HP mt40 Administrator Reference Guide - Page 44

Security, Protecting the computer

Page 44 highlights

10 Security Protecting the computer NOTE: Security solutions are designed to act as deterrents. These deterrents may not prevent a product from being mishandled or stolen. Security features provided with your computer can protect the computer and your data from a variety of risks. The way you use your computer will determine which security features you need to use. The Windows operating system offers certain security features. Additional security features are listed in the following table. Most of these additional security features can be configured in the Computer Setup utility (referred to hereafter as Computer Setup). NOTE: Computer Setup is a non-Windows utility accessed by pressing f10 when the computer is turned on or restarted. When using Computer Setup, you must use the keys on your computer to navigate and make selections. To protect against Unauthorized use of the computer Unauthorized access to Computer Setup (f10) Unauthorized reset of Computer Setup (f10) passwords Unauthorized access to data Unauthorized access to Computer Setup (f10) settings and other system identification information Unauthorized removal of the computer Use this security feature Power-on authentication using passwords ● Administrator passwords ● User passwords Setup password in Computer Setup Stringent security feature in Computer Setup Microsoft Windows Firewall-An improved Microsoft Windows Firewall (previously known as Internet Connection Firewall, or ICF) that prevents outside requests for data from entering the computer, unless specifically allowed by the user. NOTE: For more information on firewall software, refer to the firewall documentation or contact your firewall manufacturer for more information. Setup password in Computer Setup Security cable slot (used with an optional security cable) 34 Chapter 10 Security

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82

10
Security
Protecting the computer
NOTE:
Security solutions are designed to act as deterrents. These deterrents may not prevent a
product from being mishandled or stolen.
Security features provided with your computer can protect the computer and your data from a variety
of risks. The way you use your computer will determine which security features you need to use.
The Windows operating system offers certain security features. Additional security features are listed
in the following table. Most of these additional security features can be configured in the Computer
Setup utility (referred to hereafter as Computer Setup).
NOTE:
Computer Setup is a non-Windows utility accessed by pressing
f10
when the computer is
turned on or restarted. When using Computer Setup, you must use the keys on your computer to
navigate and make selections.
To protect against
Use this security feature
Unauthorized use of the computer
Power-on authentication using passwords
Administrator passwords
User passwords
Unauthorized access to Computer Setup (
f10
)
Setup password in Computer Setup
Unauthorized reset of Computer Setup (
f10
) passwords
Stringent security feature in Computer Setup
Unauthorized access to data
Microsoft Windows Firewall—An improved Microsoft
Windows Firewall (previously known as Internet Connection
Firewall, or ICF) that prevents outside requests for data from
entering the computer, unless specifically allowed by the
user.
NOTE:
For more information on firewall software, refer to
the firewall documentation or contact your firewall
manufacturer for more information.
Unauthorized access to Computer Setup (
f10
) settings and
other system identification information
Setup password in Computer Setup
Unauthorized removal of the computer
Security cable slot (used with an optional security cable)
34
Chapter 10
Security