Compaq d338 - Microtower Desktop PC Management Manual
Compaq d338 - Microtower Desktop PC Management Manual

Compaq d338 - Microtower Desktop PC Management Manual

Desktop management guide
Hide thumbs Also See for d338 - Microtower Desktop PC:

Advertisement

Quick Links

Desktop Management Guide
Business Desktops
Document Part Number: 312947-002
September 2003
This guide provides definitions and instructions for using security and
Intelligent Manageability features that are preinstalled on select
models.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the d338 - Microtower Desktop PC and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Compaq d338 - Microtower Desktop PC

  • Page 1 Desktop Management Guide Business Desktops Document Part Number: 312947-002 September 2003 This guide provides definitions and instructions for using security and Intelligent Manageability features that are preinstalled on select models.
  • Page 2 HP, Hewlett Packard, and the Hewlett-Packard logo are trademarks of Hewlett-Packard Company in the U.S. and other countries. Compaq and the Compaq logo are trademarks of Hewlett-Packard Development Company, L.P. in the U.S. and other countries. Microsoft, MS-DOS, Windows, and Windows NT are trademarks of Microsoft Corporation in the U.S.
  • Page 3: Table Of Contents

    Contents Desktop Management Guide Initial Configuration and Deployment ........2 Remote System Installation.
  • Page 4 Contents Fingerprint Identification Technology ........48 Fault Notification and Recovery .
  • Page 5: Desktop Management Guide

    Desktop Management Guide HP Intelligent Manageability provides standards-based solutions for managing and controlling desktops, workstations, and notebook PCs in a networked environment. HP pioneered desktop manageability in 1995 with the introduction of the industry’s first fully manageable desktop personal computers. HP holds a patent on the manageability technology.
  • Page 6: Initial Configuration And Deployment

    Desktop Management Guide Initial Configuration and Deployment The computer comes with a preinstalled system software image. After a brief software “unbundling” process, the computer is ready to use. You may prefer to replace the preinstalled software image with a customized set of system and application software. There are several methods for deploying a customized software image.
  • Page 7: Remote System Installation

    Desktop Management Guide Remote System Installation Remote System Installation allows you to start and set up the system using the software and configuration information located on a network server by initiating the Preboot Execution Environment (PXE). The Remote System Installation feature is usually used as a system setup and configuration tool, and can be used for the following tasks: ■...
  • Page 8: Software Updating And Management

    Desktop Management Guide Software Updating and Management HP provides several tools for managing and updating software on desktops and workstations—Altiris; Altiris PC Transplant Pro; HP Client Manager Software, an Altiris solution; System Software Manager; Proactive Change Notification; and ActiveUpdate. HP Client Manager Software Intelligent HP Client Manager Software (HP CMS) tightly integrates HP Intelligent Manageability technology within Altiris to provide superior hardware management capabilities for HP access devices...
  • Page 9: Altiris Pc Transplant Pro

    Desktop Management Guide ❏ System deployment ❏ Personality migrations ■ Help Desk and Problem Resolution ❏ Managing help desk tickets ❏ Remote troubleshooting ❏ Remote problem resolution ❏ Client disaster recovery ■ Software and Operations Management ❏ Ongoing desktop management ❏...
  • Page 10: System Software Manager

    Desktop Management Guide System Software Manager System Software Manager (SSM) is a utility that lets you update system-level software on multiple systems simultaneously. When executed on a PC client system, SSM detects both hardware and software versions, then updates the appropriate software from a central repository, also known as a file store.
  • Page 11: Rom Flash

    Desktop Management Guide ROM Flash The computer comes with a programmable flash ROM (read only memory). By establishing a setup password in the Computer Setup (F10) Utility, you can protect the ROM from being unintentionally updated or overwritten. This is important to ensure the operating integrity of the computer.
  • Page 12: Hpqflash

    Desktop Management Guide HPQFlash The HPQFlash utility is used to locally update or restore the System ROM on individual PCs through a Windows operating system. For more information on HPQFlash, visit http://h18000.www1.hp.com/support/files/hpcpqdt/us/download/ 18607.html FailSafe Boot Block ROM The FailSafe Boot Block ROM allows for system recovery in the unlikely event of a ROM flash failure, for example, if a power failure were to occur during a ROM upgrade.
  • Page 13 Desktop Management Guide 7. If the system successfully starts from the diskette and successfully reprograms the ROM, then the three keyboard lights will turn on. A rising tone series of beeps also signals successful completion. 8. Remove the diskette and turn the power off. 9.
  • Page 14: Replicating The Setup

    Desktop Management Guide Replicating the Setup The following procedures give an administrator the ability to easily copy one setup configuration to other computers of the same model. This allows for faster, more consistent configuration of multiple computers. ✎ Both procedures require a diskette drive or a supported USB flash media device, such as an HP Drive Key.
  • Page 15: Copying To Multiple Computers

    Desktop Management Guide 8. Restart the computer when the configuration is complete. Copying to Multiple Computers Ä CAUTION: A setup configuration is model-specific. File system corruption may result if source and target computers are not the same model. For example, do not copy the setup configuration from a D510 Ultra-slim Desktop to a D510 e-pc.
  • Page 16: Creating A Bootable Device

    Desktop Management Guide 4. Insert the bootable diskette or USB flash media device. 5. Click File > Save to Diskette. Follow the instructions on the screen to create the configuration diskette or USB flash media device. 6. Download a BIOS utility for replicating setup (repset.exe) and copy it onto the configuration diskette or USB flash media device.
  • Page 17: Supported Usb Flash Media Device

    Compaq Evo D510 Ultra-slim Desktop ❏ Compaq Evo D510 Convertible Minitower/Small Form Factor ❏ HP Compaq Business Desktop d530 Series - Ultra-slim Desktop, Small Form Factor, or Convertible Minitower ❏ Compaq Evo N400c, N410c, N600c, N610c, N620c, N800c, or N1000c Notebooks ❏...
  • Page 18 Desktop Management Guide ❏ 128MB HP Drive Key ❏ 128MB DiskOnKey ■ A bootable DOS diskette with the FDISK and SYS programs. If SYS is not available, FORMAT may be used, but all existing files on the Drive Key will be lost. 1.
  • Page 19 Desktop Management Guide After the system files have been transferred, SYS will return to the A:\ prompt. 9. Copy any files you want to keep from your Drive Key to a temporary directory on another drive (for example, the system's internal hard drive).
  • Page 20: Unsupported Usb Flash Media Device

    Compaq Evo D510 Ultra-slim Desktop ❏ Compaq Evo D510 Convertible Minitower/Small Form Factor ❏ HP Compaq Business Desktop d530 Series - Ultra-slim Desktop, Small Form Factor, or Convertible Minitower ❏ Compaq Evo N400c, N410c, N600c, N610c, N620c, N800c, or N1000c Notebooks ❏...
  • Page 21 Desktop Management Guide 4. Plug in the power cord and turn on the computer. As soon as the monitor light turns green, press the key to go into the computer setup utility. 5. Go to Advanced/PCI devices to disable both the IDE and SATA controllers.
  • Page 22 Desktop Management Guide ✎ The default boot order varies from computer to computer, and it can be changed in the Computer Setup (F10) Utility. If you have used a DOS version from Windows 9x, you may see a brief Windows logo screen. If you do not want this screen, add a zero-length file named LOGO.SYS to the root directory of the Drive Key.
  • Page 23: Dual-State Power Button

    Desktop Management Guide Dual-State Power Button With Advanced Configuration and Power Interface (ACPI) enabled for Windows 2000 and Windows XP Professional and Home Edition, the power button can function either as an on/off switch or as a suspend button. The suspend feature does not completely turn off power, but instead causes the computer to enter a low-power standby.
  • Page 24: World Wide Web Site

    Desktop Management Guide World Wide Web Site HP engineers rigorously test and debug software developed by HP and third-party suppliers, and develop operating system specific support software, to ensure performance, compatibility, and reliability for HP computers. When making the transition to new or revised operating systems, it is important to implement the support software designed for that operating system.
  • Page 25: Asset Tracking And Security

    Desktop Management Guide Asset Tracking and Security Asset tracking features incorporated into the computer provide key asset tracking data that can be managed using HP Insight Manager, HP Client Manager or other system management applications. Seamless, automatic integration between asset tracking features and these products enables you to choose the management tool that is best suited to the environment and to leverage the investment in existing tools.
  • Page 26 Desktop Management Guide The following table and sections refer to managing security features of the computer locally through the Computer Setup (F10) Utilities. Security Features Overview Feature Purpose How It Is Established Removable Media Boot Prevents booting from the From the Computer Setup Control removable media drives.
  • Page 27 Desktop Management Guide Security Features Overview (Continued) Feature Purpose How It Is Established Smart Cover Sensor Indicates that computer cover From the Computer Setup or side panel has been (F10) Utilities menu. removed. Can be set to require the setup password to restart the computer, after the cover or side panel has been removed.
  • Page 28 Desktop Management Guide Security Features Overview (Continued) Feature Purpose How It Is Established Ownership Tag Displays ownership From the Computer Setup information, as defined by the (F10) Utilities menu. system administrator, during system startup (protected by setup password). Cable Lock Provision Inhibits access to the interior Install a cable lock to secure of the computer to prevent...
  • Page 29: Password Security

    Desktop Management Guide Password Security The power-on password prevents unauthorized use of the computer by requiring entry of a password to access applications or data each time the computer is turned on or restarted. The setup password specifically prevents unauthorized access to Computer Setup, and can also be used as an override to the power-on password.
  • Page 30: Establishing A Power-On Password Using

    Desktop Management Guide Establishing a Power-On Password Using Computer Setup Establishing a power-on password through Computer Setup prevents access to the computer when power is turned on, unless the password is entered. When a power-on password is set, Computer Setup presents Password Options under the Security menu.
  • Page 31: Entering A Setup Password

    Desktop Management Guide Entering a Setup Password If the system is equipped with an embedded security device, refer to “Embedded Security” on page 30. If a setup password has been established on the computer, you will be prompted to enter it each time you run Computer Setup. 1.
  • Page 32: Changing A Power-On Or Setup Password

    Desktop Management Guide Changing a Power-On or Setup Password If the system is equipped with an embedded security device, refer to “Embedded Security” on page 30. 1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart the Computer. To change the setup password, run Computer Setup.
  • Page 33: National Keyboard Delimiter Characters

    Desktop Management Guide Deleting a Power-On or Setup Password If the system is equipped with an embedded security device, refer to “Embedded Security” on page 30. 1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart the Computer. To delete the setup password, run Computer Setup.
  • Page 34: Embedded Security

    Desktop Management Guide Clearing Passwords If you forget the password, you cannot access the computer. Refer to the Troubleshooting Guide for instructions on clearing passwords. If the system is equiped with an embedded security device, refer to “Embedded Security.” Embedded Security ProtectTools Embedded Security combines encryption and password protection to provide enhanced security for Embedded File System (EFS) file/folder encryption and secure e-mail with Microsoft...
  • Page 35 Desktop Management Guide A ProtectTools Embedded Security-enabled computer complements and enhances the security capabilities inherent in Microsoft Windows 2000 or Windows XP Professional or Home Edition. For example, while the operating system can encrypt local files and folders based on an EFS, ProtectTools Embedded Security offers an additional layer of security by creating encryption keys from the platform's root key (which is stored in silicon).
  • Page 36 Desktop Management Guide 4. Type and confirm a password. Press to accept the password. ✎ Type carefully; for security reasons, the characters typed do not appear on the screen. 5. Use the up or down arrow key to move to Embedded Security Enter Device.
  • Page 37 Desktop Management Guide ✎ Type carefully; for security reasons, the characters typed do not appear on the screen. 4. Click Next to accept the default Recovery archive location. 5. Type and confirm an Emergency Recovery Token password, then click Next. 6.
  • Page 38 Desktop Management Guide Basic User During user initialization, the Basic User Password is created. This password is required to enter and access encrypted data. Ä CAUTION: Safeguard the Basic User password. Encrypted data cannot be accessed or recovered without this password. 1.
  • Page 39 Desktop Management Guide Recovering Encrypted Data To recover data after replacement of the ProtectTools chip, you must have the following: ■ SPEmRecToken.xml—the Emergency Recovery Token Key ■ SPEmRecArchive.xml—hidden folder, default location: C:\Documents and Settings\All Users\Application Data\Infineon\TPM Software\Recovery Archive ■ ProtectTools passwords ❏...
  • Page 40 Desktop Management Guide If two selections are available, go to step 7. 7. Use the up or down arrow key to move to Reset to Factory Settings—Do Not Reset. Press the left or right arrow key once. A message is displayed stating: Performing this action will reset the embedded security device to factory settings if settings are saved on exit.
  • Page 41 Desktop Management Guide 17. After Windows opens: If you are using Windows XP Professional or Home Edition, click Start > All Programs > HP ProtectTools Embedded Security Tools > Embedded Security Initialization Wizard. If you are using Windows 2000, click Start > Programs > HP ProtectTools Embedded Security Tools >...
  • Page 42 Desktop Management Guide 30. Right-click the ProtectTools icon in the Tool bar and click Initialize Embedded Security restoration. This will start the HP ProtectTools Embedded Security Initialization Wizard. 31. Click Next. 32. Insert the diskette on which the original Emergency Recovery Token Key is stored.
  • Page 43: Drivelock

    Desktop Management Guide 44. Click Next to confirm settings and accept the default recovery data location. ✎ Steps 45 through 49 reinstall the original Basic User configuration. 45. Select the appropriate Security Features and click Next. 46. Click the appropriate e-mail client to select it, then click Next. 47.
  • Page 44: Using Drivelock

    Desktop Management Guide In the event that both DriveLock passwords are lost, the hard drive is rendered unusable. For users who do not fit the previously defined customer profile, this may be an unacceptable risk. For users who do fit the customer profile, it may be a tolerable risk given the nature of the data stored on the hard drive.
  • Page 45: Smart Cover Sensor

    Desktop Management Guide situation where an employee intentionally or unintentionally sets both DriveLock passwords before leaving the company. In such a scenario, the hard drive would be rendered unusable and require replacement. Likewise, by not setting a master password, system administrators may find themselves locked out of a hard drive and unable to perform routine checks for unauthorized software, other asset control functions, and support.
  • Page 46: Smart Cover Lock

    Desktop Management Guide Setting the Smart Cover Sensor Protection Level To set the Smart Cover Sensor protection level, complete the following steps: 1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart the Computer. 2.
  • Page 47: Locking The Smart Cover Lock

    Desktop Management Guide Locking the Smart Cover Lock To activate and lock the Smart Cover Lock, complete the following steps: 1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart the Computer. 2.
  • Page 48: Using The Smart Cover Failsafe Key

    Using the Smart Cover FailSafe Key If you enable the Smart Cover Lock and cannot enter the password to disable the lock, you will need a Smart Cover FailSafe Key to open the computer cover. You will need the key in any of the following circumstances: ■...
  • Page 49: Master Boot Record Security

    Desktop Management Guide Master Boot Record Security The Master Boot Record (MBR) contains information needed to successfully boot from a disk and to access the data stored on the disk. Master Boot Record Security may prevent unintentional or malicious changes to the MBR, such as those caused by some computer viruses or by the incorrect use of certain disk utilities.
  • Page 50 Desktop Management Guide Upon entering Computer Setup, you must ■ Save the MBR of the current bootable disk; ■ Restore the previously saved MBR; or ■ Disable the MBR Security feature. You must know the setup password, if one exists. If changes are detected and if the current bootable disk is not the same disk from which the MBR was previously saved, the following message is displayed:...
  • Page 51: Before You Partition Or Format The Current Bootable Disk

    Desktop Management Guide Before You Partition or Format the Current Bootable Disk Ensure that MBR Security is disabled before you change partitioning or formatting of the current bootable disk. Some disk utilities, such as FDISK and FORMAT, attempt to update the MBR. If MBR Security is enabled when you change partitioning or formatting of the disk, you may receive error messages from the disk utility or a warning from MBR Security the next time the computer is turned on or...
  • Page 52: Fingerprint Identification Technology

    Desktop Management Guide Fingerprint Identification Technology Eliminating the need to enter user passwords, HP Fingerprint Identification Technology tightens network security, simplifies the login process, and reduces the costs associated with managing corporate networks. Affordably priced, it is not just for high-tech, high-security organizations anymore.
  • Page 53: Surge-Tolerant Power Supply

    Desktop Management Guide Surge-Tolerant Power Supply An integrated surge-tolerant power supply provides greater reliability when the computer is hit with an unpredictable power surge. This power supply is rated to withstand a power surge of up to 2000 volts without incurring any system downtime or data loss. Thermal Sensor The thermal sensor is a hardware and software feature that tracks the internal temperature of the computer.
  • Page 54 Desktop Management Guide www.hp.com Desktop Management Guide...
  • Page 55 Index cover lock, smart 42 customizing software 2 access to computer, controlling 21 ActiveUpdate 6 Altiris 4 deleting password 29 Altiris PC Transplant Pro 5 delimiter characters, table 29 asset tracking 21 deployment tools, software 2 diagnostic tool for hard drives 48 disk, cloning 2 bootable device DiskOnKey...
  • Page 56 Index setup 25 PCN (Proactive Change Notification) 6 hard drives, diagnostic tool 48 power button HP Client Manager 4 configuring 19 HP Drive Key dual-state 19 see also DiskOnKey power supply, surge-tolerant 49 bootable 13 power-on password changing 28 initial configuration 2 deleting 29 internal temperature of computer 49 entering 26...
  • Page 57 Index DriveLock 39 Remote System Installation 3 features, table 22 System Software Manager 6 Master Boot Record 45 updating multiple machines 6 MultiBay 39 SSM (System Software Manager) 6 password 25 surge-tolerant power supply 49 ProtectTools 30 system recovery 8 settings, setup of 21 System Software Manager (SSM) 6 Smart Cover Lock 42...
  • Page 58 Index Index–4 www.hp.com Desktop Management Guide...

Table of Contents