HP 6080 Maintenance & Service Guide: HP Compaq 6000 and 6080 Pro Business - Page 29

Table 3-4, Option, Description, System Security

Page 29 highlights

Table 3-4 Computer Setup-Security (continued) Option Description System Security (some models: these options are hardware dependent) Data Execution Prevention (some models) (enable/disable) - Helps prevent operating system security breaches. PAVP (Some models) (disabled/min) - PAVP enables the Protected Audio Video Path in the Chipset. This may allow viewing of some protected high definition content that would otherwise be prohibited from playback. Virtualization Technology (some models) (enable/disable) - Controls the virtualization features of the processor. Changing this setting requires turning the computer off and then back on. Virtualization Technology Directed I/O (some models) (enable/disable) - Controls virtualization DMA remapping features of the chipset. Changing this setting requires turning the computer off and then back on. Trusted Execution Technology (some models) (enable/disable) - Controls the underlying processor and chipset features needed to support a virtual appliance. Changing this setting requires turning the computer off and then back on. To enable this feature you must enable the following features: ● Embedded Security Device Support ● Virtualization Technology ● Virtualization Technology Directed I/O Embedded Security Device Support (some models) (enable/disable) - Permits activation and deactivation of the Embedded Security Device. Changing this setting requires turning the computer off and then back on. NOTE: To configure the Embedded Security Device, a Setup password must be set. ● Reset to Factory Settings (some models) (Do not reset/Reset) - Resetting to factory defaults will erase all security keys. Changing this setting requires turning the computer off and then back on. CAUTION: The embedded security device is a critical component of many security schemes. Erasing the security keys will prevent access to data protected by the Embedded Security Device. Choosing Reset to Factory Settings may result in significant data loss. ● Power-on authentication support (some models) (enable/disable) - Controls the power-on password authentication scheme that utilizes the Embedded Security Device. Changing this setting requires turning the computer off and then back on. ● Reset authentication credentials (some models) (Do not reset/Reset) - Selecting Reset disables the power-on authentication support and clears the authentication information from the Embedded Security Device. Changing this setting requires turning the computer off and then back on. OS management of Embedded Security Device (some models) (enable/disable) - This option allows the user to limit operating system control of the Embedded Security Device. Changing this setting requires turning the computer off and then back on. This option allows the user to limit OS control of the Embedded Security Device. ● Reset of Embedded Security Device through OS (some models) (enable/disable) - This option allows the user to limit the operating system ability to request a Reset to Factory Settings of the Embedded Security Device. Changing this setting requires turning the computer off and then back on. NOTE: To enable this option, a Setup password must be set. Computer Setup (F10) Utilities 19

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225

Option
Description
System Security
(some models: these
options are hardware
dependent)
Data Execution Prevention (some models) (enable/disable) - Helps prevent operating system
security breaches.
PAVP (Some models) (disabled/min) - PAVP enables the Protected Audio Video Path in the
Chipset. This may allow viewing of some protected high definition content that would otherwise be
prohibited from playback.
Virtualization Technology (some models) (enable/disable) - Controls the virtualization features of
the processor. Changing this setting requires turning the computer off and then back on.
Virtualization Technology Directed I/O (some models) (enable/disable) - Controls virtualization
DMA remapping features of the chipset. Changing this setting requires turning the computer off
and then back on.
Trusted Execution Technology (some models) (enable/disable) - Controls the underlying
processor and chipset features needed to support a virtual appliance. Changing this setting
requires turning the computer off and then back on. To enable this feature you must enable the
following features:
Embedded Security Device Support
Virtualization Technology
Virtualization Technology Directed I/O
Embedded Security Device Support (some models) (enable/disable) - Permits activation and
deactivation of the Embedded Security Device. Changing this setting requires turning the
computer off and then back on.
NOTE:
To configure the Embedded Security Device, a Setup password must be set.
Reset to Factory Settings (some models) (Do not reset/Reset) - Resetting to factory defaults
will erase all security keys. Changing this setting requires turning the computer off and then
back on.
CAUTION:
The embedded security device is a critical component of many security
schemes. Erasing the security keys will prevent access to data protected by the Embedded
Security Device. Choosing Reset to Factory Settings may result in significant data loss.
Power-on authentication support (some models) (enable/disable) - Controls the power-on
password authentication scheme that utilizes the Embedded Security Device. Changing this
setting requires turning the computer off and then back on.
Reset authentication credentials (some models) (Do not reset/Reset) - Selecting Reset
disables the power-on authentication support and clears the authentication information from
the Embedded Security Device. Changing this setting requires turning the computer off and
then back on.
OS management of Embedded Security Device (some models) (enable/disable) - This option
allows the user to limit operating system control of the Embedded Security Device. Changing this
setting requires turning the computer off and then back on. This option allows the user to limit OS
control of the Embedded Security Device.
Reset of Embedded Security Device through OS (some models) (enable/disable) - This
option allows the user to limit the operating system ability to request a Reset to Factory
Settings of the Embedded Security Device. Changing this setting requires turning the
computer off and then back on.
NOTE:
To enable this option, a Setup password must be set.
Table 3-4
Computer Setup—Security (continued)
Computer Setup (F10) Utilities
19