HP Dragonfly Folio 13.5 User Guide - Page 51

Security, Protecting the computer, password settings.

Page 51 highlights

7 Security Computer security is essential for protecting the confidentiality, integrity, and availability of your information. Standard security solutions provided by the Windows operating system, HP applications, Computer Setup (BIOS), and other third-party software can help protect your computer from a variety of risks, such as viruses, worms, and other types of malicious code. NOTE: Some security features listed in this chapter might not be available on your computer. Protecting the computer Standard security features provided by the Windows operating system and Computer Setup (BIOS, which runs under any operating system) can protect your personal settings and data from a variety of risks. NOTE: Security solutions are designed to act as deterrents. These deterrents may not prevent a product from being mishandled or stolen. NOTE: Before you send your computer for service, back up and delete confidential files, and remove all password settings. NOTE: Some features listed in this chapter may not be available on your computer. NOTE: Your computer supports Computrace, which is an online security-based tracking and recovery service available in select regions. If the computer is stolen, Computrace can track the computer if the unauthorized user accesses the Internet. You must purchase the software and subscribe to the service to use Computrace. For information about ordering the Computrace software, go to http://www.hp.com. Table 7-1 Security solutions Computer risk Security feature Unauthorized use of the computer ● HP Client Security software, in combination with a password, smart card, contactless card, registered fingerprints, or other authentication credential ● BIOS power-on password Unauthorized access to Computer Setup (BIOS) BIOS administrator password in Computer Setup* Unauthorized access to the contents of a hard drive DriveLock password (select products only) in Computer Setup* Unauthorized startup from an optional external optical drive (select products only), optional external hard drive (select products only), or internal network adapter Boot options feature in Computer Setup* Unauthorized access to a Windows user account Windows user password Unauthorized access to data Windows BitLocker Unauthorized removal of the computer Security cable slot (used with an optional security cable on select products only) *Computer Setup is an embedded, ROM-based utility that can be used even when the operating system is not working or will not load. You can use a pointing device (touchpad, pointing stick, or USB mouse) or the keyboard to navigate and make selections in Computer Setup. NOTE: On tablets without keyboards, you can use the touch screen. 42 Chapter 7 Security

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91

Security
7
Computer security is essential for protecting the confidentiality, integrity, and availability of your information.
Standard security solutions provided by the Windows operating system, HP applications, Computer Setup
(BIOS), and other third-party software can help protect your computer from a variety of risks, such as viruses,
worms, and other types of malicious code.
NOTE:
Some security features listed in this chapter might not be available on your computer.
Protecting the computer
Standard security features provided by the Windows operating system and Computer Setup (BIOS, which runs
under any operating system) can protect your personal settings and data from a variety of risks.
NOTE:
Security solutions are designed to act as deterrents. These deterrents may not prevent a product
from being mishandled or stolen.
NOTE:
Before you send your computer for service, back up and delete confidential files, and remove all
password settings.
NOTE:
Some features listed in this chapter may not be available on your computer.
NOTE:
Your computer supports Computrace, which is an online security-based tracking and recovery
service available in select regions. If the computer is stolen, Computrace can track the computer if the
unauthorized user accesses the Internet. You must purchase the software and subscribe to the service to use
Computrace. For information about ordering the Computrace software, go to
.
Table 7-1
Security solutions
Computer risk
Security feature
Unauthorized use of the computer
HP Client Security software, in combination with a password,
smart card, contactless card, registered fingerprints, or
other authentication credential
BIOS power-on password
Unauthorized access to Computer Setup (BIOS)
BIOS administrator password in Computer Setup*
Unauthorized access to the contents of a hard drive
DriveLock password (select products only) in Computer Setup*
Unauthorized startup from an optional external optical drive
(select products only), optional external hard drive (select
products only), or internal network adapter
Boot options feature in Computer Setup*
Unauthorized access to a Windows user account
Windows user password
Unauthorized access to data
Windows BitLocker
Unauthorized removal of the computer
Security cable slot (used with an optional security cable on select
products only)
*Computer Setup is an embedded, ROM-based utility that can be used even when the operating system is not working or will not load.
You can use a pointing device (touchpad, pointing stick, or USB mouse) or the keyboard to navigate and make selections in Computer
Setup.
NOTE:
On tablets without keyboards, you can use the touch screen.
42
Chapter 7
Security