Activating The Security Management Software; Using The Security Management Software; Computer Tracking Software; If Your Computer Is Lost Or Stolen - Dell Latitude D630 User Manual

Dell latitude d630: user guide
Hide thumbs Also See for Latitude D630:
Table of Contents

Advertisement

Encryption
Private information management

Activating the Security Management Software

NOTE:
You must first enable the TPM in order for the security management software to have full functionality.
1 Enable the TPM feature (see "Enabling the TPM Feature" on page 70).
2 Load the security management software:
Turn on (or restart) your computer.
a
When the DELL™ logo appears, press <F2> immediately. If you wait too long and the Windows
b
logo appears, continue to wait until you see the Windows desktop. Then shut down your computer
and try again.
In the drop-down menu, select Wave EMBASSY Trust Suite and press <Enter> to create the
c
icons for the software components on the computer desktop.
Press <Esc> to exit the setup program.
d
If prompted, click Save/Exit.
e

Using the Security Management Software

For information about how to use the software and the different security features, see the Getting Started
Guide for the software:
Click Start→ All Programs→ Wave EMBASSY Trust Suite→ Getting Started Guide.

Computer Tracking Software

Computer tracking software may enable you to locate your computer if it is lost or stolen. The software is
optional and may be purchased when you order your Dell™ computer, or you can contact your Dell sales
representative for information about this security feature.
NOTE:
Computer tracking software may not be available in certain countries.
NOTE:
If you have computer tracking software and your computer is lost or stolen, you must contact the company
that provides the tracking service to report the missing computer.

If Your Computer Is Lost or Stolen

Call a law enforcement agency to report the lost or stolen computer. Include the Service Tag in your
description of the computer. Ask that a case number be assigned and write down the number, along
with the name, address, and phone number of the law enforcement agency. If possible, obtain the
name of the investigating officer.
NOTE:
If you know where the computer was lost or stolen, call a law enforcement agency in that area. If you do not
know, call a law enforcement agency where you live.
Securing Your Computer
71

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents