Asset Tracking And Security - HP Rp5000 - Point of Sale System Management Manual

Business desktops
Hide thumbs Also See for Rp5000 - Point of Sale System:
Table of Contents

Advertisement

Desktop Management Guide

Asset Tracking and Security

24
Asset tracking features incorporated into the computer provide key
asset tracking data that can be managed using HP Systems Insight
Manager, HP Client Manager or other system management
applications. Seamless, automatic integration between asset tracking
features and these products enables you to choose the management
tool that is best suited to the environment and to leverage the
investment in existing tools.
HP also offers several solutions for controlling access to valuable
components and information. ProtectTools Embedded Security, if
installed, p
unauthorized access to data and checks system
revents
integrity and authenticates third-party users attempting system access.
(Refer to the HP ProtectTools Security Manager Guide at
www.hp.com
for more information.) Security features such as
ProtectTools, the Smart Cover Sensor and the Smart Cover Lock,
available on some models, help to prevent unauthorized access to the
internal components of the personal computer. By disabling parallel,
serial, or USB ports, or by disabling removable media boot capability,
you can protect valuable data assets. Memory Change and Smart
Cover Sensor alerts can be automatically forwarded to system
management applications to deliver proactive notification of
tampering with a computer's internal components.
Protect Tools, the Smart Cover Sensor, and the Smart Cover Lock are
available as options on some systems.
Use the following utilities to manage security settings on the HP
computer:
Locally, using the Computer Setup Utilities. See the Computer
Setup (F10) Utility Guide on the Documentation CD included
with the computer for additional information and instructions on
using the Computer Setup Utilities.
Remotely, using HP Client Manager or System Software
Manager. This software enables the secure, consistent
deployment and control of security settings from a simple
command-line utility.
www.hp.com
Desktop Management Guide

Advertisement

Table of Contents
loading

Table of Contents