Dell Latitude D631 User's Guide - Page 74

Trusted Platform Module (TPM), Enabling the TPM Feature, Security Management Software

Page 74 highlights

NOTE: The administrator password provides access to the computer, but it does not provide access to the hard drive when a hard drive password is assigned. Trusted Platform Module (TPM) NOTE: Computers shipping into China are not equipped with the TPM feature. NOTE: The TPM feature supports encryption only if the operating system supports TPM. For more information, see the TPM software documentation and the help files that came with the software. TPM is a hardware-based security feature that can be used to create and manage computer-generated encryption keys. When combined with security software, the TPM enhances existing network and computer security by enabling features such as file protection capabilities and protected e-mail. The TPM feature is enabled through a system setup option. NOTICE: To secure your TPM data and encryption keys, follow the backup procedures documented in the Broadcom Secure Foundation Getting Started Guide. In the event of these backups being incomplete, lost, or damaged, Dell will be unable to assist in the recovery of encrypted data. Enabling the TPM Feature 1 Enable the TPM software: a Restart the computer and press during the Power On Self Test to enter the system setup program. b Select Security→ TPM Security and press . c Under TPM Security, select On. d Press to exit the setup program. e If prompted, click Save/Exit. 2 Activate the TPM setup program: a Restart the computer and press during the Power On Self Test to enter the system setup program. b Select Security→ TPM Activation and press . c Under TPM Activation, select Activate and press . NOTE: You only need to activate the program once. d Once the process is complete, the computer either restarts automatically or prompts you to restart your computer. Security Management Software The security management software is designed to utilize four different features to help you secure your computer: • Log-in management 74 Securing Your Computer

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164

74
Securing Your Computer
NOTE:
The administrator password provides access to the computer, but it does not provide access to the hard
drive when a hard drive password is assigned.
Trusted Platform Module (TPM)
NOTE:
Computers shipping into China are not equipped with the TPM feature.
NOTE:
The TPM feature supports encryption only if the operating system supports TPM. For more information, see
the TPM software documentation and the help files that came with the software.
TPM is a hardware-based security feature that can be used to create and manage computer-generated
encryption keys. When combined with security software, the TPM enhances existing network and
computer security by enabling features such as file protection capabilities and protected e-mail. The
TPM feature is enabled through a system setup option.
NOTICE:
To secure your TPM data and encryption keys, follow the backup procedures documented in the
Broadcom Secure Foundation Getting Started Guide
. In the event of these backups being incomplete, lost, or
damaged, Dell will be unable to assist in the recovery of encrypted data.
Enabling the TPM Feature
1
Enable the TPM software:
a
Restart the computer and press <F2> during the Power On Self Test to enter the system setup
program.
b
Select
Security
TPM Security
and press <Enter>.
c
Under
TPM Security
, select
On
.
d
Press <Esc> to exit the setup program.
e
If prompted, click
Save/Exit
.
2
Activate the TPM setup program:
a
Restart the computer and press <F2> during the Power On Self Test to enter the system setup
program.
b
Select
Security
TPM Activation
and press <Enter>.
c
Under
TPM Activation
, select
Activate
and press <Enter>.
NOTE:
You only need to activate the program once.
d
Once the process is complete, the computer either restarts automatically or prompts you to restart
your computer.
Security Management Software
The security management software is designed to utilize four different features to help you secure your
computer:
Log-in management