HP Dc5000 Desktop Management Guide - Page 37

Browse, Finish, Make sure the Start Embedded Security User Initialization

Page 37 highlights

Desktop Management Guide ✎ Type carefully; for security reasons, the characters typed do not appear on the screen. 4. Click Next to accept the default Recovery archive location. 5. Type and confirm an Emergency Recovery Token password, then click Next. 6. Insert a diskette on which to store the Emergency Recovery Token Key. Click Browse and select the diskette. Ä CAUTION: The Emergency Recovery Token Key is used to recover encrypted data in the event of a computer or embedded security chip failure. The data cannot be recovered without the key. (The data still cannot be accessed without the Basic User password.) Store this diskette in a safe place. 7. Click Save to accept the location and the default file name, then click Next. 8. Click Next to confirm settings before the Security Platform is initialized. ✎ A message may be displayed to say that the Embedded Security features are not initialized. Do not click in the message; this is addressed later in the procedure and the message will close after a few seconds. 9. Click Next to bypass configuring local policies. 10. Make sure the Start Embedded Security User Initialization Wizard check box is selected, then click Finish. The User Initialization Wizard starts now automatically. Desktop Management Guide www.hp.com 33

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58

Desktop Management Guide
www.hp.com
33
Desktop Management Guide
Type carefully; for security reasons, the characters typed do not
appear on the screen.
4. Click
Next
to accept the default Recovery archive location.
5. Type and confirm an Emergency Recovery Token password, then
click
Next
.
6. Insert a diskette on which to store the Emergency Recovery
Token Key. Click
Browse
and select the diskette.
Ä
CAUTION:
The Emergency Recovery Token Key is used to recover
encrypted data in the event of a computer or embedded security chip
failure.
The data cannot be recovered without the key
. (The
data still cannot be accessed without the Basic User password.) Store this
diskette in a safe place.
7. Click
Save
to accept the location and the default file name, then
click
Next
.
8. Click
Next
to confirm settings before the Security Platform is
initialized.
A message may be displayed to say that the Embedded Security
features are not initialized. Do not click in the message; this is
addressed later in the procedure and the message will close after a
few seconds.
9. Click
Next
to bypass configuring local policies.
10. Make sure the Start Embedded Security User Initialization
Wizard check box is selected, then click
Finish
.
The User Initialization Wizard starts now automatically.