Dell Latitude XT User's Guide - Page 115

Trusted Platform Module (TPM

Page 115 highlights

To continue, enter your password (with no more than eight characters) and press . If you do not enter a password within 2 minutes, the Tablet-PC returns to its previous operating state. If you enter the wrong password, a message tells you that the password is invalid. Press to try again. If you do not enter the correct password in three attempts, the Tablet-PC tries to start from another bootable device if the Boot First Device option in system setup is set to allow start-up from another device. If the Boot First Device option is not set to allow the Tablet-PC to start from another device, the Tablet-PC returns to the operating state it was in when you turned it on. If the hard drive password, the external hard drive password, and the primary password are the same, the Tablet-PC prompts you only for the primary password. If the hard drive password is different from the primary password, the Tablet-PC prompts you for both. Two different passwords provide greater security. NOTE: The administrator password provides access to the Tablet-PC, but it does not provide access to the hard drive when a hard drive password is assigned. Trusted Platform Module (TPM) NOTE: Computers shipping into China are not equipped with the TPM feature. NOTE: The TPM feature supports encryption only if the operating system supports TPM. For more information, see the TPM software documentation and the help files that came with the software. TPM is a hardware-based security feature that can be used to create and manage computer-generated encryption keys. When combined with security software, the TPM enhances existing network and computer security by enabling features such as file protection capabilities and protected e-mail. The TPM feature is enabled through a system setup option. NOTICE: To secure your TPM data and encryption keys, follow the backup procedures documented in the Broadcom Secure Foundation Getting Started Guide. In the event of these backups being incomplete, lost, or damaged, Dell will be unable to assist in the recovery of encrypted data. Securing Your Tablet-PC 115

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248

Securing Your Tablet-PC
115
To continue, enter your password (with no more than eight characters) and
press <Enter>.
If you do not enter a password within 2 minutes, the Tablet-PC returns to its
previous operating state.
If you enter the wrong password, a message tells you that the password is
invalid. Press <Enter> to try again.
If you do not enter the correct password in three attempts, the Tablet-PC tries
to start from another bootable device if the
Boot First Device
option in
system setup is set to allow start-up from another device. If the
Boot First
Device
option is not set to allow the Tablet-PC to start from another device,
the Tablet-PC returns to the operating state it was in when you turned it on.
If the hard drive password, the external hard drive password, and the primary
password are the same, the Tablet-PC prompts you only for the primary
password. If the hard drive password is different from the primary password,
the Tablet-PC prompts you for both. Two different passwords provide greater
security.
NOTE:
The administrator password provides access to the Tablet-PC, but it does
not provide access to the hard drive when a hard drive password is assigned.
Trusted Platform Module (TPM)
NOTE:
Computers shipping into China are not equipped with the TPM feature.
NOTE:
The TPM feature supports encryption only if the operating system supports
TPM. For more information, see the TPM software documentation and the help files
that came with the software.
TPM is a hardware-based security feature that can be used to create and
manage computer-generated encryption keys. When combined with security
software, the TPM enhances existing network and computer security by
enabling features such as file protection capabilities and protected e-mail.
The TPM feature is enabled through a system setup option.
NOTICE:
To secure your TPM data and encryption keys, follow the backup
procedures documented in the
Broadcom Secure Foundation Getting Started
Guide
. In the event of these backups being incomplete, lost, or damaged, Dell will
be unable to assist in the recovery of encrypted data.