HP Dc5000 HP Compaq Business Desktop dc5000 Series Service Reference Guide 2nd - Page 37

Security Features Overview, Feature, Purpose, How It Is Established

Page 37 highlights

Desktop Management Security Features Overview (Continued) Feature Purpose DriveLock Prevents unauthorized access to the data on specific hard drives. This feature is available on select models only. Embedded Security Prevents unauthorized access to the data on specific hard drives. This feature is available on select models only. Master Boot Record Security May prevent unintentional or malicious changes to the Master Boot Record of the current bootable disk, and provides a means of recovering the "last known good" MBR. Memory Change Alerts Detects when memory modules have been added, moved, or removed; notifies user and system administrator. Ownership Tag Displays ownership information, as defined by the system administrator, during system startup (protected by setup password). Cable Lock Provision Inhibits access to the interior of the computer to prevent unwanted configuration changes or component removal. Can also be used to secure the computer to a fixed object to prevent theft. Security Loop Provision Inhibits access to the interior of the computer to prevent unwanted configuration changes or component removal. How It Is Established From the Computer Setup Utilities (F10) menu. From the Computer Setup Utilities (F10) menu. From the Computer Setup Utilities (F10) menu. For information on enabling Memory Change Alerts, refer to the online Intelligent Manageability Guide. From the Computer Setup Utilities (F10) menu. Install a cable lock to secure the computer to a fixed object. Install a lock in the security loop to prevent unwanted configuration changes or component removal. ✎ For more information about Computer Setup, see the Computer Setup (F10) Utility Guide. Support for security features may vary depending on your specific computer configuration. Service Reference Guide, dc5000 360201-002 3-9

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180

Service Reference Guide, dc5000
360201-002
3–9
Desktop Management
DriveLock
Prevents unauthorized access
to the data on specific hard
drives. This feature is available
on select models only.
From the Computer Setup
Utilities (F10) menu.
Embedded Security
Prevents unauthorized access
to the data on specific hard
drives. This feature is
available on select models
only.
From the Computer Setup
Utilities (F10) menu.
Master Boot Record Security
May prevent unintentional or
malicious changes to the
Master Boot Record of the
current bootable disk, and
provides a means of
recovering the “last known
good” MBR.
From the Computer Setup
Utilities (F10) menu.
Memory Change Alerts
Detects when memory
modules have been added,
moved, or removed; notifies
user and system administrator.
For information on enabling
Memory Change Alerts,
refer to the online
Intelligent
Manageability Guide
.
Ownership Tag
Displays ownership
information, as defined by the
system administrator, during
system startup (protected by
setup password).
From the Computer Setup
Utilities (F10) menu.
Cable Lock Provision
Inhibits access to the interior of
the computer to prevent
unwanted configuration
changes or component
removal. Can also be used to
secure the computer to a fixed
object to prevent theft.
Install a cable lock to secure
the computer to a fixed
object.
Security Loop Provision
Inhibits access to the interior of
the computer to prevent
unwanted configuration
changes or component
removal.
Install a lock in the security
loop to prevent unwanted
configuration changes or
component removal.
Security Features Overview
(Continued)
Feature
Purpose
How It Is Established
For more information about Computer Setup, see the
Computer Setup (F10) Utility Guide
.
Support for security features may vary depending on your specific computer configuration.