Dell Latitude D620 User Guide - Page 154

Computer Tracking Software, If Your Computer Is Lost or Stolen

Page 154 highlights

Securing Your Computer: Dell Latitude D620 User's Guide Activating the Security Management Software NOTE: You must first enable the TPM in order for the security management software to have full functionality. 1. Enable the TPM feature (see Enabling the TPM Feature). 2. Load the security management software: a. Turn on (or restart) your computer. b. When the DELL logo appears, press immediately. If you wait too long and the Windows logo appears, continue to wait until you see the Windows desktop. Then shut down your computer and try again. c. In the drop-down menu, select Wave EMBASSY Trust Suite and press to create the icons for the software components on the computer desktop. d. Press to exit the setup program. e. If prompted, click Save/Exit. Using the Security Management Software For information about how to use the software and the different security features, see the Getting Started Guide for the software: Click Start→ All Programs→ Wave EMBASSY Trust Suite→ Getting Started Guide. Computer Tracking Software Computer tracking software may enable you to locate your computer if it is lost or stolen. The software is optional and may be purchased when you order your Dell computer, or you can contact your Dell sales representative for information about this security feature. NOTE: Computer tracking software may not be available in certain countries. NOTE: If you have computer tracking software and your computer is lost or stolen, you must contact the company that provides the tracking service to report the missing computer. If Your Computer Is Lost or Stolen ● Call a law enforcement agency to report the lost or stolen computer. Include the Service Tag in file:///S|/Integration%20Specialist/Hardware%20Docu...on/Kim%20&%20Jay/Dell%20Laptops/D620UG/security.htm (8 of 9) [12/4/2008 10:54:46 AM]

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199

Securing Your Computer: Dell Latitude D620 User's Guide
Activating the Security Management Software
NOTE:
You must first enable the TPM in order for the security management software to have full
functionality.
1.
Enable the TPM feature (see
Enabling the TPM Feature
).
2.
Load the security management software:
a.
Turn on (or restart) your computer.
b.
When the DELL logo appears, press <F2> immediately. If you wait too long and the
Windows logo appears, continue to wait until you see the Windows desktop. Then shut down
your computer and try again.
c.
In the drop-down menu, select
Wave EMBASSY Trust Suite
and press <Enter> to create
the icons for the software components on the computer desktop.
d.
Press <Esc> to exit the setup program.
e.
If prompted, click
Save/Exit
.
Using the Security Management Software
For information about how to use the software and the different security features, see the
Getting Started
Guide
for the software:
Click
Start
All Programs
Wave EMBASSY Trust Suite
Getting Started Guide
.
Computer Tracking Software
Computer tracking software may enable you to locate your computer if it is lost or stolen. The software is
optional and may be purchased when you order your Dell computer, or you can contact your Dell sales
representative for information about this security feature.
NOTE:
Computer tracking software may not be available in certain countries.
NOTE:
If you have computer tracking software and your computer is lost or stolen, you must
contact the company that provides the tracking service to report the missing computer.
If Your Computer Is Lost or Stolen
Call a law enforcement agency to report the lost or stolen computer. Include the Service Tag in
file:///S|/Integration%20Specialist/Hardware%20Docu...on/Kim%20&%20Jay/Dell%20Laptops/D620UG/security.htm (8 of 9) [12/4/2008 10:54:46 AM]