HP t420 Administrator Guide 8 - Page 172

security

Page 172 highlights

Registry key root/screensaver/off root/screensaver/origImageCopyPath root/screensaver/solidColor root/screensaver/standby root/screensaver/suspend root/screensaver/timeoutScreensaver root/screensaver/timeoutSleep root/screensaver/useSolidColor security Registry key root/security/SecurityFeaturs/ SpeculativeStoreBypassControl root/security/authenticationFailDelay root/security/domainEntryMode root/security/enableLockOverride root/security/enableSecretPeek root/security/encryption/identity/ encryptedSecretCipher root/security/encryption/identity/ encryptedSecretTTL root/security/encryption/identity/ encryptedSecretTTLnonSSO 160 Appendix D Registry keys Description Sets the timeout delay in minutes before the monitor turns off. This is the path where the custom image is saved when mode is set to Default. If useSolidColor is on and enableCustomLogo is off, this solid color is used for the screen saver. Sets the timeout delay in minutes before the monitor goes into standby mode. Sets the timeout delay in minutes before the monitor goes into suspend mode. Sets the timeout delay in minutes before the screen saver starts. Sets the timeout delay in minutes before the thin client goes into the Sleep state. If set to 1 and enableCustomLogo is off, the value of the solidColor key is used by the screen saver. Description Controls whether mitigations for Speculative Store Bypass (CVE-2018-3639) are enabled. By default, these mitigations are not enabled. To enable them, set the key value to on. For any change to this key to take effect, reboot the computer. Sets the approximate time, in milliseconds, to delay after a failed login attempt. The actual time will vary plus or minus 25% of this value. For example, use a value of 3000 to obtain a delay of approximately 3 seconds. If set to 1, the domain is expected to be entered in a separate text field labeled Domain. if set to 0, the domain is expected to be entered as part of the User field. If set to 1, administrators can override the screen lock of a local desktop. If set to 1, password and PIN dialogs will have a button that, while selected, will show the entered password/PIN in clear text. Sets the algorithm for symmetric encryption of a secret. All algorithms use an appropriate amount of random salt, which is regenerated each time the secret is stored. The encryption key is different on each thin client, and encryption and decryption are available only to authorized programs. The supported cipher list includes most OpenSSL ciphers and ChaCha20-Poly1305. Sets the number of seconds since the last successful login that a stored encrypted secret will be considered valid. If set to a negative number, encrypted secrets will not time out. Specifies the number of seconds that a stored, non-SSO encrypted secret is considered valid. If set to a nonpositive number, encrypted secrets do not time out.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184

Registry key
Description
root/screensaver/off
Sets the timeout delay in minutes before the monitor turns
off.
root/screensaver/origImageCopyPath
This is the path where the custom image is saved when
mode
is
set to
Default
.
root/screensaver/solidColor
If
useSolidColor
is on and
enableCustomLogo
is
off,
this
solid color is used for the screen saver.
root/screensaver/standby
Sets the timeout delay in minutes before the monitor goes into
standby mode.
root/screensaver/suspend
Sets the timeout delay in minutes before the monitor goes into
suspend mode.
root/screensaver/timeoutScreensaver
Sets the timeout delay in minutes before the screen saver starts.
root/screensaver/timeoutSleep
Sets the timeout delay in minutes before the thin client goes into
the Sleep state.
root/screensaver/useSolidColor
If set to 1 and
enableCustomLogo
is
off,
the value of the
solidColor
key is used by the screen saver.
security
Registry key
Description
root/security/SecurityFeaturs/
SpeculativeStoreBypassControl
Controls whether mitigations for Speculative Store Bypass
(CVE-2018-3639) are enabled. By default, these mitigations are
not enabled. To enable them, set the key value to on.
For any change to this key to take
effect,
reboot the computer.
root/security/authenticationFailDelay
Sets the approximate time, in milliseconds, to delay after a failed
login attempt. The actual time will vary plus or minus 25% of this
value. For example, use a value of 3000 to obtain a delay of
approximately 3 seconds.
root/security/domainEntryMode
If set to 1, the domain is expected to be entered in a separate text
field
labeled
Domain
. if set to 0, the domain is expected to be
entered as part of the
User
field.
root/security/enableLockOverride
If set to 1, administrators can override the screen lock of a local
desktop.
root/security/enableSecretPeek
If set to 1, password and PIN dialogs will have a button that, while
selected, will show the entered password/PIN in clear text.
root/security/encryption/identity/
encryptedSecretCipher
Sets the algorithm for symmetric encryption of a secret. All
algorithms use an appropriate amount of random salt, which is
regenerated each time the secret is stored. The encryption key is
different
on each thin client, and encryption and decryption are
available only to authorized programs. The supported cipher list
includes most OpenSSL ciphers and ChaCha20–Poly1305.
root/security/encryption/identity/
encryptedSecretTTL
Sets the number of seconds since the last successful login that a
stored encrypted secret will be considered valid. If set to a
negative number, encrypted secrets will not time out.
root/security/encryption/identity/
encryptedSecretTTLnonSSO
Specifies
the number of seconds that a stored, non-SSO encrypted
secret is considered valid. If set to a nonpositive number,
encrypted secrets do not time out.
160
Appendix D
Registry keys