HP 4410t HP 4410t Mobile Thin Client - Page 67

Security, Protecting the computer

Page 67 highlights

10 Security Protecting the computer NOTE: Security solutions are designed to act as deterrents. These deterrents may not prevent a product from being mishandled or stolen. Your computer is designed for security. All information is saved to the network and no user information can be stored on the computer. Additional security features provided with your computer can protect the computer and your data from a variety of risks. The way you use your computer will determine which security features you need to use. The Windows operating system offers certain security features. Additional security features are listed in the following table. Most of these additional security features can be configured in the Computer Setup utility (referred to hearafter as Computer Setup). NOTE: Computer Setup is a non-Windows utility accessed by pressing f10 when the computer is turned on or restarted. When using Computer Setup, you must use the keys on your computer to navigate and make selections. To protect against Use this security feature Unauthorized use of the computer Power-on authentication using passwords ● Administrator passwords ● User passwords Unauthorized access to Computer Setup (f10) Unauthorized reset of Computer Setup (f10) passwords Unauthorized access to data Setup password in Computer Setup Stringent security feature in Computer Setup Microsoft Windows Firewall-An improved Microsoft Windows Firewall (previously known as Internet Connection Firewall, or ICF) that prevents outside requests for data from entering the computer, unless specifically allowed by the user. Unauthorized access to Computer Setup settings and other system identification information NOTE: For more information on firewall software, refer to the firewall documentation or contact your firewall manufacturer for more information. Setup password in Computer Setup Unauthorized removal of the computer Security cable slot (used with an optional security cable) Protecting the computer 57

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104

10
Security
Protecting the computer
NOTE:
Security solutions are designed to act as deterrents. These deterrents may not prevent a
product from being mishandled or stolen.
Your computer is designed for security. All information is saved to the network and no user information
can be stored on the computer.
Additional security features provided with your computer can protect the computer and your data from
a variety of risks. The way you use your computer will determine which security features you need to
use.
The Windows operating system offers certain security features. Additional security features are listed
in the following table. Most of these additional security features can be configured in the Computer Setup
utility (referred to hearafter as Computer Setup).
NOTE:
Computer Setup is a non-Windows utility accessed by pressing f10 when the computer is
turned on or restarted. When using Computer Setup, you must use the keys on your computer to
navigate and make selections.
To protect against
Use this security feature
Unauthorized use of the computer
Power-on authentication using passwords
Administrator passwords
User passwords
Unauthorized access to Computer Setup (
f10
)
Setup password in Computer Setup
Unauthorized reset of Computer Setup (
f10
) passwords
Stringent security feature in Computer Setup
Unauthorized access to data
Microsoft Windows Firewall—An improved Microsoft Windows
Firewall (previously known as Internet Connection Firewall, or
ICF) that prevents outside requests for data from entering the
computer, unless specifically allowed by the user.
NOTE:
For more information on firewall software, refer to the
firewall documentation or contact your firewall manufacturer
for more information.
Unauthorized access to Computer Setup settings and other
system identification information
Setup password in Computer Setup
Unauthorized removal of the computer
Security cable slot (used with an optional security cable)
Protecting the computer
57