HP 2133 Security - Windows XP and Windows Vista - Page 23

Using Computer Setup security features, Securing system devices

Page 23 highlights

3 Using Computer Setup security features Securing system devices From the Boot options menu or the Port options menu in Computer Setup, you can disable or enable system devices. To disable or reenable system devices in Computer Setup, follow these steps: 1. Open Computer Setup by turning on or restarting the computer, and then pressing f10 while the "F10 = ROM Based Setup" message is displayed in the lower-left corner of the screen. 2. Use the arrow keys to select System Configuration > Boot options or System Configuration > Port options. Then press enter and use the arrow keys to select the options you want. 3. To confirm your preferences, press f10. 4. To save your preferences, use the arrow keys to select File > Save changes and exit. Then follow the instructions on the screen. Your preferences go into effect when the computer restarts. Securing system devices 17

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33

3
Using Computer Setup security features
Securing system devices
From the Boot options menu or the Port options menu in Computer Setup, you can disable or enable
system devices.
To disable or reenable system devices in Computer Setup, follow these steps:
1.
Open Computer Setup by turning on or restarting the computer, and then pressing
f10
while the
“F10 = ROM Based Setup” message is displayed in the lower-left corner of the screen.
2.
Use the arrow keys to select
System Configuration
>
Boot options
or
System Configuration
>
Port options
. Then press
enter
and use the arrow keys to select the options you want.
3.
To confirm your preferences, press
f10
.
4.
To save your preferences, use the arrow keys to select
File
>
Save changes and exit
. Then follow
the instructions on the screen.
Your preferences go into effect when the computer restarts.
Securing system devices
17