HP Z600 HP Z600 Workstation Maintenance and Service Guide - Page 62

Workstation security, Asset tracking

Page 62 highlights

Workstation security This section provides information about providing system security through asset tracking, password security, hard disk drive locking, and chassis locks. This section includes these topics: Topics Asset tracking on page 50 SATA hard disk drive security on page 51 Password security on page 54 Chassis security on page 58 Asset tracking Asset tracking features incorporated into the workstation provide asset tracking data that can be managed using HP Systems Insight Manager (HP SIM), HP CMS, or other systems-management applications. Seamless, automatic integration between asset tracking features and these products enables you to choose the management tool that is best suited to the environment and to leverage investments in existing tools. HP also offers several solutions for controlling access to valuable components and information: ● HP ProtectTools Embedded Security prevents unauthorized access to data, checks system integrity, and authenticates third-party users attempting system access. ● Security features such as ProtectTools and the Side access panel sensor (Smart Cover Sensor) help prevent unauthorized access to the data and to the internal components of the workstation. ● By disabling parallel, serial, or USB ports, or by disabling removable-media boot capability, you can protect valuable data assets. ● Memory Change and Side access panel sensor (Smart Cover Sensor) alerts can be forwarded to system management applications to deliver proactive notification of tampering with a workstation's internal components. ProtectTools, the Side access panel sensor (Smart Cover Sensor), and the Side access panel solenoid lock (Hood Lock) are available as options on select systems. Use the following utilities to manage security settings on the HP workstation: ● Locally, using the Computer Setup (F10) Utility ● Remotely, using the HP CMS or System SSM, which enables the secure, consistent deployment and control of security settings from a simple command line utility For more information about the Computer Setup (F10) Utility, see The Computer Setup (F10) Utility menu on page 34. The following table and sections refer to the management of workstation security through the Computer Setup (F10) Utility 50 Chapter 4 System management ENWW

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237

Workstation security
This section provides information about providing system security through asset tracking, password
security, hard disk drive locking, and chassis locks.
This section includes these topics:
Topics
Asset tracking
on page
50
SATA hard disk drive security
on page
51
Password security
on page
54
Chassis security
on page
58
Asset tracking
Asset tracking features incorporated into the workstation provide asset tracking data that can be
managed using HP Systems Insight Manager (HP SIM), HP CMS, or other systems-management
applications.
Seamless, automatic integration between asset tracking features and these products enables you to
choose the management tool that is best suited to the environment and to leverage investments in
existing tools.
HP also offers several solutions for controlling access to valuable components and information:
HP ProtectTools Embedded Security prevents unauthorized access to data, checks system
integrity, and authenticates third-party users attempting system access.
Security features such as ProtectTools and the Side access panel sensor (Smart Cover Sensor)
help prevent unauthorized access to the data and to the internal components of the workstation.
By disabling parallel, serial, or USB ports, or by disabling removable-media boot capability, you
can protect valuable data assets.
Memory Change and Side access panel sensor (Smart Cover Sensor) alerts can be forwarded to
system management applications to deliver proactive notification of tampering with a workstation’s
internal components.
ProtectTools, the Side access panel sensor (Smart Cover Sensor), and the Side access panel solenoid
lock (Hood Lock) are available as options on select systems.
Use the following utilities to manage security settings on the HP workstation:
Locally, using the Computer Setup (F10) Utility
Remotely, using the HP CMS or System SSM, which enables the secure, consistent deployment
and control of security settings from a simple command line utility
For more information about the Computer Setup (F10) Utility, see
The Computer Setup (F10) Utility
menu
on page
34
.
The following table and sections refer to the management of workstation security through the Computer
Setup (F10) Utility
50
Chapter 4
System management
ENWW