HP Dc7100 HP Compaq Business Desktop dc7100 Series Service Reference Guide, 3r - Page 45

Asset Tracking and Security, Computer Setup Utilities F10 Security Features

Page 45 highlights

Desktop Management 3.4 Asset Tracking and Security Asset tracking features incorporated into the computer provide key asset tracking data that can be managed using HP Insight Manager, HP Client Manager or other system management applications. Seamless, automatic integration between asset tracking features and these products enables you to choose the management tool that is best suited to your environment and to leverage your investment in existing tools. HP also offers several solutions for controlling access to valuable components and information. ProtectTools Embedded Security, if installed, prevents unauthorized access to data and checks system integrity and authenticates third-party users attempting system access. (Refer to HP ProtectTools Embedded Security Guide, on the Documentation CD for more information.) Security features such as ProtectTools, the Smart Cover Sensor and the Smart Cover Lock, available on select models, help to prevent unauthorized access to the internal components of the personal computer. By disabling parallel, serial, or USB ports, or by disabling removable media boot capability, you can protect valuable data assets. Memory Change and Smart Cover Sensor alerts can be automatically forwarded to system management applications to deliver proactive notification of tampering with a computer's internal components. ✎ ProtectTools, the Smart Cover Sensor, and the Smart Cover Lock are available as options on select systems. Use the following utilities to manage security settings on your HP computer: ■ Locally, using the Computer Setup Utilities. See the Computer Setup (F10) Utility Guide included with the computer for additional information and instructions on using the Computer Setup Utilities. ■ Remotely, using HP Client Manager Software or System Software Manager. This software enables the secure, consistent deployment and control of security settings from a simple command-line utility. Computer Setup Utilities (F10) Security Features Feature Description Setup Password Allows you to set and enable setup (administrator) password. ✎ If the setup password is set, it is required to change Computer Setup options, flash the ROM, and make changes to certain plug and play settings under Windows. See the Troubleshooting Guide on the Documentation CD for more information. Power-On Password Allows you to set and enable power-on password. See the Troubleshooting Guide on the Documentation CD for more information. Password Options (This selection will appear only if a power-on password is set.) Allows you to specify whether the password is required for warm boot (CTRL+ALT+DEL). See the Desktop Management Guide on the Documentation CD for more information. ✎ For more information about Computer Setup, see the Computer Setup (F10) Utility Guide. Support for security features may vary depending on your specific computer configuration. Service Reference Guide, dc7100 361288-003 3-13

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290

Service Reference Guide, dc7100
361288-003
3–13
Desktop Management
3.4 Asset Tracking and Security
Asset tracking features incorporated into the computer provide key asset tracking data that can be
managed using HP Insight Manager, HP Client Manager or other system management
applications. Seamless, automatic integration between asset tracking features and these products
enables you to choose the management tool that is best suited to your environment and to
leverage your investment in existing tools.
HP also offers several solutions for controlling access to valuable components and information.
ProtectTools Embedded Security, if installed, p
revents
unauthorized
access to data and checks
system integrity and authenticates third-party users attempting system access. (Refer to
HP
ProtectTools Embedded Security Guide,
on the
Documentation CD
for more information.)
Security features such as ProtectTools, the Smart Cover Sensor and the Smart Cover Lock,
available on select models, help to prevent unauthorized access to the internal components of the
personal computer. By disabling parallel, serial, or USB ports, or by disabling removable media
boot capability, you can protect valuable data assets. Memory Change and Smart Cover Sensor
alerts can be automatically forwarded to system management applications to deliver proactive
notification of tampering with a computer’s internal components.
ProtectTools, the Smart Cover Sensor, and the Smart Cover Lock are available as options on
select systems.
Use the following utilities to manage security settings on your
HP
computer:
Locally, using the Computer Setup Utilities. See the
Computer Setup (F10) Utility Guide
included with the computer for additional information and instructions on using the
Computer Setup Utilities.
Remotely, using HP Client Manager Software or System Software Manager. This software
enables the secure, consistent deployment and control of security settings from a simple
command-line utility.
Computer Setup Utilities (F10) Security Features
Feature
Description
Setup Password
Allows you to set and enable setup (administrator) password.
If the setup password is set, it is required to change
Computer Setup options, flash the ROM, and make changes
to certain plug and play settings under Windows.
See the
Troubleshooting Guide
on the
Documentation CD
for
more information.
Power-On Password
Allows you to set and enable power-on password.
See the
Troubleshooting Guide
on the
Documentation CD
for
more information.
Password Options
(This selection will appear only
if a power-on password is set.)
Allows you to specify whether the password is required for
warm boot (
CTRL
+
ALT
+
DEL
).
See the
Desktop Management Guide
on the
Documentation
CD
for more information.
For more information about Computer Setup, see the
Computer Setup (F10) Utility Guide
.
Support for security features may vary depending on your specific computer configuration.