HP Client Security Getting Started

Sigurnosno kopiranje ključeva za šifriranje ....................................................... 33
Oporavak pristupa uključenom računalu pomoću ključeva sigurnosne kopije . . 34
Obavljanje oporavka uslužnog programa HP SpareKey ................................................... 34
6 HP File Sanitizer (samo odabrani modeli) .................................................................................................. 36
Trajno brisanje .................................................................................................................................... 36
Čćenje praznog prostora ................................................................................................................. 36
Otvaranje programa File Sanitizer ...................................................................................................... 37
Postupci postavljanja .......................................................................................................................... 37
Postavljanje rasporeda trajnog brisanja ............................................................................. 38
Postavljanje rasporeda za čćenje praznog prostora ....................................................... 39
Zaštita datoteka od trajnog brisanja ................................................................................... 39
Opći zadaci ......................................................................................................................................... 39
Upotreba ikone programa File Sanitizer ............................................................................ 40
Trajno brisanje desnim klikom ........................................................................................... 40
Ručno pokretanje postupka trajnog brisanja ..................................................................... 40
Ručno pokretanje čćenja praznog prostora .................................................................... 41
Prikaz datoteka zapisnika .................................................................................................. 41
7 HP Device Access Manager (samo odabrani modeli) ............................................................................... 42
Otvaranje softvera Device Access Manager ...................................................................................... 42
Prikaz korisnika .................................................................................................................. 43
Prikaz sustava ................................................................................................................... 43
Konfiguracija opcije JITA ................................................................................... 44
Stvaranje JITA pravila za korisnika ili grupu ..................................... 44
Onemogućavanje JITA pravila za korisnika ili grupu ........................ 45
Postavke ............................................................................................................................................. 45
Neupravljane klase uređaja ............................................................................................... 45
8 HP Trust Circles ............................................................................................................................................ 47
Otvaranje aplikacije Trust Circles ....................................................................................................... 47
Početak rada ...................................................................................................................................... 47
Trust Circles ....................................................................................................................................... 48
Dodavanje mapa u krug povjerenja ................................................................................... 48
Dodavanje članova u krug povjerenja ................................................................................ 49
Dodavanje datoteka u krug povjerenja .............................................................................. 49
Šifrirane mape ................................................................................................................... 49
Uklanjanje mapa iz kruga povjerenja ................................................................................. 50
Uklanjanje datoteke iz kruga povjerenja ............................................................................ 50
Uklanjanje članova iz kruga povjerenja ............................................................................. 50
v