HP 4410t HP 4410t Mobile Thin Client - Page 67
Security, Protecting the computer
UPC - 884962419915
View all HP 4410t manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 67 highlights
10 Security Protecting the computer NOTE: Security solutions are designed to act as deterrents. These deterrents may not prevent a product from being mishandled or stolen. Your computer is designed for security. All information is saved to the network and no user information can be stored on the computer. Additional security features provided with your computer can protect the computer and your data from a variety of risks. The way you use your computer will determine which security features you need to use. The Windows operating system offers certain security features. Additional security features are listed in the following table. Most of these additional security features can be configured in the Computer Setup utility (referred to hearafter as Computer Setup). NOTE: Computer Setup is a non-Windows utility accessed by pressing f10 when the computer is turned on or restarted. When using Computer Setup, you must use the keys on your computer to navigate and make selections. To protect against Use this security feature Unauthorized use of the computer Power-on authentication using passwords ● Administrator passwords ● User passwords Unauthorized access to Computer Setup (f10) Unauthorized reset of Computer Setup (f10) passwords Unauthorized access to data Setup password in Computer Setup Stringent security feature in Computer Setup Microsoft Windows Firewall-An improved Microsoft Windows Firewall (previously known as Internet Connection Firewall, or ICF) that prevents outside requests for data from entering the computer, unless specifically allowed by the user. Unauthorized access to Computer Setup settings and other system identification information NOTE: For more information on firewall software, refer to the firewall documentation or contact your firewall manufacturer for more information. Setup password in Computer Setup Unauthorized removal of the computer Security cable slot (used with an optional security cable) Protecting the computer 57