HP ProtectTools security software 2011 - Technical white paper
you want shredded automatically, and define the schedules. This level of control is available in File 
Sanitizer settings (Figure 12), where security levels can be selected as well custom control over types 
of information to erase (i.e. cookies, temporary files, etc.). File Sanitizer can then be set up to erase 
the predefined files based on events such as Windows shutdown. 
Figure 12. HP ProtectTools File Sanitizer setup menu 
File sanitization is more intensive process than simple file deletion. The amount of time it takes to 
delete a file or a group of files is directly related to their size. File Sanitizer is therefore not a 
replacement for simple file deletion; it is instead meant to complement it. Free Space Bleaching can 
also be set up to bleach the hard drive at a predetermined schedule. 
Computrace® LoJack Pro for HP ProtectTools 
Computrace LoJack Pro, powered by Absolute Software (purchased separately), addresses the 
growing problem of computers that are lost or stolen. Activating this software enables the Computrace 
agent, which remains active in your computer even if the hard drive is reformatted or replaced. LoJack 
Pro permits remote monitoring, management, and tracking of your computer. Absolute’s recovery 
team will assist in your computer’s recovery if it is lost or stolen, depending on geographic location. 
Privacy Manager for HP ProtectTools 
Privacy Manager for HP ProtectTools allows you to secure the documents and emails you create within 
Microsoft Office applications. With Privacy Manager you can be sure that only those friends, clients 
or colleagues you select will be able to open and read a given document or email. Your recipients 
can be certain that such files were created by you, and never modified by anyone else, since Privacy 
Manager leverages the strong, multifactor user authentication provided by HP ProtectTools. The result 
is that you can now take control of the information you create and communicate to ensure its privacy, 
security, and integrity, not just on your local computer, but wherever it may ultimately be transmitted 
or stored. Identity assurance and access control of electronic transactions and communications is 
increasingly required to comply with regulations in finance, law and healthcare applications. 










