareKey 恢复 .................................................................................................. 29
6 HP File Sanitizer(仅限某些机型) ............................................................................................................ 30
碎化 .................................................................................................................................................... 30
可用空间清理 ...................................................................................................................................... 30
打开 File Sanitizer ............................................................................................................................. 30
设置步骤 ............................................................................................................................................. 31
设置碎化计划 ..................................................................................................................... 31
设置可用空间清理计划 ....................................................................................................... 32
保护文件以防止碎化 .......................................................................................................... 32
一般任务 ............................................................................................................................................. 33
使用 File Sanitizer 图标 ................................................................................................... 33
右击碎化 ............................................................................................................................ 33
手动开始碎化操作 .............................................................................................................. 33
手动开始可用空间清理 ....................................................................................................... 34
查看日志文件 ..................................................................................................................... 34
7 HP Device Access Manager(仅限某些机型) ........................................................................................ 35
打开 Device Access Manager .......................................................................................................... 35
用户视图 ............................................................................................................................ 35
系统视图 ............................................................................................................................ 36
JITA 配置 .......................................................................................................... 37
为用户或组创建 JITA 策略 .............................................................. 37
禁用用户或组的 JITA 策略 .............................................................. 37
设置 .................................................................................................................................................... 37
无管理的设备类别 .............................................................................................................. 37
8 HP Trust Circles ......................................................................................................................................... 39
打开 Trust Circles ............................................................................................................................. 39
使用入门 ............................................................................................................................................. 39
Trust Circles ...................................................................................................................................... 40
添加文件夹至信任圈 .......................................................................................................... 40
添加成员至信任圈 .............................................................................................................. 40
添加文件至信任圈 .............................................................................................................. 41
v