Page 2
Windows is a U. S. registered trademark of Microsoft Corporation. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty.
Viewing Computer Setup System Information ... 21 Using Computer Setup System IDs ... 22 4 Using antivirus software 5 Using firewall software 6 Installing critical security updates 7 Using HP ProtectTools Security Manager (select models only) 8 Installing a security cable...
If the computer is stolen, CompuTrace can track the computer if the unauthorized user accesses the Internet. You must purchase the software and subscribe to the service in order to use CompuTrace. For information about ordering the CompuTrace software, see the HP Web site at http://www.hpshopping.com.
Manager passwords, can be enabled in Computer Setup to provide BIOS password protection in addition to their normal HP ProtectTools functions. The smart card PIN is used with a supported smart card reader, and the embedded security password is used with the optional embedded security chip.
Setting passwords in Windows Windows passwords Administrator password* User password* *For information about setting a Windows administrator password or a Windows user password, select Start > Help and Support. Function Protects access to a Windows administrator-level account. Protects access to a Windows user account. Setting passwords in Windows...
Setting passwords in Computer Setup Computer Setup passwords Setup password Power-on password DriveLock master password DriveLock user password Smart card PIN TPM embedded security password Chapter 2 Using passwords Function Protects access to Computer Setup. Protects access to the computer contents when the computer turns on, restarts, or exits Hibernation.
Setup password The Computer Setup setup password protects the configuration settings and system identification information in Computer Setup. After this password is set, it must be entered to access Computer Setup and to make changes using Computer Setup. Note the following characteristics of the setup password: ●...
Managing a setup password A setup password is set, changed, and deleted in Computer Setup. To manage, set, change, or delete this password, follow these steps: Open Computer Setup by turning on or restarting the computer, and then pressing “F10 = ROM Based Setup” message is displayed in the lower-left corner of the screen. Use the arrow keys to select Security >...
Entering a setup password At the Setup password prompt, type your setup password (using the same kind of keys you used to set the password), and then press enter. After 3 unsuccessful attempts to enter the setup password, you must restart the computer and try again. Setup password...
Power-on password The Computer Setup power-on password prevents unauthorized use of the computer. After this password is set, it must be entered each time the computer is turned on. Note the following characteristics of a power-on password: ● It is not displayed as it is set, entered, changed, or deleted. ●...
Managing a power-on password A power-on password is set, changed, and deleted in Computer Setup. To manage, set, change, or delete this password, follow these steps: Open Computer Setup by turning on or restarting the computer, and then pressing “F10 = ROM Based Setup” message is displayed in the lower-left corner of the screen. Use the arrow keys to select Security >...
Entering a power-on password At the Power-on Password prompt, type your password (using the same kind of keys you used to set the password), and then press enter. After 3 unsuccessful attempts to enter the password, you must turn off the computer, turn it back on, and then try again. Chapter 2 Using passwords...
Requiring a power-on password at restart In addition to requiring that a power-on password be entered each time the computer is turned on, you can also require that a power-on password be entered each time the computer is restarted. To enable and disable this feature in Computer Setup, follow these steps: Open Computer Setup by turning on or restarting the computer, and then pressing “F10 = ROM Based Setup”...
Using Computer Setup DriveLock CAUTION: To prevent the DriveLock-protected hard drive from becoming permanently unusable, record the DriveLock user password and the DriveLock master password in a safe place away from your computer. If you forget both DriveLock passwords, the hard drive will be permanently locked and can no longer be used.
Setting a DriveLock password To access the DriveLock settings in Computer Setup, follow these steps: Open Computer Setup by turning on or restarting the computer, and then pressing “F10 = ROM Based Setup” message is displayed in the lower-left corner of the screen. Use the arrow keys to select Security >...
Entering a DriveLock password Be sure that the hard drive is inserted into the computer (not into an optional docking device or external MultiBay). At the DriveLock Password prompt, type your user or master password (using the same kind of keys you used to set the password), and then press enter.
Changing a DriveLock password To access the DriveLock settings in Computer Setup, follow these steps: Open Computer Setup by turning on or restarting the computer, and then pressing “F10 = ROM Based Setup” message is displayed in the lower-left corner of the screen. Use the arrow keys to select Security >...
Removing DriveLock protection To access the DriveLock settings in Computer Setup, follow these steps: Open Computer Setup by turning on or restarting the computer, and then pressing “F10 = ROM Based Setup” message is displayed in the lower-left corner of the screen. Use the arrow keys to select Security >...
Using Computer Setup security features Securing system devices From the Boot options menu or the Port options menu in Computer Setup, you can disable or enable system devices. To disable or reenable system devices in Computer Setup, follow these steps: Open Computer Setup by turning on or restarting the computer, and then pressing “F10 = ROM Based Setup”...
Using Computer Setup stringent security CAUTION: To prevent the computer from becoming permanently unusable, record your configured setup password, power-on password, or smart card PIN in a safe place away from your computer. Without these passwords or PIN, the computer cannot be unlocked. The stringent security feature enhances power-on security by forcing user authentication with your configured setup password, power-on password, or smart card PIN before granting access to the system.
Setting stringent security To enable stringent security in Computer Setup, follow these steps: Open Computer Setup by turning on or restarting the computer, and then pressing “F10 = ROM Based Setup” message is displayed in the lower-left corner of the screen. Use the arrow keys to select Security >...
Removing stringent security To remove stringent security in Computer Setup, follow these steps: Open Computer Setup by turning on or restarting the computer, and then pressing “F10 = ROM Based Setup” message is displayed in the lower-left corner of the screen. Use the arrow keys to select Security >...
Viewing Computer Setup System Information The System Information feature in Computer Setup provides 2 types of system information: ● Identification information about the computer model and the batteries. ● Specification information about the processor, cache, memory, ROM, video revision, and keyboard controller revision.
Using Computer Setup System IDs The System IDs feature in Computer Setup allows you to display or enter the computer asset tag and ownership tag. NOTE: To prevent unauthorized access to this information, you must create a setup password in Computer Setup.
Using antivirus software When you use the computer to access e-mail, a network, or the Internet, you expose the computer to computer viruses. Computer viruses can disable the operating system, applications, or utilities, or cause them to function abnormally. Antivirus software can detect most viruses, destroy them, and in most cases, repair any damage they have caused.
Using firewall software When you use the computer to access e-mail, a network, or the Internet, unauthorized persons may be able to gain access to information about you, the computer, and your personal files. Use the firewall software preinstalled on the computer to protect your privacy. Firewall features include information on logging and reporting, and automatic alarms to monitor all incoming and outgoing traffic.
Installing critical security updates CAUTION: To protect the computer from security breaches and computer viruses, install the online critical updates from Microsoft as soon as you receive an alert. Updates to the operating system and other software may have become available after the computer was shipped.
Page 32
Select computer models include HP ProtectTools Security Manager. This software can be accessed through Windows Control Panel. It provides security features that help protect against unauthorized access to the computer, networks, and critical data. For more information, refer to the HP ProtectTools online Help.
Installing a security cable NOTE: The security cable is designed to act as a deterrent, but it may not prevent the computer from being mishandled or stolen. Loop the security cable around a secured object. Insert the key (1) into the cable lock (2). Insert the cable lock into the security cable slot on the computer (3), and then lock the cable lock with the key.