Dell D620 User Guide - Page 68

Security Management Software

Page 68 highlights

TPM is a hardware-based security feature that can be used to create and manage computer-generated encryption keys. When combined with security software, the TPM enhances existing network and computer security by enabling features such as file protection capabilities and protected e-mail. The TPM feature is enabled through a system setup option. NOTICE: To secure your TPM data and encryption keys, follow the backup procedures documented in the Broadcom Secure Foundation Getting Started Guide. In the event of these backups being incomplete, lost, or damaged, Dell will be unable to assist in the recovery of encrypted data. Enabling the TPM Feature 1. Enable the TPM software: a. Restart the computer and press during the Power On Self Test to enter the system setup program. b. Select Security® TPM Security and press . c. Under TPM Security, select On. d. Press to exit the setup program. e. If prompted, click Save/Exit. 2. Activate the TPM setup program: a. Restart the computer and press during the Power On Self Test to enter the system setup program. b. Select Security® TPM Activation and press . c. Under TPM Activation, select Activate and press . NOTE: You only need to activate the program once. d. Once the process is complete, the computer either restarts automatically or prompts you to restart your computer. Security Management Software The security management software is designed to utilize four different features to help you secure your computer: l Log-in management l Pre-boot authentication (using a fingerprint reader, smart card, or password) l Encryption l Private information management Activating the Security Management Software NOTE: You must first enable the TPM in order for the security management software to have full functionality. 1. Enable the TPM feature (see Enabling the TPM Feature). 2. Load the security management software: a. Turn on (or restart) your computer. b. When the DELL™ logo appears, press immediately. If you wait too long and the Windows logo appears, continue to wait until you see the Windows desktop. Then shut down your computer and try again. c. In the drop-down menu, select Wave EMBASSY Trust Suite and press to create the icons for the software components on the computer desktop. d. Press to exit the setup program. e. If prompted, click Save/Exit. Using the Security Management Software For information about how to use the software and the different security features, see the Getting Started Guide for the software: Click Start® All Programs® Wave EMBASSY Trust Suite® Getting Started Guide.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102

TPM is a hardware-based security feature that can be used to create and manage computer-generated encryption keys. When combined with security
software, the TPM enhances existing network and computer security by enabling features such as file protection capabilities and protected e-mail. The TPM
feature is enabled through a system setup option.
Enabling the TPM Feature
1.
Enable the TPM software:
a.
Restart the computer and press <F2> during the Power On Self Test to enter the system setup program.
b.
Select
Security
®
TPM Security
and press <Enter>.
c.
Under
TPM Security
, select
On
.
d.
Press <Esc> to exit the setup program.
e.
If prompted, click
Save/Exit
.
2.
Activate the TPM setup program:
a.
Restart the computer and press <F2> during the Power On Self Test to enter the system setup program.
b.
Select
Security
®
TPM Activation
and press <Enter>.
c.
Under
TPM Activation
, select
Activate
and press <Enter>.
d.
Once the process is complete, the computer either restarts automatically or prompts you to restart your computer.
Security Management Software
The security management software is designed to utilize four different features to help you secure your computer:
l
Log-in management
l
Pre-boot authentication (using a fingerprint reader, smart card, or password)
l
Encryption
l
Private information management
Activating the Security Management Software
1.
Enable the TPM feature (see
Enabling the TPM Feature
).
2.
Load the security management software:
a.
Turn on (or restart) your computer.
b.
When the DELL™ logo appears, press <F2> immediately. If you wait too long and the Windows logo appears, continue to wait until you see the
Windows desktop. Then shut down your computer and try again.
c.
In the drop-down menu, select
Wave EMBASSY Trust Suite
and press <Enter> to create the icons for the software components on the
computer desktop.
d.
Press <Esc> to exit the setup program.
e.
If prompted, click
Save/Exit
.
Using the Security Management Software
For information about how to use the software and the different security features, see the
Getting Started Guide
for the software:
Click
Start
®
All Programs
®
Wave EMBASSY Trust Suite
®
Getting Started Guide
.
NOTICE:
To secure your TPM data and encryption keys, follow the backup procedures documented in the
Broadcom Secure Foundation Getting Started
Guide
. In the event of these backups being incomplete, lost, or damaged, Dell will be unable to assist in the recovery of encrypted data.
NOTE:
You only need to activate the program once.
NOTE:
You must first enable the TPM in order for the security management software to have full functionality.