HP Client Security Getting Started
Varnostno kopiranje in obnovitev (skrbniško opravilo) ...................................................... 34
Varnostno kopiranje ključev šifriranja ................................................................ 34
Obnavljanje dostopa do aktiviranega računalnika z varnostno kopiranimi
ključi .................................................................................................................. 35
Izvajanje obnovitve HP SpareKey .....................................................................................  35
6 HP File Sanitizer (samo nekateri modeli) .................................................................................................... 37
Varno brisanje .................................................................................................................................... 37
Prepisovanje praznega prostora ........................................................................................................  37
Odpiranje programa File Sanitizer ...................................................................................................... 38
Postopki nastavitve ............................................................................................................................  38
Določanje urnika varnega brisanja ....................................................................................  39
Določanje urnika prepisovanja praznega prostora ............................................................  40
Zaščita datotek pred varnim brisanjem .............................................................................. 40
Splošna opravila ................................................................................................................................. 40
Uporaba ikone File Sanitizer .............................................................................................. 41
Varno brisanje z desnim klikom ......................................................................................... 41
Ročni zagon operacije varnega brisanja ............................................................................ 41
Ročni zagon prepisovanja praznega prostora ................................................................... 42
Ogled dnevniških datotek ..................................................................................................  42
7 HP Device Access Manager (samo nekateri modeli) ................................................................................. 43
Odpiranje programa Device Access Manager .................................................................................... 44
Uporabniški pogled ............................................................................................................ 44
Sistemski pogled ................................................................................................................ 44
Konfiguracija JITA ............................................................................................. 45
Ustvarjanje pravilnika JITA za uporabnika ali skupino .....................  46
Onemogočanje pravilnika JITA za uporabnika ali skupino ............... 46
Nastavitve ........................................................................................................................................... 46
Neupravljani razredi naprav ............................................................................................... 46
8 HP Trust Circles ............................................................................................................................................ 48
Odpiranje programa Trust Circles ...................................................................................................... 48
Začetek dela ....................................................................................................................................... 48
Trust Circles ....................................................................................................................................... 49
Dodajanje map v krog zaupanja ........................................................................................ 49
Dodajanje članov v krog zaupanja ..................................................................................... 50
Dodajanje datotek v krog zaupanja ...................................................................................  50
Šifrirane mape ...................................................................................................................  50
Odstranjevanje map iz kroga zaupanja .............................................................................  51
v










