HP mt40 Administrator Reference Guide - Page 44
Security, Protecting the computer
View all HP mt40 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 44 highlights
10 Security Protecting the computer NOTE: Security solutions are designed to act as deterrents. These deterrents may not prevent a product from being mishandled or stolen. Security features provided with your computer can protect the computer and your data from a variety of risks. The way you use your computer will determine which security features you need to use. The Windows operating system offers certain security features. Additional security features are listed in the following table. Most of these additional security features can be configured in the Computer Setup utility (referred to hereafter as Computer Setup). NOTE: Computer Setup is a non-Windows utility accessed by pressing f10 when the computer is turned on or restarted. When using Computer Setup, you must use the keys on your computer to navigate and make selections. To protect against Unauthorized use of the computer Unauthorized access to Computer Setup (f10) Unauthorized reset of Computer Setup (f10) passwords Unauthorized access to data Unauthorized access to Computer Setup (f10) settings and other system identification information Unauthorized removal of the computer Use this security feature Power-on authentication using passwords ● Administrator passwords ● User passwords Setup password in Computer Setup Stringent security feature in Computer Setup Microsoft Windows Firewall-An improved Microsoft Windows Firewall (previously known as Internet Connection Firewall, or ICF) that prevents outside requests for data from entering the computer, unless specifically allowed by the user. NOTE: For more information on firewall software, refer to the firewall documentation or contact your firewall manufacturer for more information. Setup password in Computer Setup Security cable slot (used with an optional security cable) 34 Chapter 10 Security