HP D530 HP Compaq Business Desktop d500 Service Reference Guide, 5th Edition - Page 43

Password Security, 3.5.2 Establishing a Setup Password Using Computer Setup

Page 43 highlights

Desktop Management Security Features Overview (Continued) Feature Purpose Cable Lock Provision Inhibits access to the interior of the computer to prevent unwanted configuration changes or component removal. Can also be used to secure the computer to a fixed object to prevent theft. Security Loop Provision Inhibits access to the interior of the computer to prevent unwanted configuration changes or component removal. How It Is Established Install a cable lock to secure the computer to a fixed object. Install a lock in the security loop to prevent unwanted configuration changes or component removal. ✎ For more information about Computer Setup, see the Computer Setup (F10) Utility Guide. Support for security features may vary depending on your specific computer configuration. 3.5.1 Password Security The power-on password prevents unauthorized use of the computer by requiring entry of a password to access applications or data each time the computer is turned on or restarted. The setup password specifically prevents unauthorized access to Computer Setup, and can also be used as an override to the power-on password. That is, when prompted for the power-on password, entering the setup password instead will allow access to the computer. A network-wide setup password can be established to enable the system administrator to log in to all network systems to perform maintenance without having to know the power-on password, even if one has been established. 3.5.2 Establishing a Setup Password Using Computer Setup Establishing a setup password through Computer Setup prevents reconfiguration of the computer (use of the Computer Setup (F10) utility) until the password is entered. 1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart. 2. Press the F10 key as soon as the monitor light turns green. Press Enter to bypass the title screen, if necessary. ✎ If you do not press the F10 key at the appropriate time, you must turn the computer off, then on again, and press the F10 key again to access the utility. 3. Select Security, then select Setup Password and follow the instructions on the screen. 4. Before exiting, click File > Save Changes and Exit. Service Reference Guide, d500 336492-005 3-11

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234

Service Reference Guide, d500
336492-005
3–11
Desktop Management
3.5.1 Password Security
The power-on password prevents unauthorized use of the computer by requiring entry of a
password to access applications or data each time the computer is turned on or restarted. The
setup password specifically prevents unauthorized access to Computer Setup, and can also be
used as an override to the power-on password. That is, when prompted for the power-on
password, entering the setup password instead will allow access to the computer.
A network-wide setup password can be established to enable the system administrator to log in to
all network systems to perform maintenance without having to know the power-on password,
even if one has been established.
3.5.2 Establishing a Setup Password Using Computer Setup
Establishing a setup password through Computer Setup prevents reconfiguration of the computer
(use of the Computer Setup (F10) utility) until the password is entered.
1. Turn on or restart the computer. If you are in Windows, click
Start > Shut Down > Restart.
2. Press the
F10
key as soon as the monitor light turns green. Press
Enter
to bypass the title
screen, if necessary.
If you do not press the
F10
key at the appropriate time, you must turn the computer off, then on
again, and press the
F10
key again to access the utility.
3. Select
Security,
then select
Setup Password
and follow the instructions on the screen.
4. Before exiting, click
File > Save Changes
and
Exit.
Cable Lock Provision
Inhibits access to the interior of
the computer to prevent
unwanted configuration
changes or component
removal. Can also be used to
secure the computer to a fixed
object to prevent theft.
Install a cable lock to secure
the computer to a fixed
object.
Security Loop Provision
Inhibits access to the interior of
the computer to prevent
unwanted configuration
changes or component
removal.
Install a lock in the security
loop to prevent unwanted
configuration changes or
component removal.
Security Features Overview
(Continued)
Feature
Purpose
How It Is Established
For more information about Computer Setup, see the
Computer Setup (F10) Utility Guide
.
Support for security features may vary depending on your specific computer configuration.