HP Client Security Getting Started

Backing up encryption keys .............................................................................. 32
Recovering access to an activated computer using backup keys ..................... 32
Performing an HP SpareKey Recovery ............................................................................. 33
6 HP File Sanitizer (select models only) ........................................................................................................ 34
Shredding ........................................................................................................................................... 34
Free space bleaching ......................................................................................................................... 34
Opening File Sanitizer ........................................................................................................................ 35
Setup procedures ............................................................................................................................... 35
Setting a shred schedule ................................................................................................... 36
Setting a free space bleaching schedule ........................................................................... 36
Protecting files from shredding .......................................................................................... 37
General tasks ..................................................................................................................................... 37
Using the File Sanitizer icon .............................................................................................. 37
Right-click shredding ......................................................................................................... 38
Manually starting a shred operation ................................................................................... 38
Manually starting free space bleaching ............................................................................. 38
Viewing the log files ........................................................................................................... 39
7 HP Device Access Manager (select models only) ..................................................................................... 40
Opening Device Access Manager ...................................................................................................... 40
User view ........................................................................................................................... 41
System view ....................................................................................................................... 41
JITA configuration ............................................................................................. 42
Creating a JITA policy for a user or group ........................................ 42
Disabling a JITA policy for a user or group ....................................... 43
Settings .............................................................................................................................................. 43
Unmanaged device classes ............................................................................................... 43
8 HP Trust Circles ............................................................................................................................................ 45
Opening Trust Circles ......................................................................................................................... 45
Getting started .................................................................................................................................... 45
Trust Circles ....................................................................................................................................... 46
Adding folders to a trust circle ........................................................................................... 46
Adding members to a trust circle ....................................................................................... 46
Adding files to a trust circle ................................................................................................ 47
Encrypted folders ............................................................................................................... 47
Removing folders from a trust circle .................................................................................. 47
Removing a file from a trust circle ..................................................................................... 48
Removing members from a trust circle .............................................................................. 48
v