Compaq 6000 Maintenance & Service Guide: HP Compaq 6000 Pro Microtower Bus - Page 66

Desktop Management, Security Features Overview continued - hp pro

Page 66 highlights

Table 5-1 Security Features Overview (continued) Device Security Allows you to set Device Available/Device Hidden for: ● Serial ports ● Parallel port ● Rear USB ports ● Front USB ports ● Internal USB ports ● System audio ● Network controllers (some models) ● Legacy diskette ● Embedded security device (some models) ● SATA0 ● SATA1 (some models) ● SATA2 (some models) ● SATA3 (some models) ● eSATA (some models) LoJack for HP ProtectTools Allows you to remotely monitor, manage, and track your computer. Once activated, LoJack Pro for HP ProtectTools is configured from the Absolute Software Customer Center. From the Customer Center, the administrator can configure LoJack for HP ProtectTools to monitor or manage the computer. If the system is misplaced or stolen, the Customer Center can assist local authorities to locate and recover the computer. If configured, LoJack Pro can continue to function even if the hard drive is erased or replaced. Network Service Boot Enables/disables the computer's ability to boot from an operating system installed on a network server. (Feature available on NIC models only; the network controller must be either a PCI expansion card or embedded on the system board.) System IDs Allows you to set: ● Asset tag (18-byte identifier), a property identification number assigned by the company to the computer. ● Ownership tag (80-byte identifier) displayed during POST. ● Chassis serial number or Universal Unique Identifier (UUID) number. The UUID can only be updated if the current chassis serial number is invalid. (These ID numbers are normally set in the factory and are used to uniquely identify the system.) ● Keyboard locale setting (for example, English or German) for System ID entry. DriveLock Security Allows you to assign or modify a master or user password for hard drives. When this feature is enabled, the user is prompted to provide one of the DriveLock passwords during POST. If neither is successfully entered, the hard drive will remain inaccessible until one of the passwords is successfully provided during a subsequent cold-boot sequence. NOTE: This selection will only appear when at least one drive that supports the DriveLock feature is attached to the system. 54 Chapter 5 Desktop Management

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257

Device Security
Allows you to set Device Available/Device Hidden for:
Serial ports
Parallel port
Rear USB ports
Front USB ports
Internal USB ports
System audio
Network controllers (some models)
Legacy diskette
Embedded security device (some models)
SATA0
SATA1 (some models)
SATA2 (some models)
SATA3 (some models)
eSATA (some models)
LoJack for HP
ProtectTools
Allows you to remotely monitor, manage, and track your computer.
Once activated, LoJack Pro for HP ProtectTools is configured from the Absolute Software Customer
Center. From the Customer Center, the administrator can configure LoJack for HP ProtectTools to
monitor or manage the computer. If the system is misplaced or stolen, the Customer Center can
assist local authorities to locate and recover the computer. If configured, LoJack Pro can continue
to function even if the hard drive is erased or replaced.
Network Service Boot
Enables/disables the computer’s ability to boot from an operating system installed on a network
server. (Feature available on NIC models only; the network controller must be either a PCI expansion
card or embedded on the system board.)
System IDs
Allows you to set:
Asset tag (18-byte identifier), a property identification number assigned by the company to the
computer.
Ownership tag (80-byte identifier) displayed during POST.
Chassis serial number or Universal Unique Identifier (UUID) number. The UUID can only be
updated if the current chassis serial number is invalid. (These ID numbers are normally set in
the factory and are used to uniquely identify the system.)
Keyboard locale setting (for example, English or German) for System ID entry.
DriveLock Security
Allows you to assign or modify a master or user password for hard drives. When this feature is
enabled, the user is prompted to provide one of the DriveLock passwords during POST. If neither
is successfully entered, the hard drive will remain inaccessible until one of the passwords is
successfully provided during a subsequent cold-boot sequence.
NOTE:
This selection will only appear when at least one drive that supports the DriveLock feature
is attached to the system.
Table 5-1
Security Features Overview (continued)
54
Chapter 5
Desktop Management