HP RP3 Maintenance & Service Guide HP RP3 Retail System Model 3100 - Page 60

Table A-4, System Security, DriveLock Security

Page 60 highlights

Table A-4 Computer Setup-Security (continued) System Security (these options are hardware dependent) Data Execution Prevention (enable/disable) - Helps prevent operating system security breaches. Default is enabled. SVM CPU Virtualization (enable/disable). Controls the virtualization features of the processor. Changing this setting requires turning the computer off and then back on. Default is disabled. Virtualization Technology (VTx) (enable/disable) - Controls the virtualization features of the processor. Changing this setting requires turning the computer off and then back on. Default is disabled. Virtualization Technology Directed I/O (VTd) (enable/disable) - Controls virtualization DMA remapping features of the chipset. Changing this setting requires turning the computer off and then back on. Default is disabled. Trusted Execution Technology (enable/disable) - Controls the underlying processor and chipset features needed to support a virtual appliance. Changing this setting requires turning the computer off and then back on. Default is disabled. To enable this feature you must enable the following features: ● Embedded Security Device Support ● Virtualization Technology ● Virtualization Technology Directed I/O Embedded Security Device (enable/disable) - Permits activation and deactivation of the Embedded Security Device. NOTE: To configure the Embedded Security Device, a Setup password must be set. ● Reset to Factory Settings (Do not reset/Reset) - Resetting to factory defaults will erase all security keys and leave the device in a disabled state. Changing this setting requires that you restart the computer. Default is Do not reset. CAUTION: The embedded security device is a critical component of many security schemes. Erasing the security keys will prevent access to data protected by the Embedded Security Device. Choosing Reset to Factory Settings may result in significant data loss. ● Measure boot variables/devices to PCR1 - Typically, the computer measures the boot path and saves collected metrics to PCR5 (a register in the Embedded Security Device). Bitlocker tracks changes to any of these metrics, and forces the user to re-authenticate if it detects any changes. Enabling this feature lets you set Bitlocker to ignore detected changes to boot path metrics, thereby avoiding re-authentication issues associated with USB keys inserted in a port. Default is enabled. System Security (continued) OS management of Embedded Security Device (enable/disable) - This option allows the user to limit OS control of the Embedded Security Device. Default is enabled. This option is automatically disabled if Trusted Execution Technology is enabled. ● Reset of Embedded Security Device through OS (enable/disable) - This option allows the user to limit the operating system ability to request a Reset to Factory Settings of the Embedded Security Device. Default is disabled. NOTE: To enable this option, a Setup password must be set. DriveLock Security Allows you to assign or modify a master or user password for hard drives. When this feature is enabled, the user is prompted to provide one of the DriveLock passwords during POST. If neither is successfully entered, the hard drive will remain inaccessible until one of the passwords is successfully provided during a subsequent cold-boot sequence. NOTE: This selection will only appear when at least one drive that supports the DriveLock feature is attached to the system. Computer Setup (F10) Utilities 53

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140

Table A-4
Computer Setup—Security (continued)
System Security
(these options are
hardware dependent)
Data Execution Prevention (enable/disable) - Helps prevent operating system security breaches.
Default is enabled.
SVM CPU Virtualization (enable/disable). Controls the virtualization features of the processor.
Changing this setting requires turning the computer off and then back on. Default is disabled.
Virtualization Technology (VTx) (enable/disable) - Controls the virtualization features of the
processor. Changing this setting requires turning the computer off and then back on. Default is
disabled.
Virtualization Technology Directed I/O (VTd) (enable/disable) - Controls virtualization DMA
remapping features of the chipset. Changing this setting requires turning the computer off and
then back on. Default is disabled.
Trusted Execution Technology (enable/disable) - Controls the underlying processor and chipset
features needed to support a virtual appliance. Changing this setting requires turning the
computer off and then back on. Default is disabled. To enable this feature you must enable the
following features:
Embedded Security Device Support
Virtualization Technology
Virtualization Technology Directed I/O
Embedded Security Device (enable/disable) - Permits activation and deactivation of the
Embedded Security Device.
NOTE:
To configure the Embedded Security Device, a Setup password must be set.
Reset to Factory Settings (Do not reset/Reset) - Resetting to factory defaults will erase all
security keys and leave the device in a disabled state. Changing this setting requires that
you restart the computer. Default is Do not reset.
CAUTION:
The embedded security device is a critical component of many security
schemes. Erasing the security keys will prevent access to data protected by the Embedded
Security Device. Choosing Reset to Factory Settings may result in significant data loss.
Measure boot variables/devices to PCR1 - Typically, the computer measures the boot path
and saves collected metrics to PCR5 (a register in the Embedded Security Device). Bitlocker
tracks changes to any of these metrics, and forces the user to re-authenticate if it detects
any changes. Enabling this feature lets you set Bitlocker to ignore detected changes to boot
path metrics, thereby avoiding re-authentication issues associated with USB keys inserted in
a port. Default is enabled.
System Security
(continued)
OS management of Embedded Security Device (enable/disable) - This option allows the user to
limit OS control of the Embedded Security Device. Default is enabled. This option is automatically
disabled if Trusted Execution Technology is enabled.
Reset of Embedded Security Device through OS (enable/disable) - This option allows the
user to limit the operating system ability to request a Reset to Factory Settings of the
Embedded Security Device. Default is disabled.
NOTE:
To enable this option, a Setup password must be set.
DriveLock Security
Allows you to assign or modify a master or user password for hard drives. When this feature is
enabled, the user is prompted to provide one of the DriveLock passwords during POST. If neither
is successfully entered, the hard drive will remain inaccessible until one of the passwords is
successfully provided during a subsequent cold-boot sequence.
NOTE:
This selection will only appear when at least one drive that supports the DriveLock
feature is attached to the system.
Computer Setup (F10) Utilities
53