Summary of Contents for Compaq d338 - Microtower Desktop PC
Page 1
Desktop Management Guide Business Desktops Document Part Number: 312947-002 September 2003 This guide provides definitions and instructions for using security and Intelligent Manageability features that are preinstalled on select models.
Page 2
HP, Hewlett Packard, and the Hewlett-Packard logo are trademarks of Hewlett-Packard Company in the U.S. and other countries. Compaq and the Compaq logo are trademarks of Hewlett-Packard Development Company, L.P. in the U.S. and other countries. Microsoft, MS-DOS, Windows, and Windows NT are trademarks of Microsoft Corporation in the U.S.
Desktop Management Guide HP Intelligent Manageability provides standards-based solutions for managing and controlling desktops, workstations, and notebook PCs in a networked environment. HP pioneered desktop manageability in 1995 with the introduction of the industry’s first fully manageable desktop personal computers. HP holds a patent on the manageability technology.
Desktop Management Guide Initial Configuration and Deployment The computer comes with a preinstalled system software image. After a brief software “unbundling” process, the computer is ready to use. You may prefer to replace the preinstalled software image with a customized set of system and application software. There are several methods for deploying a customized software image.
Desktop Management Guide Remote System Installation Remote System Installation allows you to start and set up the system using the software and configuration information located on a network server by initiating the Preboot Execution Environment (PXE). The Remote System Installation feature is usually used as a system setup and configuration tool, and can be used for the following tasks: ■...
Desktop Management Guide Software Updating and Management HP provides several tools for managing and updating software on desktops and workstations—Altiris; Altiris PC Transplant Pro; HP Client Manager Software, an Altiris solution; System Software Manager; Proactive Change Notification; and ActiveUpdate. HP Client Manager Software Intelligent HP Client Manager Software (HP CMS) tightly integrates HP Intelligent Manageability technology within Altiris to provide superior hardware management capabilities for HP access devices...
Desktop Management Guide System Software Manager System Software Manager (SSM) is a utility that lets you update system-level software on multiple systems simultaneously. When executed on a PC client system, SSM detects both hardware and software versions, then updates the appropriate software from a central repository, also known as a file store.
Desktop Management Guide ROM Flash The computer comes with a programmable flash ROM (read only memory). By establishing a setup password in the Computer Setup (F10) Utility, you can protect the ROM from being unintentionally updated or overwritten. This is important to ensure the operating integrity of the computer.
Desktop Management Guide HPQFlash The HPQFlash utility is used to locally update or restore the System ROM on individual PCs through a Windows operating system. For more information on HPQFlash, visit http://h18000.www1.hp.com/support/files/hpcpqdt/us/download/ 18607.html FailSafe Boot Block ROM The FailSafe Boot Block ROM allows for system recovery in the unlikely event of a ROM flash failure, for example, if a power failure were to occur during a ROM upgrade.
Page 13
Desktop Management Guide 7. If the system successfully starts from the diskette and successfully reprograms the ROM, then the three keyboard lights will turn on. A rising tone series of beeps also signals successful completion. 8. Remove the diskette and turn the power off. 9.
Desktop Management Guide Replicating the Setup The following procedures give an administrator the ability to easily copy one setup configuration to other computers of the same model. This allows for faster, more consistent configuration of multiple computers. ✎ Both procedures require a diskette drive or a supported USB flash media device, such as an HP Drive Key.
Desktop Management Guide 8. Restart the computer when the configuration is complete. Copying to Multiple Computers Ä CAUTION: A setup configuration is model-specific. File system corruption may result if source and target computers are not the same model. For example, do not copy the setup configuration from a D510 Ultra-slim Desktop to a D510 e-pc.
Desktop Management Guide 4. Insert the bootable diskette or USB flash media device. 5. Click File > Save to Diskette. Follow the instructions on the screen to create the configuration diskette or USB flash media device. 6. Download a BIOS utility for replicating setup (repset.exe) and copy it onto the configuration diskette or USB flash media device.
Compaq Evo D510 Ultra-slim Desktop ❏ Compaq Evo D510 Convertible Minitower/Small Form Factor ❏ HP Compaq Business Desktop d530 Series - Ultra-slim Desktop, Small Form Factor, or Convertible Minitower ❏ Compaq Evo N400c, N410c, N600c, N610c, N620c, N800c, or N1000c Notebooks ❏...
Page 18
Desktop Management Guide ❏ 128MB HP Drive Key ❏ 128MB DiskOnKey ■ A bootable DOS diskette with the FDISK and SYS programs. If SYS is not available, FORMAT may be used, but all existing files on the Drive Key will be lost. 1.
Page 19
Desktop Management Guide After the system files have been transferred, SYS will return to the A:\ prompt. 9. Copy any files you want to keep from your Drive Key to a temporary directory on another drive (for example, the system's internal hard drive).
Compaq Evo D510 Ultra-slim Desktop ❏ Compaq Evo D510 Convertible Minitower/Small Form Factor ❏ HP Compaq Business Desktop d530 Series - Ultra-slim Desktop, Small Form Factor, or Convertible Minitower ❏ Compaq Evo N400c, N410c, N600c, N610c, N620c, N800c, or N1000c Notebooks ❏...
Page 21
Desktop Management Guide 4. Plug in the power cord and turn on the computer. As soon as the monitor light turns green, press the key to go into the computer setup utility. 5. Go to Advanced/PCI devices to disable both the IDE and SATA controllers.
Page 22
Desktop Management Guide ✎ The default boot order varies from computer to computer, and it can be changed in the Computer Setup (F10) Utility. If you have used a DOS version from Windows 9x, you may see a brief Windows logo screen. If you do not want this screen, add a zero-length file named LOGO.SYS to the root directory of the Drive Key.
Desktop Management Guide Dual-State Power Button With Advanced Configuration and Power Interface (ACPI) enabled for Windows 2000 and Windows XP Professional and Home Edition, the power button can function either as an on/off switch or as a suspend button. The suspend feature does not completely turn off power, but instead causes the computer to enter a low-power standby.
Desktop Management Guide World Wide Web Site HP engineers rigorously test and debug software developed by HP and third-party suppliers, and develop operating system specific support software, to ensure performance, compatibility, and reliability for HP computers. When making the transition to new or revised operating systems, it is important to implement the support software designed for that operating system.
Desktop Management Guide Asset Tracking and Security Asset tracking features incorporated into the computer provide key asset tracking data that can be managed using HP Insight Manager, HP Client Manager or other system management applications. Seamless, automatic integration between asset tracking features and these products enables you to choose the management tool that is best suited to the environment and to leverage the investment in existing tools.
Page 26
Desktop Management Guide The following table and sections refer to managing security features of the computer locally through the Computer Setup (F10) Utilities. Security Features Overview Feature Purpose How It Is Established Removable Media Boot Prevents booting from the From the Computer Setup Control removable media drives.
Page 27
Desktop Management Guide Security Features Overview (Continued) Feature Purpose How It Is Established Smart Cover Sensor Indicates that computer cover From the Computer Setup or side panel has been (F10) Utilities menu. removed. Can be set to require the setup password to restart the computer, after the cover or side panel has been removed.
Page 28
Desktop Management Guide Security Features Overview (Continued) Feature Purpose How It Is Established Ownership Tag Displays ownership From the Computer Setup information, as defined by the (F10) Utilities menu. system administrator, during system startup (protected by setup password). Cable Lock Provision Inhibits access to the interior Install a cable lock to secure of the computer to prevent...
Desktop Management Guide Password Security The power-on password prevents unauthorized use of the computer by requiring entry of a password to access applications or data each time the computer is turned on or restarted. The setup password specifically prevents unauthorized access to Computer Setup, and can also be used as an override to the power-on password.
Desktop Management Guide Establishing a Power-On Password Using Computer Setup Establishing a power-on password through Computer Setup prevents access to the computer when power is turned on, unless the password is entered. When a power-on password is set, Computer Setup presents Password Options under the Security menu.
Desktop Management Guide Entering a Setup Password If the system is equipped with an embedded security device, refer to “Embedded Security” on page 30. If a setup password has been established on the computer, you will be prompted to enter it each time you run Computer Setup. 1.
Desktop Management Guide Changing a Power-On or Setup Password If the system is equipped with an embedded security device, refer to “Embedded Security” on page 30. 1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart the Computer. To change the setup password, run Computer Setup.
Desktop Management Guide Deleting a Power-On or Setup Password If the system is equipped with an embedded security device, refer to “Embedded Security” on page 30. 1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart the Computer. To delete the setup password, run Computer Setup.
Desktop Management Guide Clearing Passwords If you forget the password, you cannot access the computer. Refer to the Troubleshooting Guide for instructions on clearing passwords. If the system is equiped with an embedded security device, refer to “Embedded Security.” Embedded Security ProtectTools Embedded Security combines encryption and password protection to provide enhanced security for Embedded File System (EFS) file/folder encryption and secure e-mail with Microsoft...
Page 35
Desktop Management Guide A ProtectTools Embedded Security-enabled computer complements and enhances the security capabilities inherent in Microsoft Windows 2000 or Windows XP Professional or Home Edition. For example, while the operating system can encrypt local files and folders based on an EFS, ProtectTools Embedded Security offers an additional layer of security by creating encryption keys from the platform's root key (which is stored in silicon).
Page 36
Desktop Management Guide 4. Type and confirm a password. Press to accept the password. ✎ Type carefully; for security reasons, the characters typed do not appear on the screen. 5. Use the up or down arrow key to move to Embedded Security Enter Device.
Page 37
Desktop Management Guide ✎ Type carefully; for security reasons, the characters typed do not appear on the screen. 4. Click Next to accept the default Recovery archive location. 5. Type and confirm an Emergency Recovery Token password, then click Next. 6.
Page 38
Desktop Management Guide Basic User During user initialization, the Basic User Password is created. This password is required to enter and access encrypted data. Ä CAUTION: Safeguard the Basic User password. Encrypted data cannot be accessed or recovered without this password. 1.
Page 39
Desktop Management Guide Recovering Encrypted Data To recover data after replacement of the ProtectTools chip, you must have the following: ■ SPEmRecToken.xml—the Emergency Recovery Token Key ■ SPEmRecArchive.xml—hidden folder, default location: C:\Documents and Settings\All Users\Application Data\Infineon\TPM Software\Recovery Archive ■ ProtectTools passwords ❏...
Page 40
Desktop Management Guide If two selections are available, go to step 7. 7. Use the up or down arrow key to move to Reset to Factory Settings—Do Not Reset. Press the left or right arrow key once. A message is displayed stating: Performing this action will reset the embedded security device to factory settings if settings are saved on exit.
Page 41
Desktop Management Guide 17. After Windows opens: If you are using Windows XP Professional or Home Edition, click Start > All Programs > HP ProtectTools Embedded Security Tools > Embedded Security Initialization Wizard. If you are using Windows 2000, click Start > Programs > HP ProtectTools Embedded Security Tools >...
Page 42
Desktop Management Guide 30. Right-click the ProtectTools icon in the Tool bar and click Initialize Embedded Security restoration. This will start the HP ProtectTools Embedded Security Initialization Wizard. 31. Click Next. 32. Insert the diskette on which the original Emergency Recovery Token Key is stored.
Desktop Management Guide 44. Click Next to confirm settings and accept the default recovery data location. ✎ Steps 45 through 49 reinstall the original Basic User configuration. 45. Select the appropriate Security Features and click Next. 46. Click the appropriate e-mail client to select it, then click Next. 47.
Desktop Management Guide In the event that both DriveLock passwords are lost, the hard drive is rendered unusable. For users who do not fit the previously defined customer profile, this may be an unacceptable risk. For users who do fit the customer profile, it may be a tolerable risk given the nature of the data stored on the hard drive.
Desktop Management Guide situation where an employee intentionally or unintentionally sets both DriveLock passwords before leaving the company. In such a scenario, the hard drive would be rendered unusable and require replacement. Likewise, by not setting a master password, system administrators may find themselves locked out of a hard drive and unable to perform routine checks for unauthorized software, other asset control functions, and support.
Desktop Management Guide Setting the Smart Cover Sensor Protection Level To set the Smart Cover Sensor protection level, complete the following steps: 1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart the Computer. 2.
Desktop Management Guide Locking the Smart Cover Lock To activate and lock the Smart Cover Lock, complete the following steps: 1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart the Computer. 2.
Using the Smart Cover FailSafe Key If you enable the Smart Cover Lock and cannot enter the password to disable the lock, you will need a Smart Cover FailSafe Key to open the computer cover. You will need the key in any of the following circumstances: ■...
Desktop Management Guide Master Boot Record Security The Master Boot Record (MBR) contains information needed to successfully boot from a disk and to access the data stored on the disk. Master Boot Record Security may prevent unintentional or malicious changes to the MBR, such as those caused by some computer viruses or by the incorrect use of certain disk utilities.
Page 50
Desktop Management Guide Upon entering Computer Setup, you must ■ Save the MBR of the current bootable disk; ■ Restore the previously saved MBR; or ■ Disable the MBR Security feature. You must know the setup password, if one exists. If changes are detected and if the current bootable disk is not the same disk from which the MBR was previously saved, the following message is displayed:...
Desktop Management Guide Before You Partition or Format the Current Bootable Disk Ensure that MBR Security is disabled before you change partitioning or formatting of the current bootable disk. Some disk utilities, such as FDISK and FORMAT, attempt to update the MBR. If MBR Security is enabled when you change partitioning or formatting of the disk, you may receive error messages from the disk utility or a warning from MBR Security the next time the computer is turned on or...
Desktop Management Guide Fingerprint Identification Technology Eliminating the need to enter user passwords, HP Fingerprint Identification Technology tightens network security, simplifies the login process, and reduces the costs associated with managing corporate networks. Affordably priced, it is not just for high-tech, high-security organizations anymore.
Desktop Management Guide Surge-Tolerant Power Supply An integrated surge-tolerant power supply provides greater reliability when the computer is hit with an unpredictable power surge. This power supply is rated to withstand a power surge of up to 2000 volts without incurring any system downtime or data loss. Thermal Sensor The thermal sensor is a hardware and software feature that tracks the internal temperature of the computer.
Need help?
Do you have a question about the d338 - Microtower Desktop PC and is the answer not in the manual?
Questions and answers