Dell Latitude D631 User's Guide - Page 75

Activating the Security Management Software, Computer Tracking Software

Page 75 highlights

• Pre-boot authentication (using a fingerprint reader, smart card, or password) • Encryption • Private information management Activating the Security Management Software NOTE: You must first enable the TPM in order for the security management software to have full functionality. 1 Enable the TPM feature (see "Enabling the TPM Feature" on page 74). 2 Load the security management software: a Turn on (or restart) your computer. b When the DELL™ logo appears, press immediately. If you wait too long and the Windows logo appears, continue to wait until you see the Windows desktop. Then shut down your computer and try again. c In the drop-down menu, select Wave EMBASSY Trust Suite and press to create the icons for the software components on the computer desktop. d Press to exit the setup program. e If prompted, click Save/Exit. Using the Security Management Software For information about how to use the software and the different security features, see the Getting Started Guide for the software: Click Start→ All Programs→ Wave EMBASSY Trust Suite→ Getting Started Guide. Computer Tracking Software Computer tracking software may enable you to locate your computer if it is lost or stolen. The software is optional and may be purchased when you order your Dell™ computer, or you can contact your Dell sales representative for information about this security feature. NOTE: Computer tracking software may not be available in certain countries. NOTE: If you have computer tracking software and your computer is lost or stolen, you must contact the company that provides the tracking service to report the missing computer. If Your Computer Is Lost or Stolen • Call a law enforcement agency to report the lost or stolen computer. Include the Service Tag in your description of the computer. Ask that a case number be assigned and write down the number, along with the name, address, and phone number of the law enforcement agency. If possible, obtain the name of the investigating officer. Securing Your Computer 75

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164

Securing Your Computer
75
Pre-boot authentication (using a fingerprint reader, smart card, or password)
Encryption
Private information management
Activating the Security Management Software
NOTE:
You must first enable the TPM in order for the security management software to have full functionality.
1
Enable the TPM feature (see "Enabling the TPM Feature" on page 74).
2
Load the security management software:
a
Turn on (or restart) your computer.
b
When the DELL™ logo appears, press <F2> immediately. If you wait too long and the Windows
logo appears, continue to wait until you see the Windows desktop. Then shut down your computer
and try again.
c
In the drop-down menu, select
Wave EMBASSY Trust Suite
and press <Enter> to create the
icons for the software components on the computer desktop.
d
Press <Esc> to exit the setup program.
e
If prompted, click
Save/Exit
.
Using the Security Management Software
For information about how to use the software and the different security features, see the
Getting Started
Guide
for the software:
Click
Start
All Programs
Wave EMBASSY Trust Suite
Getting Started Guide
.
Computer Tracking Software
Computer tracking software may enable you to locate your computer if it is lost or stolen. The software is
optional and may be purchased when you order your Dell™ computer, or you can contact your Dell sales
representative for information about this security feature.
NOTE:
Computer tracking software may not be available in certain countries.
NOTE:
If you have computer tracking software and your computer is lost or stolen, you must contact the company
that provides the tracking service to report the missing computer.
If Your Computer Is Lost or Stolen
Call a law enforcement agency to report the lost or stolen computer. Include the Service Tag in your
description of the computer. Ask that a case number be assigned and write down the number, along
with the name, address, and phone number of the law enforcement agency. If possible, obtain the
name of the investigating officer.