Dell Latitude 7030 Rugged Extreme Tablet Owners Manual - Page 139

Table 41. System setup options-Security menu continued, Table 42. System setup options-Passwords menu

Page 139 highlights

Table 41. System setup options-Security menu (continued) Security For additional security, Dell Technologies recommends keeping the SMM Security Mitigation option enabled unless you have a specific application which is not compatible. NOTE: This feature may cause compatibility issues or loss of functionality with some legacy tools and applications. Data Wipe on Next Boot Start Data Wipe Data Wipe is a secure wipe operation that deletes information from a storage device. CAUTION: The secure Data Wipe operation deletes information in a way that it cannot be reconstructed. Commands such as delete and format in the operating system may remove files from showing up in the file system. However, they can be reconstructed through forensic means as they are still represented on the physical media. Data Wipe prevents this reconstruction and is not recoverable. When enabled, the data wipe option will prompt to wipe any storage devices that are connected to the computer on the next boot. By default, the Start Data Wipe option is disabled. Absolute Absolute Software provides various cyber security solutions, some requiring software preloaded on Dell computers and integrated into the BIOS. To use these features, you must enable the Absolute BIOS setting and contact Absolute for configuration and activation. By default, the Absolute option is enabled. For additional security, Dell Technologies recommends keeping the Absolute option enabled. NOTE: When the Absolute features are activated, the Absolute integration cannot be disabled from the BIOS setup screen. UEFI Boot Path Security Enables or disables the computer to prompt the user to enter the Administrator password (if set) when booting to a UEFI boot path device from the F12 boot menu. By default, the Always Except Internal HDD option is enabled. Firmware Device Tamper Detection Allows you to control the firmware device tamper detection feature. This feature notifies the user when the firmware device is tampered. When enabled, a screen warning messages are displayed on the computer and a tamper detection event is logged in the BIOS Events log. The computer fails to reboot until the event is cleared. By default, the Silent option is enabled. For additional security, Dell Technologies recommends keeping the Firmware Device Tamper Detection option enabled. Clear Firmware Device Tamper Detection Enables you to clear the event and allow booting. By default, the option is turned off. Table 42. System setup options-Passwords menu Passwords Admin Password The Administrator Password prevents unauthorized access to the BIOS Setup options. Once the administrator password is set, the BIOS setup options can only be modified after providing the correct password. The following rules and dependencies apply to the Administrator Password - BIOS Setup 139

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157

Table 41. System setup options—Security menu (continued)
Security
For additional security, Dell Technologies recommends keeping the
SMM
Security Mitigation
option enabled unless you have a specific application which
is not compatible.
NOTE:
This feature may cause compatibility issues or loss of functionality
with some legacy tools and applications.
Data Wipe on Next Boot
Start Data Wipe
Data Wipe is a secure wipe operation that deletes information from a storage
device.
CAUTION:
The secure Data Wipe operation deletes information in a
way that it cannot be reconstructed.
Commands such as delete and format in the operating system may remove files
from showing up in the file system. However, they can be reconstructed through
forensic means as they are still represented on the physical media. Data Wipe
prevents this reconstruction and is not recoverable.
When enabled, the data wipe option will prompt to wipe any storage devices that
are connected to the computer on the next boot.
By default, the
Start Data Wipe
option is disabled.
Absolute
Absolute Software provides various cyber security solutions, some requiring
software preloaded on Dell computers and integrated into the BIOS. To use these
features, you must enable the Absolute BIOS setting and contact Absolute for
configuration and activation.
By default, the
Absolute
option is enabled.
For additional security, Dell Technologies recommends keeping the
Absolute
option enabled.
NOTE:
When the Absolute features are activated, the Absolute integration
cannot be disabled from the BIOS setup screen.
UEFI Boot Path Security
Enables or disables the computer to prompt the user to enter the Administrator
password (if set) when booting to a UEFI boot path device from the F12 boot
menu.
By default, the
Always Except Internal HDD
option is enabled.
Firmware Device Tamper Detection
Allows you to control the firmware device tamper detection feature. This feature
notifies the user when the firmware device is tampered. When enabled, a screen
warning messages are displayed on the computer and a tamper detection event
is logged in the BIOS Events log. The computer fails to reboot until the event is
cleared.
By default, the
Silent
option is enabled.
For additional security, Dell Technologies recommends keeping the
Firmware
Device Tamper Detection
option enabled.
Clear Firmware Device Tamper Detection
Enables you to clear the event and allow booting.
By default, the option is turned off.
Table 42. System setup options—Passwords menu 
Passwords
Admin Password
The Administrator Password prevents unauthorized access to the BIOS Setup
options. Once the administrator password is set, the BIOS setup options can only
be modified after providing the correct password.
The following rules and dependencies apply to the Administrator Password -
BIOS Setup
139