HP 15-f300 User Guide - Page 54

Using HP Touchpoint Manager (select products only), Securing your wireless network

Page 54 highlights

To view or change the settings: 1. Select the Start button, select Settings, and then select Update & Security. 2. Select Windows Update, and then follow the on-screen instructions. 3. To schedule a time for installing updates, select Advanced Options, and then follow the on-screen instructions. Using HP Touchpoint Manager (select products only) HP Touchpoint Manager is a cloud-based IT solution that enables businesses to effectively manage and secure their company assets. HP Touchpoint Manager helps protect devices against malware and other attacks, monitors device health, and enables you to reduce time spent solving end-user device and security issues. You can quickly download and install the software, which is highly cost effective relative to traditional in-house solutions. Securing your wireless network When you set up a WLAN or access an existing WLAN, always enable security features to protect your network from unauthorized access. WLANs in public areas (hotspots) like coffee shops and airports may not provide any security. Backing up your software applications and information Regularly back up your software applications and information to protect them from being permanently lost or damaged through a virus attack or a software or hardware failure. Using an optional security cable A security cable, which is purchased separately, is designed to act as a deterrent, but it may not prevent the computer from being mishandled or stolen. Security cables are only one of several methods that should be employed as part of a complete security solution to help maximize theft protection. The security cable slot on your computer may look slightly different from the illustration in this section. 1. Loop the security cable around a secured object. 2. Insert the key (1) into the security cable lock (2). 44 Chapter 8 Securing your computer and information

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72

To view or change the settings:
1.
Select the
Start
button, select
Settings
, and then select
Update & Security
.
2.
Select
Windows Update
, and then follow the on-screen instructions.
3.
To schedule a time for installing updates, select
Advanced Options
, and then follow the on-screen
instructions.
Using HP Touchpoint Manager (select products only)
HP Touchpoint Manager is a cloud-based IT solution that enables businesses to
effectively
manage and
secure their company assets. HP Touchpoint Manager helps protect devices against malware and other
attacks, monitors device health, and enables you to reduce time spent solving end-user device and security
issues. You can quickly download and install the software, which is highly cost
effective
relative to traditional
in-house solutions.
Securing your wireless network
When you set up a WLAN or access an existing WLAN, always enable security features to protect your network
from unauthorized access. WLANs in public areas (hotspots) like
coffee
shops and airports may not provide
any security.
Backing up your software applications and information
Regularly back up your software applications and information to protect them from being permanently lost or
damaged through a virus attack or a software or hardware failure.
Using an optional security cable
A security cable, which is purchased separately, is designed to act as a deterrent, but it may not prevent the
computer from being mishandled or stolen. Security cables are only one of several methods that should be
employed as part of a complete security solution to help maximize theft protection.
The security cable slot on your computer may look slightly
different
from the illustration in this section.
1.
Loop the security cable around a secured object.
2.
Insert the key
(1)
into the security cable lock
(2)
.
44
Chapter 8
Securing your computer and information