HP Wolf Security User Guide

Introduction

HP Wolf Security provides simple yet effective protection for small and mid-sized organizations. It stops a broad range of attacks including phishing and ransomware without requiring security specialist staff or complex configuration. HP Wolf Security is available as cloud-managed PC software with optional deployment services.

The available features will vary depending on the version and configuration of HP Wolf Security. The following features exist:


System tray icon

The HP Wolf Security icon is located in the system tray, typically in the lower-right corner of your computer screen.

Menu options

Right-click the icon to show the menu options.

Status

The system tray icon communicates the status of HP Wolf Security with a colored dot.


Console

Use the console to control the components of HP Wolf Security, view status, access settings, see security alerts, and send information to HP.


Appendix A - How to enable virtualization

Threat Containment uses virtualization to protect your computer from malware contained in files downloaded from the internet. If virtualization is disabled on your computer, you will need to enable it in order to use Threat Containment. You will need to restart your computer as part of this process.

To check if virtualization is enabled on your computer, right-click the taskbar or press ctrl+alt+delete, and then select Task Manager. Select the Performance tab, and check the status of Virtualization.

To enable virtualization on your computer you will need to open the UEFI or BIOS settings for your computer:

  1. Ensure that you have these instructions available on a separate device or print a paper copy.
  2. Select the Windows menu and select Settings (or search for Settings).
  3. From the Settings window, select Update & Security.
  4. From the left menu, select Recovery.
  5. Under Advanced start-up, select Restart now.
  6. Select Troubleshoot and then select Advanced options.
  7. Select UEFI Firmware Settings and then select Restart. If the UEFI Firmware Settings option is not listed, your computer does not support UEFI. To enable virtualization, boot to the BIOS by restarting your computer and pressing the BIOS boot key before Windows starts. The BIOS boot key varies by manufacturer. Please refer to the manufacturer's guidance for more information.
  8. The UEFI/BIOS settings vary by computer manufacturer and model. Look for a setting or settings labeled Virtualization, Virtualization Technology , VT-x, VT-d, Extended Page Tables, EPT, Vanderpool or AMD-V and enable all of them. These settings might be listed under a menu labeled Security, Advanced, Configuration or CPU Configuration. You may need to use your laptop's built-in trackpad or keyboard to navigate the options. NOTE: Do not change any other UEFI/BIOS settings without referring to the manufacturer's guidance first.
  9. Select Save or Apply and then select Exit or Restart.
  10. After the computer has restarted, you can use Task Manager to check whether virtualization is enabled as described above. If virtualization is not enabled, the setting change might not have been applied during restart. Completely shut down your computer and wait at least 30 seconds before restarting it.
  11. After virtualization is enabled, Threat Containment will initialize and its status will then change to green.

Appendix B - Windows Hyper-V Support

Threat Containment includes support for systems running Windows Hyper-V. If Threat Containment cannot support Hyper-V on your computer then you may need to either disable Hyper-V or enable Windows Hypervisor Platform.

  1. From the Windows Start menu, open Control Panel.
  2. Select Programs and Features, and then Turn Windows features on or off.
  3. Modify the Hyper-V or Windows Hypervisor Platform feature.

NOTE: Threat Containment is able to make use of Windows Hypervisor Platform since Windows 10 build 18362.


Appendix C - How to uninstall HP Wolf Security

Use the steps outlined in this section to uninstall HP Wolf Security.

  1. In the Windows Start menu, search for Add or remove programs to open the Apps & features page.
  2. Select HP Wolf Security from the list and then select Uninstall.
  3. Select HP Wolf Security - Console from the list and then select Uninstall.
  4. Select HP Security Update Service from the list and then select Uninstall.

Appendix D - How to install HP Wolf Security

If HP Wolf Security was preinstalled on your computer, you can reinstall it by following these steps.

  1. Open https://support.hp.com and select Software and Drivers.
  2. Select your product (laptop or desktop), identify your device, and select your operating system version.
  3. From the list of eligible software, find Software-Security and choose HP Wolf Security for Business.
  4. Download and run the installer. Follow the instructions displayed on screen.

Appendix E - Microsoft Outlook Support

Threat Containment includes protection for Microsoft Outlook. Untrusted email attachments that are previewed or saved will be opened in a micro-VM (virtual machine) to prevent your computer from being infected by malware.

'New Outlook for Windows' is a new version of Microsoft Outlook which is not currently protected by Threat Containment. To continue benefitting from the email protection that Threat Containment provides, disable the 'New Outlook' toggle switch which appears in the Microsoft Outlook window. The Threat Containment warning should disappear when you next login.