HP ProBook 4440s HP Notebook Reference Guide - Page 60

Security, Protecting the computer - bios password

Page 60 highlights

7 Security Protecting the computer Computer security is essential for protecting the confidentiality, integrity, and availability of your information. Standard security features provided by the Windows operating system, the non-Windows Computer Setup utility (BIOS), and other third-party software can protect your personal settings and data from a variety of risks, such as viruses, worms, and other types of malicious code. NOTE: Security solutions are designed to act as deterrents. These deterrents may not prevent a product from being mishandled or stolen. NOTE: Before you send your computer for service, back up and delete confidential files, and remove all password settings. NOTE: Some features listed in this chapter may not be available on your computer. NOTE: Your computer supports Computrace, which is an online security-based tracking and recovery service available in select regions. If the computer is stolen, Computrace can track the computer if the unauthorized user accesses the Internet. You must purchase the software and subscribe to the service in order to use Computrace. For information about ordering the Computrace software, go to the HP website at http://www.hpshopping.com. If the computer is equipped with the following hardware and software, you can set the security level to balance the ease of use and the difficulty of breaching the security of the computer: ● If a webcam is installed or connected to the computer, and if the Face Recognition program is installed. ● If a fingerprint reader is installed or connected to the computer, and if HP Security Manager software is installed. For more information, see the HP ProtectTools Getting Started guide or the HP ProtectTools Security Manager software Help. Computer risk Security feature Unauthorized use of the computer HP ProtectTools Security Manager (select models only), in combination with a password, smart card, contactless card, registered face scenes, registered fingerprints, or other authentication credential. Unauthorized access to Computer Setup (f10) BIOS administrator password in Computer Setup* Unauthorized access to the contents of a hard drive DriveLock password in Computer Setup* Unauthorized startup from an optical drive, diskette drive, or Boot options feature in Computer Setup* internal network adapter 50 Chapter 7 Security

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92

7
Security
Protecting the computer
Computer security is essential for protecting the confidentiality, integrity, and availability of your
information. Standard security features provided by the Windows operating system, the non-Windows
Computer Setup utility (BIOS), and other third-party software can protect your personal settings and
data from a variety of risks, such as viruses, worms, and other types of malicious code.
NOTE:
Security solutions are designed to act as deterrents. These deterrents may not prevent a
product from being mishandled or stolen.
NOTE:
Before you send your computer for service, back up and delete confidential files, and
remove all password settings.
NOTE:
Some features listed in this chapter may not be available on your computer.
NOTE:
Your computer supports Computrace, which is an online security-based tracking and
recovery service available in select regions. If the computer is stolen, Computrace can track the
computer if the unauthorized user accesses the Internet. You must purchase the software and
subscribe to the service in order to use Computrace. For information about ordering the Computrace
software, go to the HP website at
.
If the computer is equipped with the following hardware and software, you can set the security level to
balance the ease of use and the difficulty of breaching the security of the computer:
If a webcam is installed or connected to the computer, and if the Face Recognition program is
installed.
If a fingerprint reader is installed or connected to the computer, and if HP Security Manager
software is installed.
For more information, see the
HP ProtectTools Getting Started
guide or the HP ProtectTools Security
Manager software Help.
Computer risk
Security feature
Unauthorized use of the computer
HP ProtectTools Security Manager (select models only), in
combination with a password, smart card, contactless card,
registered face scenes, registered fingerprints, or other
authentication credential.
Unauthorized access to Computer Setup (
f10
)
BIOS administrator password in Computer Setup*
Unauthorized access to the contents of a hard drive
DriveLock password in Computer Setup*
Unauthorized startup from an optical drive, diskette drive, or
internal network adapter
Boot options feature in Computer Setup*
50
Chapter 7
Security