Asset Tracking And Security - HP Xw6400 - Workstation - 4 GB RAM Reference Manual

Hp xw6400 workstation - service and technical reference guide
Hide thumbs Also See for Xw6400 - Workstation - 4 GB RAM:
Table of Contents

Advertisement

Asset tracking and security

Asset tracking features incorporated into the workstation provide key asset tracking data that can be
managed using HP Systems Insight Manager, HP Client Manager Software, or other system
management applications. Seamless, automatic integration between asset tracking features and these
products enables you to choose the management tool that is best suited to the environment and to
leverage the investment in existing tools.
HP also offers several solutions for controlling access to valuable components and information.
ProtectTools Embedded Security, if installed, prevents unauthorized access to data and checks system
integrity and authenticates third-party users attempting system access. Security features such as
ProtectTools and the Hood Sensor (Smart Cover Sensor) help prevent unauthorized access to your
data and to the internal components of the workstation. By disabling parallel, serial, or USB ports or by
disabling removable media boot capability, you can protect valuable data assets. Memory Change and
Hood Sensor (Smart Cover Sensor) alerts can be automatically forwarded to system management
applications to deliver proactive notification of tampering with a workstation's internal components.
NOTE:
ProtectTools, the Hood Sensor (Smart Cover Sensor), and the Hood Lock (Smart Cover Lock)
are available as options on select systems.
Use the following utilities to manage security settings on the HP workstation:
Locally, using the Computer Setup (F10) Utility.
Remotely, using HP Client Manager Software or System Software Manager. This software enables
the secure, consistent deployment and control of security settings from a simple command line
utility.
The following table and sections refer to managing security features of the workstation locally through
the Computer Setup (F10) Utility.
Table 3-3
Security Features Overview
Feature
Removable Media Boot Control Prevents booting from the removable media
Serial, Parallel, USB, or Infrared
Interface Control
Power-On Password
Setup Password
Network Server Mode
Ownership Tag
Kensington Cable Lock
Provision
Padlock Loop
42
Chapter 3 System management
Purpose
drives.
Prevents transfer of data through the
integrated serial, parallel, USB, or infrared
interface.
Prevents use of the workstation until the
password is entered. This can apply to both
initial system startup and restarts.
Prevents reconfiguration of the workstation
(use of the Setup Utilities) until the password
is entered.
Provides unique security features for
workstations being used as servers.
Displays ownership information, as defined by
the system administrator, during system
startup (protected by setup password).
Prevents entire system theft only.
Prevents the side access panel from being
removed. This loop can also be used to secure
the unit to a fixed object.
How it is established
From the Computer Setup (F10)
Utility Menu.
From the Computer Setup (F10)
Utility menu.
From the Computer Setup (F10)
Utility menu.
From the Computer Setup (F10)
Utility menu.
From the Computer Setup (F10)
Utility menu.
From the Computer Setup (F10)
Utility menu.
Install a Kensington cable lock to
secure the workstation to a fixed
object.
Install a padlock.
ENWW

Advertisement

Table of Contents
loading

Table of Contents