Asset Tracking And Security - HP DC7600 - Management Manual

Business pcs
Hide thumbs Also See for DC7600 - HP:
Table of Contents

Advertisement

Desktop Management Guide

Asset Tracking and Security

24
Asset tracking features incorporated into the computer provide key
asset tracking data that can be managed using HP Systems Insight
Manager, HP Client Manager or other system management
applications. Seamless, automatic integration between asset tracking
features and these products enables you to choose the management
tool that is best suited to the environment and to leverage the
investment in existing tools.
HP also offers several solutions for controlling access to valuable
components and information. HP Embedded Security for
ProtectTools, if installed, p
checks system integrity and authenticates third-party users attempting
system access. (For more information, refer to the HP ProtectTools
Security Manager Guide at
HP Embedded Security for ProtectTools, the Smart Cover Sensor and
the Smart Cover Lock, available on some models, help to prevent
unauthorized access to the internal components of the personal
computer. By disabling parallel, serial, or USB ports, or by disabling
removable media boot capability, you can protect valuable data assets.
Memory Change and Smart Cover Sensor alerts can be automatically
forwarded to system management applications to deliver proactive
notification of tampering with a computer's internal components.
HP Embedded Security for ProtectTools, the Smart Cover Sensor, and
the Smart Cover Lock are available as options on some systems.
Use the following utilities to manage security settings on the HP
computer:
Locally, using the Computer Setup Utilities. See the Computer
Setup (F10) Utility Guide on the Documentation and Diagnostics
CD included with the computer for additional information and
instructions on using the Computer Setup Utilities.
Remotely, using HP Client Manager Software or System
Software Manager. This software enables the secure, consistent
deployment and control of security settings from a simple
command-line utility.
www.hp.com
unauthorized access to data and
revents
www.hp.com
.) Security features such as
Desktop Management Guide

Advertisement

Table of Contents
loading

Table of Contents