HP Dc5000 Desktop Management Guide - Page 28

From the Computer Setup, Security Loop Provision

Page 28 highlights

Desktop Management Guide Security Features Overview (Continued) Feature Purpose How It Is Established Ownership Tag Displays ownership information, as defined by the system administrator, during system startup (protected by setup password). From the Computer Setup (F10) Utilities menu. Cable Lock Provision Inhibits access to the interior of the computer to prevent unwanted configuration changes or component removal. Can also be used to secure the computer to a fixed object to prevent theft. Install a cable lock to secure the computer to a fixed object. Security Loop Provision Inhibits access to the interior of the computer to prevent unwanted configuration changes or component removal. Install a lock in the security loop to prevent unwanted configuration changes or component removal. ✎ For more information about Computer Setup, see the Computer Setup (F10) Utility Guide. Support for security features may vary depending on the specific computer configuration. 24 www.hp.com Desktop Management Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58

24
www.hp.com
Desktop Management Guide
Desktop Management Guide
Ownership Tag
Displays ownership
information, as defined by the
system administrator, during
system startup (protected by
setup password).
From the Computer Setup
(F10) Utilities menu.
Cable Lock Provision
Inhibits access to the interior
of the computer to prevent
unwanted configuration
changes or component
removal. Can also be used to
secure the computer to a fixed
object to prevent theft.
Install a cable lock to secure
the computer to a fixed
object.
Security Loop Provision
Inhibits access to the interior
of the computer to prevent
unwanted configuration
changes or component
removal.
Install a lock in the security
loop to prevent unwanted
configuration changes or
component removal.
Security Features Overview
(Continued)
Feature
Purpose
How It Is Established
For more information about Computer Setup, see the
Computer Setup (F10) Utility Guide
.
Support for security features may vary depending on the specific computer configuration.