HP Dc5800 HP Protect Tools Guide - Page 66

Power-on, authentication support, Reset to Factory, Settings, Reset to Factory Settings

Page 66 highlights

Software Impacted- Short description Details Solution Allow Security Manager to complete services loading message (seen at top of Security Manager window) and all plug-ins listed in left column. To avoid failure, allow a reasonable time for these plug-ins to load. HP ProtectTools * General -Unrestricted access or uncontrolled administrator privileges pose security risk. Numerous risks are possible with unrestricted access to the client PC: ● deletion of PSD ● malicious modification of user settings ● disabling of security policies and functions Administrators are encouraged to follow "best practices" in restricting end-user privileges and restricting user access. Unauthorized users should not be granted administrative privileges. BIOS and OS Embedded Security password are out of synch. If user does not validate a new password as the BIOS Embedded Security password, the BIOS Embedded Security password reverts back to the original embedded security password through F10 BIOS. This is functioning as designed; these passwords can be re-synchronized by changing the OS Basic User password and authenticating it at the BIOS Embedded Security password prompt. Only one user can log on to the system after TPM preboot authentication is enabled in BIOS. The TPM BIOS PIN is associated with the first user who initialize the user setting. If a computer has multiple users, the first user is, in essence, the administrator. The first user will have to give his TPM user PIN to other users to use to log in. This is functioning as designed; HP recommends that the customer's IT department follow good security policies for rolling out their security solution and ensuring that the BIOS administrator password is configured by IT administrators for system level protection. User has to change PIN to make TPM preboot work after a TPM factory reset. User has to change PIN or create another user to initialize his user setting to make TPM BIOS authentication work after reset. There is no option to make TPM BIOS authentication work. This is as designed, the factory reset clears the Basic User Key. The user must change his user PIN or create a new user to re-initialize the Basic User Key. Power-on authentication support not set to default using Embedded Security Reset to Factory Settings In Computer Setup, the Power-on authentication support option is not being reset to factory settings when using the Embedded Security Device option Reset to Factory Settings. By default, Power-on authentication support is set to Disable. The Reset to Factory Settings option disables Embedded Security Device, which hides the other Embedded Security options (including Power-on authentication support). However, after re-enabling Embedded Security Device, Power-on authentication support remained enabled. HP is working on a resolution, which will be provided in future Web-based ROM SoftPaq offerings. Security Power-On Authentication overlaps BIOS Password during boot sequence. Power-On Authentication prompts the user to log on to system using the TPM password, but, if the user presses F10 to access the BIOS, Read rights access only is granted. To be able to write to BIOS, the user must enter the BIOS password instead of the TPM password at the Power-on Authentication window. The BIOS asks for both the old and new passwords through Computer Setup after changing the Owner password in Embedded Security Windows software. The BIOS asks for both the old and new passwords through Computer Setup after changing the Owner password in Embedded Security Windows software. This is as designed. This is due to the inability of the BIOS to communicate with the TPM, once the operating system is up and running, and to verify the TPM pass phrase against the TPM key blob. 60 Chapter 8 Troubleshooting

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72

Software Impacted—
Short description
Details
Solution
Allow Security Manager to complete services loading
message (seen at top of Security Manager window) and
all plug-ins listed in left column. To avoid failure, allow
a reasonable time for these plug-ins to load.
HP ProtectTools * General
—Unrestricted access or
uncontrolled administrator
privileges pose security
risk.
Numerous risks are possible with
unrestricted access to the client PC:
deletion of PSD
malicious modification of user
settings
disabling of security policies and
functions
Administrators are encouraged to follow “best
practices” in restricting end-user privileges and
restricting user access.
Unauthorized users should not be granted
administrative privileges.
BIOS and OS Embedded
Security password are out
of synch.
If user does not validate a new password
as the BIOS Embedded Security
password, the BIOS Embedded Security
password reverts back to the original
embedded security password through
F10 BIOS.
This is functioning as designed; these passwords can
be re-synchronized by changing the OS Basic User
password and authenticating it at the BIOS Embedded
Security password prompt.
Only one user can log on
to the system after TPM
preboot authentication is
enabled in BIOS.
The TPM BIOS PIN is associated with
the first user who initialize the user
setting. If a computer has multiple users,
the first user is, in essence, the
administrator. The first user will have to
give his TPM user PIN to other users to
use to log in.
This is functioning as designed; HP recommends that
the customer's IT department follow good security
policies for rolling out their security solution and
ensuring that the BIOS administrator password is
configured by IT administrators for system level
protection.
User has to change PIN to
make TPM preboot work
after a TPM factory reset.
User has to change PIN or create
another user to initialize his user setting
to make TPM BIOS authentication work
after reset. There is no option to make
TPM BIOS authentication work.
This is as designed, the factory reset clears the Basic
User Key. The user must change his user PIN or create
a new user to re-initialize the Basic User Key.
Power-on
authentication support
not set to default using
Embedded Security
Reset to Factory
Settings
In Computer Setup, the
Power-on
authentication support
option is not
being reset to factory settings when
using the Embedded Security Device
option
Reset to Factory Settings
. By
default,
Power-on authentication
support
is set to
Disable
.
The
Reset to Factory Settings
option disables
Embedded Security Device, which hides the other
Embedded Security options (including
Power-on
authentication support
). However, after re-enabling
Embedded Security Device,
Power-on authentication
support
remained enabled.
HP is working on a resolution, which will be provided in
future Web-based ROM SoftPaq offerings.
Security Power-On
Authentication overlaps
BIOS Password during
boot sequence.
Power-On Authentication prompts the
user to log on to system using the TPM
password, but, if the user presses F10 to
access the BIOS, Read rights access
only is granted.
To be able to write to BIOS, the user must enter the
BIOS password instead of the TPM password at the
Power-on Authentication window.
The BIOS asks for both
the old and new
passwords through
Computer Setup after
changing the Owner
password in Embedded
Security Windows
software.
The BIOS asks for both the old and new
passwords through Computer Setup
after changing the Owner password in
Embedded Security Windows software.
This is as designed. This is due to the inability of the
BIOS to communicate with the TPM, once the operating
system is up and running, and to verify the TPM pass
phrase against the TPM key blob.
60
Chapter 8
Troubleshooting