Troubleshooting. HP ProBook 4510s Notebook PC, Compaq 6735s Notebook PC, Compaq 615 Notebook PC, EliteBook 8730w Mobile Workstation, Compaq 610 Notebook PC, EliteBook 6930p Notebook PC, EliteBook 8730w Base Model Mobile Workstation, Compaq 6530b Notebook PC, 550 Notebook PC, EliteBook 8530w Mobile Workstation
Add to my manuals
106 Pages
advertisement
9 Troubleshooting
Credential Manager for HP ProtectTools
Short description Details Solution
Using the Credential
Manager Network
Accounts option, a user can select which domain account to log on to. When
TPM authentication is used, this option is not available. All other authentication methods work properly.
Using TPM authentication, the user is only logged on to the local computer.
Using Credential Manager Single Sign On tools allows the user to authenticate other accounts.
Smart cards and USB tokens are not available in
Credential Manager if installed after the
Credential Manager installation.
In order to use smart cards or USB tokens in Credential Manager, the supporting software (drivers, PKCS#11 providers, etc.) must be installed prior to
Credential Manager installation.
Log on to Credential Manager.
In HP ProtectTools Security Manager, click Credential
Manager, click Advanced Settings, and then click the
Smart Cards and Tokens tab. A list of available tokens is displayed under Local Tokens.
If you already have the Credential
Manager installed do the following steps after installing smart card or token supporting software:
Access a popup menu by right-clicking the Local
Tokens node, and then select Scan for New Smart
Cards and Tokens.
Restart your computer if prompted.
Some application Web pages create errors that prevent the user from performing or completing tasks.
Some Web-based applications stop functioning and report errors due to the disabling functionality pattern of Single
Sign On. For example, an ! in a yellow triangle is observed in Internet Explorer, indicating an error has occurred.
Credential Manager Single Sign On does not support all software Web interfaces. Disable Single Sign On support for the specific Web page by turning off Single
Sign On support. See complete documentation on
Single Sign On, which is available in the Credential
Manager software Help files.
The option to Browse for
Virtual Token is not displayed during the logon process.
The user cannot move the location of a registered virtual token in Credential
Manager because the option to browse was removed to reduce security risks.
Domain administrators cannot change Windows password even with authorization.
This happens after a domain administrator logs on to a domain and registers the domain identity with
Credential Manager using an account with Administrator's rights on the domain and the local PC. When the domain administrator attempts to change the
If a specific Single Sign On cannot be disabled for a given application, call HP technical support and request
3rd-level support through your HP Service contact.
The browse option was removed because it allowed non-users to delete and rename files and take control of Windows.
Credential Manager cannot change a domain user's account password through Change Windows
password. Credential Manager can only change the local PC account passwords. The domain user can change his/her password through the Change
password option of Windows security, but since the domain user does not have a physical account on the
Credential Manager for HP ProtectTools 79
Short description Details Solution
Users can lose all
Credential Manager credentials protected by the TPM.
Windows password from Credential
Manager, the administrator gets an error logon failure: User account restriction.
local PC, Credential Manager can only change the password used to log on.
Credential Manager has incompatibility issues with
Corel WordPerfect 12 password GINA.
If the user logs on to Credential Manager, creates a document in WordPerfect, and saves with password protection,
Credential Manager cannot detect or recognize, either manually or automatically, the password GINA.
HP is researching a workaround for future product enhancements.
Credential Manager does not recognize the
Connect button on screen.
If the Single Sign On credentials for
Remote Desktop Connection (RDP) are set to Connect, when Single Sign On is relaunched, it always enters Save As instead of Connect.
If the TPM module is removed or damaged, users lose all credentials protected by the TPM.
HP is researching a workaround for future product enhancements.
This is as designed.
The TPM Module is designed to protect the Credential
Manager credentials. HP recommends that the user back up their identity from Credential Manager prior to removing the TPM module.
The user is unable to log on to Credential Manager after transitioning from sleep mode to hibernation on Windows XP Service
Pack 1 only.
After allowing system to transition into hibernation and sleep mode, the
Administrator or user is unable to log on to Credential Manager and the Windows logon screen remains displayed no matter which logon credential
(password, fingerprint, or Java Card) is selected.
Update Windows to Service Pack 2 via Windows
Update. Refer to Microsoft knowledge base article
813301 at http://www.microsoft.com
for more information on the cause of the issue.
In order to log on, the user must select Credential
Manager and log on. After logging on to Credential
Manager, the user is prompted to log on to Windows
(the user may have to select the Windows logon option) to complete the logon process.
Restoring Embedded
Security causes
Credential Manager to fail.
Credential Manager fails to register any credentials after the ROM is restored to factory settings.
If the user logs on to Windows first, then the user must manually log on to Credential Manager.
Credential Manager fails to access the TPM if the ROM is reset to factory settings after installing Credential
Manager.
The TPM embedded security chip can be enabled using the f10 Computer Setup utility, BIOS Configuration, or
HP Client Manager. To enable the TPM embedded security chip using Computer Setup, follow these steps:
1.
Open Computer Setup by turning on or restarting the computer, and then pressing f10 while the f10
= ROM Based Setup message is displayed in the lower-left corner of the screen.
2.
Use the arrow keys to click Security, and then clickSetup Password. Set a password.
3.
Select Embedded Security Device.
4.
Use the arrow keys to select Embedded Security
Device—Disable. Use the arrow keys to change it to Embedded Security Device—Enable.
5.
Click Enable, and then click Save changes and
exit.
80 Chapter 9 Troubleshooting
Short description
The security Restore
Identity process loses association with virtual token.
Details Solution
HP is investigating resolution options for future customer software releases.
When user restores identity, Credential
Manager can lose the association with the location of the virtual token at logon screen. Even though Credential
Manager has the virtual token registered, the user must reregister the token to restore the association.
This is currently by design.
When uninstalling Credential Manager without keeping identities, the system (server) part of the token is destroyed, so the token cannot be used anymore for logging on, even if the client part of the token is restored through identity restore.
HP is investigating long-term options for resolution.
Credential Manager for HP ProtectTools 81
Embedded Security for HP ProtectTools (select models only)
Short description Details Solution
Encrypting folders, subfolders, and files on
PSD causes an error message.
Cannot Take Ownership
With Another OS In
MultiBoot Platform.
If the user copies files and folders to the
PSD and tries to encrypt folders/files or folders/subfolders, the Error Applying
Attributes message is displayed. The user can encrypt the same files on the C:
\ drive or an extra installed hard drive.
This is as designed.
Moving files/folders to the PSD automatically encrypts them. There is no need to “double-encrypt” the files/ folders. Attempting to double-encrypt them on the PSD using EFS produces this error message.
If a drive is set up for multiple OS boot, ownership can only be taken with the platform initialization wizard in one operating system.
This is as designed, for security reasons.
An unauthorized administrator can view, delete, rename, or move the contents of encrypted
EFS folders.
The user has no encrypt options when attempting to restore the hard drive using FAT32.
Encrypting a folder does not stop an unauthorized user with administrative rights to view, delete, or move contents of the folder.
This is as designed.
It is a feature of EFS, not the Embedded Security TPM.
Embedded Security uses Microsoft EFS software, and
EFS preserves file/folder access rights for all administrators.
If the user attempts to restore the hard drive using FAT32, there will be no encrypt options for any files/folders using
EFS.
This is as designed. Software should not be installed on a restore with a FAT32 partition.
Microsoft EFS is supported only on NTFS and does not function on FAT32. This is a feature of Microsoft EFS and is not related to HP ProtectTools software.
The user is able to encrypt or delete the recovery archive XML file.
By design, the ACLs for this folder are not set; therefore, a user can inadvertently or purposely encrypt or delete the file, thus making it inaccessible. After this file has been encrypted or deleted, no one can use the TPM software.
This is as designed.
Users have access rights to an emergency archive so that they can save/update their Basic User Key backup copy. Users should be instructed never to encrypt or delete the recovery archive files.
Embedded Security EFS interaction with Symantec
Antivirus or McAfee Total
Protection produces longer encryption/ decryption and scan times.
Encrypted files interfere with Symantec
Antivirus or McAfee Total Protection virus scan. Encrypting files using
Embedded Security EFS takes longer when Symantec Antivirus or McAfee
Total Protection is running.
To reduce the time required to scan Embedded
Security EFS files, the user can either type the encryption password before scanning or decrypt before scanning.
To reduce the time required to encrypt/decrypt data using Embedded Security EFS, the user should disable
Auto-Protect on Symantec Antivirus or McAfee Total
Protection.
The emergency recovery archive cannot be saved to removable media.
If the user inserts a MultiMediaCard or
Secure Digital (SD) Memory Card when creating the emergency recovery archive path during Embedded Security initialization, an error message is displayed.
This is as designed.
Storage of the recovery archive on removable media is not supported. The recovery archive can be stored on a network drive or on another local drive other than the
C drive.
82 Chapter 9 Troubleshooting
Short description Details Solution
Errors occur after a power loss interrupts Embedded
Security initialization.
If there is a power loss during the initialization of the Embedded Security chip, the following issues occur:
Perform the following procedure to recover from the power loss:
●
When attempting to launch the
Embedded Security Initialization
Wizard, the following error message is displayed: The
Embedded security cannot be initialized since the Embedded
Security chip already has an
Embedded Security owner.
NOTE:
Use the arrow keys to select various menus, menu items, and to change values (unless otherwise specified).
1.
2.
Start or restart the computer.
Press f10 when the f10=Setup message appears on the screen.
3.
Select the appropriate language option.
● When attempting to launch the User
Initialization Wizard, the following error message is displayed: The
Embedded security is not initialized. To use the wizard, the
Embedded Security must be initialized first.
4.
Press enter .
5.
Select Security, and then click Embedded
Security.
6.
Set the Embedded Security Device option to
Enable.
7.
Press f10 to accept the change.
8.
Select File, and then click Save Changes and
Exit.
9.
Press enter .
10.
Press f10 to save the changes and exit the utility.
The Computer Setup
(f10) Utility password can be removed after enabling the TPM Module.
Enabling the TPM module requires a
Computer Setup (f10) Utility password.
When the module has been enabled, the user can remove the password. This allows anyone with direct access to the system to reset the TPM module and cause possible loss of data.
This is as designed.
The Computer Setup (f10) Utility password can only be removed by a user who knows the password. However,
HP strongly recommends having the Computer Setup
(f10) Utility password protected at all times.
The PSD password box is no longer displayed when the system becomes active after standby status
When a user logs on to the system after creating a PSD, the TPM asks for the
Basic User password. If the user does not type the password and the system initiates Standby, the password dialog box is no longer available when the user resumes.
This is by design.
The user has to log off and back on to view the PSD password box again.
No password is required to change the Security
Platform Policies.
Access to Security Platform Policies
(both Machine and User) does not require a TPM password for users who have administrative rights on the system.
This is by design.
Any administrator can modify the Security Platform
Policies with or without TPM user initialization.
When a certificate is viewed, it shows as nontrusted.
After setting up HP ProtectTools and running the User Initialization Wizard, the user has the ability to view the certificate issued; however, when the certificate is viewed, it shows as non-trusted. While the certificate can be installed at this point by clicking the install button, installing it does not make it trusted.
Self-signed certificates are not trusted. In a properly configured enterprise environment, EFS certificates are issued by online Certification Authorities and are trusted.
Embedded Security for HP ProtectTools (select models only) 83
Short description Details Solution
An intermittent encrypt and decrypt error occurs:
The process cannot access the file because it is being used by another process.
This is an extremely intermittent error during file encryption or decryption which occurs because the file is being used by another process, even though that file or folder is not being processed by the operating system or other applications.
To resolve the failure:
1.
Restart the system.
2.
Log off.
3.
Log back on.
Data loss in removable storage occurs if the storage media is removed prior to completing the new data generation or transfer.
Removing storage media such as a
MultiBay hard drive still shows PSD availability and does not generate errors while adding/modifying data to the PSD.
After the system is restarted, the PSD does not reflect file changes that occurred while the removable storage was unavailable.
Do not remove a PSD before data generation or transfer is complete. This issue is only experienced if the user accesses the PSD, then removes the hard drive before completing new data generation or transfer. If the user attempts to access the PSD when the removable hard drive is not present, an error message is displayed stating that the device is not
ready.
During uninstall, if the user has not initialized the
Basic User and opens the
Administration tool, the
Disable option is not available and Uninstaller will not continue until the
Administration tool is closed.
The user has the option of uninstalling either without disabling the TPM or by first disabling the TPM (through the
Administration tool), and then uninstalling. Accessing the
Administration tool requires Basic User
Key initialization. If basic initialization has not occurred, all options are inaccessible to the user.
The Administration tool is used for disabling the TPM chip, but that option is not available unless the Basic
User Key has already been initialized. If it has not been initialized, select OK or Cancel to continue with the uninstallation.
Since the user has explicitly chosen to open the Administration tool (by clicking
Yes in the dialog box prompting Click
Yes to open Embedded Security
Administration tool), uninstall waits until the Administration tool is closed. If the user clicks No in that dialog box, the
Administration tool does not open at all and uninstall proceeds.
Intermittent system lockup occurs after creating PSD on 2-user accounts and using fast-user-switching in 128-MB system configurations.
The system may lock up with a black screen and nonresponding keyboard and mouse instead of showing welcome
(logon) screen when using fast-switching with minimal RAM.
The root cause is suspected to be a timing issue in low memory configurations.
Integrated graphics uses UMA architecture taking 8 MB of memory, which leaves only 120 MB available to the user. The error is generated when this 120 MB is shared by both users who are logged on and are fast-userswitching.
EFS User Authentication
(password request) times out with access denied.
Minor truncation during setup of Japanese is observed in functional descriptions.
EFS Encryption works without a password being typed in the prompt.
The EFS User Authentication password reopens after the user clicks OK or the system exits Standby.
Functional descriptions during custom setup option during installation wizard are truncated.
By allowing the prompt for User password to time out, encryption is still available on a file or folder.
The workaround is to reboot the system and increase memory configuration (HP does not ship 128-MB configurations with security modules).
This is by design—to avoid issues with Microsoft EFS, a 30-second watchdog timer was created to generate the error message).
HP will correct this in a future release.
The ability to encrypt does not require password authentication, since this is a feature of the Microsoft
EFS encryption. Decryption will require the user password to be supplied.
84 Chapter 9 Troubleshooting
Short description Details Solution
Secure e-mail is supported, even when secure e-mail is not specified in the User
Initialization Wizard or when secure e-mail configuration is disabled in user policies.
Embedded security software and the wizard do not control settings of an email client (Outlook, Outlook Express, or
Netscape).
This behavior is as designed. Configuration of TPM email settings does not prohibit editing encryption settings directly in an e-mail client. Usage of secure email is set and controlled by 3rd-party applications. The
HP wizard allows linkage to the three reference applications for immediate customization.
Running Large Scale
Deployment a second time on the same PC or on a previously initialized PC overwrites Emergency
Recovery and Emergency
Token files. The new files are useless for recovery.
Running Large Scale Deployment on any previously initialized HP ProtectTools
Embedded Security system renders existing Recovery Archives and
Recovery Tokens useless by overwriting those XML files.
HP is working to resolve the XML-file-overwrite issue and will provide a solution in a future SoftPaq.
Automated logon scripts do not function during user restore in Embedded
Security.
The error occurs after the user performs the following actions:
● Initializes owner and user in
Embedded Security (using the default locations—My
Documents).
Click the Browse button on the screen to select the location, and the restore process proceeds.
●
Resets the chip to factory settings in the BIOS.
● Reboots the computer.
●
Begins to restore Embedded
Security. During the restore process, Credential Manager asks if the system can automate the logon to Infineon TPM User
Authentication. If the user selects
Yes, the location of
SPEmRecToken is automatically displayed in the text box.
Multiple-User PSDs do not function in a fast-userswitching environment.
This error occurs when multiple users have been created and given a PSD with the same drive letter. If an attempt is made to fast-user-switch between users when the PSD is loaded, the second user's PSD is unavailable.
The second user's PSD will be available only if it is reconfigured to use another drive letter or if the first user is logged off.
The PSD is disabled and cannot be deleted after formatting the hard drive on which the PSD was generated.
Even though this location is correct, the following error message is displayed: No
Emergency Recovery Token is provided. Select the token location the Emergency Recovery Token should be retrieved from.
The PSD icon is still visible, but the error message drive is not accessible is displayed when the user attempts to access the PSD.
The user is not able to delete the PSD and the following message is displayed:
your PSD is still in use, please be sure that your PSD contains no open files
As designed: If a customer force-deletes or disconnects from the storage location of the PSD data, the
Embedded Security PSD drive emulation continues to function and will produce errors based on lack of communication with the missing data.
Resolution: After the next reboot, the emulations fail to load and user can delete the old PSD emulation and create a new PSD.
Embedded Security for HP ProtectTools (select models only) 85
Short description Details Solution and is not accessed by another
process. The user must reboot the system in order to delete the PSD and it is not loaded after reboot.
An internal error is detected when the user is restoring from the
Automatic Backup
Archive.
In Embedded Security, if the user clicks the Restore under Backup option to restore from the automatic backup
Archive and then selects
SPSystemBackup.xml, the Restore
Wizard fails and the following error message is displayed: The selected
Backup Archive does not match the restore reason. Please select another archive and continue.
If the user selects SpSystemBackup.xml when the
SpBackupArchive.xml is required, the Embedded
Security Wizard fails and displays the following message: An internal Embedded Security error has
been detected.
The user must select the correct XML file to match the required reason.
The processes are working as designed and function properly; however, the internal Embedded Security error message is not clear and should state a more appropriate message. HP is working to enhance this in future products.
The security system exhibits a restore error with multiple users.
During the restore process, if the administrator selects users to restore, the users not selected are not able to restore the keys when trying to restore at a later time. A decryption process
failed error message is displayed.
The non-selected users can be restored by resetting the TPM, running the restore process, and selecting all users before the next default daily backup runs. If the automated backup runs, it overwrites the non-restored users and their data is lost. If a new system backup is stored, the previous unselected users cannot be restored.
Also, the user must restore the entire system backup.
An Archive Backup can be restored individually.
Resetting System ROM to default hides the TPM.
Resetting the system ROM to default hides the TPM to Windows. This does not allow the security software to operate properly and makes TPM-encrypted data inaccessible.
Unhide the TPM in BIOS:
Open the Computer Setup (f10) Utility, navigate to
Security > Device security, and then modify the field from Hidden to Available.
86 Chapter 9 Troubleshooting
Short description Details Solution
Automatic backup does not work with the mapped drive.
When an administrator sets up
Automatic Backup in Embedded
Security, it creates an entry in
Windows > Tasks > Scheduled Task.
This Windows Scheduled Task is set to use NT AUTHORITY\SYSTEM for rights to execute the backup. This works properly to any local drive.
The workaround is to change the NT AUTHORITY
\SYSTEM to (computer name)\(admin name). This is the default setting if the Scheduled Task is created manually.
HP is working to provide future product releases with default settings that include computer name\admin name.
When the administrator instead configures the Automatic Backup to save to a mapped drive, the process fails because the NT AUTHORITY\SYSTEM does not have the rights to use the mapped drive.
If the Automatic Backup is scheduled to occur upon logon, Embedded Security
TNA Icon displays the following message: The Backup Archive
location is currently not accessible.
Click here if you want to backup to a temporary archive until the Backup
Archive is accessible again. If the
Automatic Backup is scheduled for a specific time, however, the backup fails without displaying notice of the failure.
Embedded Security cannot be temporarily disabled in the Embedded
Security GUI.
The current 4.0 software was designed for HP Notebook 1.1B implementations, as well as supporting HP Desktop 1.2
implementations.
HP will address this issue in future releases.
This option to disable is still supported in the software interface for TPM 1.1
platforms.
Embedded Security for HP ProtectTools (select models only) 87
Device Access Manager for HP ProtectTools
Short description Details Solution
Users have been denied access to devices within
Device Access Manager, but the devices are still accessible.
A user has unexpected access to a device or a user is unexpectedly denied access to a device.
Device Access Manager has been used to deny users access to some devices and allow users access to other devices.
When the user is using the system, they can access devices they believe Device
Access Manager has denied and are denied access to devices they believe
Device Access Manager should allow.
The Device Class Configuration within Device Access
Manager should be used to investigate the Users device settings.
Click Security Manager, click Device Access
Manager, and then click Device Class
Configuration. Expand the levels in the Device Class tree and review the settings applicable to the User.
Check for any “Deny” permissions that may be set on the user or any Windows Group of which they may be a member, e.g., Users, Administrators.
Allow or deny—which takes precedence?
Simple Configuration and/or Device
Class Configuration have been used within Device Access Manager to deny users access to devices. Despite being denied access, users can still access the devices.
Verify that the HP ProtectTools Device Locking service has started.
As an administrative user, browse to Control Panel >
Administrative Tools > Services. In the Services window, search for the HP ProtectTools Device
Locking/Auditing service. Be sure that the service is started and that the startup type is Automatic.
Within Device Class Configuration, the following configuration has been set:
The user is denied access to the device. Deny takes precedence over Allow.
●
The Allow permission has been granted to a Windows group (e.g.,
BUILTIN\Administrators) and the
Deny permission has been granted to another Windows group (e.g.,
BUILTIN\Users) at the same level in the device class hierarchy (e.g.,
DVD/CD-ROM Drives).
Access is denied due to the way in which Windows works out the effective permission for the device. One group is denied, and one group is allowed, but the user is a member of both groups. The user is denied because denying access is given precedence over allowing access.
If a user is a member of both those groups (e.g., Administrator), which takes precedence?
One workaround is to deny the Users group at the DVD/
CD-ROM Drives level and to allow the Administrators group at the level below DVD/CD-ROM Drives.
A further workaround would be to have specific
Windows groups, one for allowing access to DVD/CD and one for denying access to DVD/CD. Specific users would then be added to the appropriate group.
88 Chapter 9 Troubleshooting
Miscellaneous
Software Impacted—
Short description
Details Solution
Security Manager—
Warning received: The
security application can not be installed until the
HP Protect Tools
Security Manager is
installed.
All security applications such as
Embedded Security, Java Card Security, and biometrics are extendable plug-ins for the Security Manager interface.
Security Manager must be installed before an HP-approved security plug-in can be loaded.
The Security Manager software must be installed before installing any security plug-in.
TPM Firmware Update
Utility for models containing Broadcomenabled TPMs—The tool provided through HP support Web site reports
ownership required.
This is the expected behavior of the TPM firmware utility for models containing
Broadcom-enabled TPMs.
1.
2.
Reinstall Embedded Security Software.
Run the Platform and User Configuration Wizard.
The firmware upgrade tool allows the user to upgrade the firmware, with or without an endorsement key (EK). When there is no EK, no authorization is required to complete the firmware upgrade.
3.
Be sure that the system contains Microsoft .NET
framework 1.1 installation:
a.
b.
Click Start.
Click Control Panel.
When there is an EK, a TPM owner must exist, since the upgrade requires owner authorization. After the successful upgrade, the platform must be restarted for the new firmware to take effect.
c.
d.
Click Add or remove programs.
Be sure that Microsoft .NET Framework
1.1 is listed.
4.
Check the hardware and software configuration:
If the BIOS TPM is factory-reset, ownership is removed and firmware update capability is prevented until the
Embedded Security Software platform and User Initialization Wizard have been configured.
a.
b.
c.
Click Start.
Click All Programs.
Click HP ProtectTools Security Manager.
d.
Select Embedded Security from the tree menu.
NOTE:
A reboot is always recommended after performing a firmware update. The firmware version is not identified correctly until after the reboot.
e.
Click More Details. The system should have the following configuration:
●
Product version = V4.0.1
● Embedded Security State: Chip State =
Enabled, Owner State = Initialized,
User State = Initialized
●
Component Info: TCG Spec. Version =
1.2
● Vendor = Broadcom Corporation
●
FW Version = 2.18 (or greater)
● TPM Device driver library version
2.0.0.9 (or greater)
HP ProtectTools Security
Manager—Intermittently,
5.
If the FW version does not match 2.18, download and update the TPM firmware. The TPM Firmware
SoftPaq is a support download available on the HP
Web site at http://www.hp.com
.
Intermittently (1 in 12 instances), an error is created by using the close button in the
This is related to a timing dependency on plug-in services load time when closing and restarting Security
Miscellaneous 89
Software Impacted—
Short description
Details Solution
an error is returned when closing the Security
Manager interface.
upper right of the screen to close
Security Manager before all plug-in applications have finished loading.
Manager. Since PTHOST.exe is the shell housing the other applications (plug-ins), it depends on the ability of the plug-in to complete its load time (services). Closing the shell before the plug-in has had time to complete loading is the root cause.
HP ProtectTools—
Unrestricted access or uncontrolled administrator privileges pose security risk.
Numerous risks are possible with unrestricted access to the client PC, including the following:
● Deletion of PSD
●
Malicious modification of user settings
The BIOS and OS
Embedded Security passwords are out of synch.
Allow Security Manager to complete the services loading message (seen at top of Security Manager window) and all plug-ins listed in left column. To avoid failure, allow a reasonable time for these plug-ins to load.
Administrators are encouraged to follow “best practices” in restricting end-user privileges and restricting user access.
Unauthorized users should not be granted administrative privileges.
● Disabling of security policies and functions
If a user does not validate a new password as the BIOS Embedded
Security password, the BIOS Embedded
Security password reverts back to the original embedded security password through f10 BIOS.
This is functioning as designed; these passwords can be re-synchronized by changing the OS Basic User password and authenticating it at the BIOS Embedded
Security password prompt.
Only one user can log on to the system after TPM preboot authentication is enabled in BIOS.
The user has to change their PIN to make TPM preboot work after a TPM factory reset.
Power-on authentication support
is not set to default using
Embedded Security
Reset to Factory
Settings
The TPM BIOS PIN is associated with the first user who initializes the user setting. If a computer has multiple users, the first user is, in essence, the administrator. The first user will have to give his TPM user PIN to other users to use to log on.
This is functioning as designed; HP recommends that the customer's IT department follow good security policies for rolling out their security solution and ensuring that the BIOS administrator password is configured by IT administrators for system level protection.
The user has to change their PIN or create another user to initialize their user setting to make TPM BIOS authentication work after reset. There is no option to make TPM BIOS authentication work.
This is as designed; the factory reset clears the Basic
User Key. The user must change his user PIN or create a new user to re-initialize the Basic User Key.
In Computer Setup, the Power-on
authentication support option is not being reset to factory settings when using the Embedded Security Device option Reset to Factory Settings. By default, Power-on authentication
support is set to Disable.
The Reset to Factory Settings option disables
Embedded Security Device, which hides the other
Embedded Security options (including Power-on
authentication support). However, after reenabling
Embedded Security Device, Power-on authentication
support remains enabled.
HP is working on a resolution, which will be provided in future Web-based ROM SoftPaq offerings.
90 Chapter 9 Troubleshooting
Software Impacted—
Short description
Details Solution
Security Power-On
Authentication overlaps the BIOS Password during boot sequence.
Power-On Authentication prompts the user to log on to the system using the
TPM password, but, if the user presses
f10 to access the BIOS, the user is granted Read rights access only.
The BIOS asks for both the old and new passwords through
Computer Setup after the
Owner password is changed.
The BIOS asks for both the old and new passwords through Computer Setup after the Owner password is changed in
Embedded Security Windows software.
To be able to write to BIOS, the user must type the BIOS password instead of the TPM password at the Poweron Authentication window.
This is as designed. This is due to the inability of the
BIOS to communicate with the TPM, after the operating system is up and running, and to verify the TPM pass phrase.
Miscellaneous 91
advertisement
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Related manuals
advertisement
Table of contents
- 7 Introduction to security
- 8 HP ProtectTools features
- 10 Accessing HP ProtectTools Security
- 12 Achieving key security objectives
- 12 Protecting against targeted theft
- 12 Restricting access to sensitive data
- 12 Preventing unauthorized access from internal or external locations
- 13 Creating strong password policies
- 14 Additional security elements
- 14 Assigning security roles
- 14 Managing HP ProtectTools passwords
- 16 Creating a secure password
- 16 Backing up and restoring HP ProtectTools credentials
- 16 Backing up credentials and settings
- 17 Credential Manager for HP ProtectTools
- 17 Setup procedures
- 17 Logging on to Credential Manager
- 18 Using the Credential Manager Logon Wizard
- 18 Registering credentials
- 18 Registering fingerprints
- 19 Setting up the fingerprint reader
- 19 Using your registered fingerprint to log on to Windows
- 19 Registering a Smart Card or Token
- 20 Registering other credentials
- 21 General tasks
- 21 Creating a virtual token
- 21 Changing the Windows logon password
- 21 Changing a token PIN
- 22 Locking the computer (workstation)
- 22 Using Windows Logon
- 22 Logging on to Windows with Credential Manager
- 23 Using Single Sign On
- 23 Registering a new application
- 23 Using automatic registration
- 24 Using manual (drag and drop) registration
- 24 Managing applications and credentials
- 24 Modifying application properties
- 24 Removing an application from Single Sign On
- 24 Exporting an application
- 25 Importing an application
- 25 Modifying credentials
- 26 Using Application Protection
- 26 Restricting access to an application
- 26 Removing protection from an application
- 27 Changing restriction settings for a protected application
- 28 Advanced tasks (administrator only)
- 28 Specifying how users and administrators log on
- 29 Configuring custom authentication requirements
- 29 Configuring credential properties
- 30 Configuring Credential Manager settings
- 30 Example 1—Using the “Advanced Settings” page to allow Windows logon from Credential Manager
- 31 Example 2—Using the “Advanced Settings” page to require user verification before Single Sign On
- 32 Drive Encryption for HP ProtectTools (select models only)
- 32 Setup procedures
- 32 Opening Drive Encryption
- 33 General tasks
- 33 Activating Drive Encryption
- 33 Deactivating Drive Encryption
- 33 Logging in after Drive Encryption is activated
- 34 Advanced tasks
- 34 Managing Drive Encryption (administrator task)
- 34 Activating a TPM-protected password (select models only)
- 34 Encrypting or decrypting individual drives
- 34 Backup and recovery (administrator task)
- 34 Creating backup keys
- 35 Registering for online recovery
- 36 Managing an existing online recovery account
- 36 Performing a recovery
- 38 Privacy Manager for HP ProtectTools (select models only)
- 39 Opening Privacy Manager
- 40 Setup procedures
- 40 Managing Privacy Manager Certificates
- 40 Requesting and installing a Privacy Manager Certificate
- 40 Requesting a Privacy Manager Certificate
- 40 Installing a Privacy Manager Certificate
- 41 Viewing Privacy Manager Certificate details
- 41 Renewing a Privacy Manager Certificate
- 41 Setting a default Privacy Manager Certificate
- 41 Deleting a Privacy Manager Certificate
- 42 Restoring a Privacy Manager Certificate
- 42 Revoking your Privacy Manager Certificate
- 42 Managing Trusted Contacts
- 43 Adding Trusted Contacts
- 43 Adding a Trusted Contact
- 44 Adding Trusted Contacts using your Microsoft Outlook address book
- 44 Viewing Trusted Contact details
- 44 Deleting a Trusted Contact
- 45 Checking revocation status for a Trusted Contact
- 46 General tasks
- 46 Using Privacy Manager in Microsoft Office
- 49 Using Privacy Manager in Microsoft Outlook
- 50 Using Privacy Manager in Windows Live Messenger
- 54 Advanced tasks
- 54 Migrating Privacy Manager Certificates and Trusted Contacts to a different computer
- 54 Exporting Privacy Manager Certificates and Trusted Contacts
- 54 Importing Privacy Manager Certificates and Trusted Contacts
- 55 File Sanitizer for HP ProtectTools
- 56 Setup procedures
- 56 Opening File Sanitizer
- 56 Setting a shred schedule
- 57 Setting a free space bleaching schedule
- 57 Selecting or creating a shred profile
- 57 Selecting a predefined shred profile
- 57 Customizing a shred profile
- 58 Customizing a simple delete profile
- 59 Setting a shred schedule
- 59 Setting a free space bleaching schedule
- 60 Selecting or creating a shred profile
- 60 Selecting a predefined shred profile
- 60 Customizing a shred profile
- 61 Customizing a simple delete profile
- 62 General tasks
- 62 Using a key sequence to initiate shredding
- 62 Using the File Sanitizer icon
- 62 Manually shredding one asset
- 63 Manually shredding all selected items
- 63 Manually activating free space bleaching
- 63 Aborting a shred or free space bleaching operation
- 64 Viewing the log files
- 65 BIOS Configuration for HP ProtectTools
- 66 General tasks
- 66 Accessing BIOS Configuration
- 67 Viewing or changing settings
- 67 Viewing system information
- 68 Advanced tasks
- 68 Setting security options
- 69 Setting system configuration options
- 74 Embedded Security for HP ProtectTools (select models only)
- 75 Setup procedures
- 75 Enabling the embedded security chip
- 76 Initializing the embedded security chip
- 76 Setting up the basic user account
- 77 General tasks
- 77 Using the Personal Secure Drive
- 77 Encrypting files and folders
- 77 Sending and receiving encrypted e-mail
- 78 Changing the Basic User Key password
- 78 Advanced tasks
- 78 Backing up and restoring
- 78 Creating a backup file
- 78 Restoring certification data from the backup file
- 79 Changing the owner password
- 79 Resetting a user password
- 79 Enabling and disabling Embedded Security
- 79 Permanently disabling Embedded Security
- 79 Enabling Embedded Security after permanent disable
- 80 Migrating keys with the Migration Wizard
- 81 Device Access Manager for HP ProtectTools (select models only)
- 81 Starting background service
- 82 Simple configuration
- 83 Device class configuration (advanced)
- 83 Adding a user or a group
- 83 Removing a user or a group
- 83 Denying access to a user or group
- 83 Allowing access to a device class for one user of a group
- 84 Allowing access to a specific device for one user of a group
- 85 Troubleshooting
- 85 Credential Manager for HP ProtectTools
- 88 Embedded Security for HP ProtectTools (select models only)
- 94 Device Access Manager for HP ProtectTools
- 95 Miscellaneous
- 98 Glossary
- 102 Index