HP Client Security Getting Started
Varnostno kopiranje in obnovitev (skrbniško opravilo) ...................................................... 34
Varnostno kopiranje ključev šifriranja ................................................................ 34
Obnavljanje dostopa do aktiviranega računalnika z varnostno kopiranimi
ključi .................................................................................................................. 35
Izvajanje obnovitve HP SpareKey ..................................................................................... 35
6 HP File Sanitizer (samo nekateri modeli) .................................................................................................... 37
Varno brisanje .................................................................................................................................... 37
Prepisovanje praznega prostora ........................................................................................................ 37
Odpiranje programa File Sanitizer ...................................................................................................... 38
Postopki nastavitve ............................................................................................................................ 38
Določanje urnika varnega brisanja .................................................................................... 39
Določanje urnika prepisovanja praznega prostora ............................................................ 40
Zaščita datotek pred varnim brisanjem .............................................................................. 40
Splošna opravila ................................................................................................................................. 40
Uporaba ikone File Sanitizer .............................................................................................. 41
Varno brisanje z desnim klikom ......................................................................................... 41
Ročni zagon operacije varnega brisanja ............................................................................ 41
Ročni zagon prepisovanja praznega prostora ................................................................... 42
Ogled dnevniških datotek .................................................................................................. 42
7 HP Device Access Manager (samo nekateri modeli) ................................................................................. 43
Odpiranje programa Device Access Manager .................................................................................... 44
Uporabniški pogled ............................................................................................................ 44
Sistemski pogled ................................................................................................................ 44
Konfiguracija JITA ............................................................................................. 45
Ustvarjanje pravilnika JITA za uporabnika ali skupino ..................... 46
Onemogočanje pravilnika JITA za uporabnika ali skupino ............... 46
Nastavitve ........................................................................................................................................... 46
Neupravljani razredi naprav ............................................................................................... 46
8 HP Trust Circles ............................................................................................................................................ 48
Odpiranje programa Trust Circles ...................................................................................................... 48
Začetek dela ....................................................................................................................................... 48
Trust Circles ....................................................................................................................................... 49
Dodajanje map v krog zaupanja ........................................................................................ 49
Dodajanje članov v krog zaupanja ..................................................................................... 50
Dodajanje datotek v krog zaupanja ................................................................................... 50
Šifrirane mape ................................................................................................................... 50
Odstranjevanje map iz kroga zaupanja ............................................................................. 51
v