HP ProBook 4525s HP Notebook Reference Guide - Windows 7 - Page 63

Security, Protecting the computer - bios recovery

Page 63 highlights

7 Security Protecting the computer Standard security features provided by the Windows operating system and the non-Windows Computer Setup can protect your personal settings and data from a variety of risks. NOTE: Security solutions are designed to act as deterrents. These deterrents may not prevent a product from being mishandled or stolen. NOTE: Before you send your computer for service, back up and delete confidential files, and remove all password settings. NOTE: Some features listed in this chapter may not be available on your computer. NOTE: Your computer supports CompuTrace, which is an online security-based tracking and recovery service available in select regions. If the computer is stolen, CompuTrace can track the computer if the unauthorized user accesses the Internet. You must purchase the software and subscribe to the service in order to use CompuTrace. For information about ordering the CompuTrace software, go to the HP Web site at http://www.hpshopping.com. Computer risk Security feature Unauthorized use of the computer HP ProtectTools Security Manager, in combination with a password, smart card, and/or fingerprint reader. Unauthorized access to Computer Setup (f10) BIOS administrator password in Computer Setup* Unauthorized access to the contents of a hard drive DriveLock password in Computer Setup* Unauthorized startup from an optical drive, diskette drive, or Boot options feature in Computer Setup* internal network adapter Unauthorized access to a Windows user account Unauthorized access to data HP ProtectTools Security Manager ● Firewall software ● Windows updates ● Drive Encryption for HP ProtectTools Unauthorized access to Computer Setup settings and other BIOS administrator password in Computer Setup* system identification information Unauthorized removal of the computer Security cable slot (used with an optional security cable) *Computer Setup is a preinstalled, ROM-based utility that can be used even when the operating system is not working or will not load. You can use either a pointing device (TouchPad, pointing stick, or USB mouse) or the keyboard to navigate and make selections in Computer Setup. Protecting the computer 53

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95

7
Security
Protecting the computer
Standard security features provided by the Windows operating system and the non-Windows Computer
Setup can protect your personal settings and data from a variety of risks.
NOTE:
Security solutions are designed to act as deterrents. These deterrents may not prevent a
product from being mishandled or stolen.
NOTE:
Before you send your computer for service, back up and delete confidential files, and remove
all password settings.
NOTE:
Some features listed in this chapter may not be available on your computer.
NOTE:
Your computer supports CompuTrace, which is an online security-based tracking and recovery
service available in select regions. If the computer is stolen, CompuTrace can track the computer if the
unauthorized user accesses the Internet. You must purchase the software and subscribe to the service
in order to use CompuTrace. For information about ordering the CompuTrace software, go to the HP
Web site at
.
Computer risk
Security feature
Unauthorized use of the computer
HP ProtectTools Security Manager, in combination with a
password, smart card, and/or fingerprint reader.
Unauthorized access to Computer Setup (
f10
)
BIOS administrator password in Computer Setup*
Unauthorized access to the contents of a hard drive
DriveLock password in Computer Setup*
Unauthorized startup from an optical drive, diskette drive, or
internal network adapter
Boot options feature in Computer Setup*
Unauthorized access to a Windows user account
HP ProtectTools Security Manager
Unauthorized access to data
Firewall software
Windows updates
Drive Encryption for HP ProtectTools
Unauthorized access to Computer Setup settings and other
system identification information
BIOS administrator password in Computer Setup*
Unauthorized removal of the computer
Security cable slot (used with an optional security cable)
*Computer Setup is a preinstalled, ROM-based utility that can be used even when the operating system is not working or will
not load. You can use either a pointing device (TouchPad, pointing stick, or USB mouse) or the keyboard to navigate and make
selections in Computer Setup.
Protecting the computer
53