An Overview of Current Display Interfaces
Page 6
...likely continue in use for over five years, and may be distinguished by HDMI. HP, Compaq, Intel, IBM, NEC, Fujitsu, and Silicon Image (the developer of the Transition Minimized Differential...Figure 3 DVI-D Connector 6 However, due to the newer DisplayPort standard, and has already been virtually replaced in the CE/ TV market by the four-pin Microcross™ section which carries the ...two forms: DVI-I and DVI-D may provide either DVI add three additional data pairs, for PC monitors. The DDWG was based). DVI became the first reasonably-successful digital display interface for 9.6...
...likely continue in use for over five years, and may be distinguished by HDMI. HP, Compaq, Intel, IBM, NEC, Fujitsu, and Silicon Image (the developer of the Transition Minimized Differential...Figure 3 DVI-D Connector 6 However, due to the newer DisplayPort standard, and has already been virtually replaced in the CE/ TV market by the four-pin Microcross™ section which carries the ...two forms: DVI-I and DVI-D may provide either DVI add three additional data pairs, for PC monitors. The DDWG was based). DVI became the first reasonably-successful digital display interface for 9.6...
Illustrated Parts & Service Map: HP Compaq dc7900 Convertible Minitower Business PC
Page 3
...boot, and allows you to specify boot order. • Shortcut to enable/disable: • Data Execution Prevention • Virtualization Technology • Virtualization Technology Directed I /O ports, audio, network controllers, SMBus controller, and embedded security devices. Provides method to allow users ...assign/modify a hard drive password for PCI 12 Mouse 13 Coprocessor 14 Primary ATA (IDE) Controller 15 Secondary ATA (IDE) Controller dc7900 Illustrated Parts & Service Map, CMT Chassis 506593-002 page 3 Enable/disable or hidden/displayed • F9 prompt - Enable/disable ...
...boot, and allows you to specify boot order. • Shortcut to enable/disable: • Data Execution Prevention • Virtualization Technology • Virtualization Technology Directed I /O ports, audio, network controllers, SMBus controller, and embedded security devices. Provides method to allow users ...assign/modify a hard drive password for PCI 12 Mouse 13 Coprocessor 14 Primary ATA (IDE) Controller 15 Secondary ATA (IDE) Controller dc7900 Illustrated Parts & Service Map, CMT Chassis 506593-002 page 3 Enable/disable or hidden/displayed • F9 prompt - Enable/disable ...
Technical Reference Guide: HP Compaq dc7900 Series Business Desktop Computers
Page 18
...; Smart Cover (hood) Lock (SFF and CMT form factors only) ❏ USB port disable ❏ Intel Standard Manageability support ❏ Intel vPro Technology ❏ HP Virtual Safe Browser ■ PS/2 enhanced keyboard ■ PS/2 optical scroll mouse ■ Energy Star compliancy met by all USDT form factors (Energy Star-qualified configurations...
...; Smart Cover (hood) Lock (SFF and CMT form factors only) ❏ USB port disable ❏ Intel Standard Manageability support ❏ Intel vPro Technology ❏ HP Virtual Safe Browser ■ PS/2 enhanced keyboard ■ PS/2 optical scroll mouse ■ Energy Star compliancy met by all USDT form factors (Energy Star-qualified configurations...
Service Reference Guide: HP Compaq dc7900 Business PC
Page 22
... factory and are hardware dependent) Data Execution Prevention (some models) (enable/disable) - PAVP (Some models) (disabled/min/max) - Virtualization Technology (some models) (enable/disable) - Controls the underlying processor and chipset features needed to the computer. ● Ownership tag (80...requires turning the computer off and then back on . Changing this setting requires turning the computer off and then back on . Virtualization Technology Directed I /O Embedded Security Device Support (some models) (enable/disable) - Changing this feature is enabled, the user...
... factory and are hardware dependent) Data Execution Prevention (some models) (enable/disable) - PAVP (Some models) (disabled/min/max) - Virtualization Technology (some models) (enable/disable) - Controls the underlying processor and chipset features needed to the computer. ● Ownership tag (80...requires turning the computer off and then back on . Changing this setting requires turning the computer off and then back on . Virtualization Technology Directed I /O Embedded Security Device Support (some models) (enable/disable) - Changing this feature is enabled, the user...
Service Reference Guide: HP Compaq dc7900 Business PC
Page 40
... system health to fix problems before they occur ● Automatically acquire and install drivers and BIOS updates without visiting each PC ● Remotely configure BIOS and security settings ● Automate processes to quickly resolve hardware problems Tight integration with HP ...manage an entire software stack (operating systems, applications, patches, settings, and content) to a desired state ● Manage software on virtually any device, including desktops, workstations, and notebooks, in IT costs, accelerated time-to display locally on most operating systems With continuous ...
... system health to fix problems before they occur ● Automatically acquire and install drivers and BIOS updates without visiting each PC ● Remotely configure BIOS and security settings ● Automate processes to quickly resolve hardware problems Tight integration with HP ...manage an entire software stack (operating systems, applications, patches, settings, and content) to a desired state ● Manage software on virtually any device, including desktops, workstations, and notebooks, in IT costs, accelerated time-to display locally on most operating systems With continuous ...
Service Reference Guide: HP Compaq dc7900 Business PC
Page 54
...back on . Changing this feature you must enable the following features: ● Embedded Security Device Support ● Virtualization Technology ● Virtualization Technology Directed I /O (some models) (enable/disable) - Changing this setting requires turning the computer off and ... Changing this setting requires turning the computer off and then back on authentication support (some models) (enable/disable) - Virtualization Technology (some models) (enable/disable) - Trusted Execution Technology (some models) (enable/disable) - Permits activation and deactivation...
...back on . Changing this feature you must enable the following features: ● Embedded Security Device Support ● Virtualization Technology ● Virtualization Technology Directed I /O (some models) (enable/disable) - Changing this setting requires turning the computer off and ... Changing this setting requires turning the computer off and then back on authentication support (some models) (enable/disable) - Virtualization Technology (some models) (enable/disable) - Trusted Execution Technology (some models) (enable/disable) - Permits activation and deactivation...
Computer Setup (F10) Utility Guide
Page 14
Selecting Max will only appear when at least one drive that would otherwise be either a PCI expansion card or embedded on . Virtualization Technology Directed I /O Embedded Security Device Support (some models) (enable/disable) - Changing this feature you must be prohibited from an ...computer off and then back on NIC models only; If neither is attached to the system. See the Desktop Management Guide for hard drives. Virtualization Technology (some models) (enable/disable) - DriveLock Security Allows you to set in the Chipset. PAVP (Some models) (disabled/min/max)...
Selecting Max will only appear when at least one drive that would otherwise be either a PCI expansion card or embedded on . Virtualization Technology Directed I /O Embedded Security Device Support (some models) (enable/disable) - Changing this feature you must be prohibited from an ...computer off and then back on NIC models only; If neither is attached to the system. See the Desktop Management Guide for hard drives. Virtualization Technology (some models) (enable/disable) - DriveLock Security Allows you to set in the Chipset. PAVP (Some models) (disabled/min/max)...
vPro Setup and Configuration for the dc7900p Business PC with Intel vPro Processor Technology
Page 2
....hp.com for improved management of Active Management Technology (AMT) and Intel Virtualization Technology (VT), which allows for other white papers and technical information regarding installation procedures for the client PC along with the usage of AMT set up and configured in the system... AMT and networking are two methods of a Setup and Configuration Server (SCS) in Enterprise mode. Introduced with HP Compaq dc7900 sys- Introduced with HP Compaq dc7700p Business PCs. • AMT 2.2 - Introduced with the Intel Q45 Express chipset and shipped with the Intel Q35 Express chipset ...
....hp.com for improved management of Active Management Technology (AMT) and Intel Virtualization Technology (VT), which allows for other white papers and technical information regarding installation procedures for the client PC along with the usage of AMT set up and configured in the system... AMT and networking are two methods of a Setup and Configuration Server (SCS) in Enterprise mode. Introduced with HP Compaq dc7900 sys- Introduced with HP Compaq dc7700p Business PCs. • AMT 2.2 - Introduced with the Intel Q45 Express chipset and shipped with the Intel Q35 Express chipset ...
vPro Setup and Configuration for the dc7900p Business PC with Intel vPro Processor Technology
Page 11
..., Recommended Setting = Enabled This option enables/disables Serial Over LAN (SOL) functionality. a. Change to be added from different networks into one virtual network. 19. c. Skip Un-Provision. VLAN support is disabled, then only the administrator has MEBx remote access. a. Select Y in Enterprise... Mode. If the option is not necessary for AMT or Virtual Appliances. Select IDE Redirection, and then select Enabled. Default Setting = Default Password Only, Recommended Setting = Default Password Only 11 ...
..., Recommended Setting = Enabled This option enables/disables Serial Over LAN (SOL) functionality. a. Change to be added from different networks into one virtual network. 19. c. Skip Un-Provision. VLAN support is disabled, then only the administrator has MEBx remote access. a. Select Y in Enterprise... Mode. If the option is not necessary for AMT or Virtual Appliances. Select IDE Redirection, and then select Enabled. Default Setting = Default Password Only, Recommended Setting = Default Password Only 11 ...
Desktop Management Guide
Page 14
... retirement ● Automatically deploy and continuously manage an entire software stack (operating systems, applications, patches, settings, and content) to a desired state ● Manage software on virtually any device, including desktops, workstations, and notebooks, in a heterogeneous or standalone infrastructure ● Manage software on most operating systems With continuous configuration management, HP customers...
... retirement ● Automatically deploy and continuously manage an entire software stack (operating systems, applications, patches, settings, and content) to a desired state ● Manage software on virtually any device, including desktops, workstations, and notebooks, in a heterogeneous or standalone infrastructure ● Manage software on most operating systems With continuous configuration management, HP customers...
Desktop Management Guide
Page 33
... the hard drive will only appear when at least one drive that utilizes the Embedded Security Device. Controls the virtualization features of the chipset. Virtualization Technology (some models) (enable/disable) - Changing this setting requires turning the computer off and then back on...and then back on OS management of many security schemes. Controls the underlying processor and chipset features needed to support a virtual appliance. Permits activation and deactivation of the Embedded Security Device. System Security (some models: these options are used to ...
... the hard drive will only appear when at least one drive that utilizes the Embedded Security Device. Controls the virtualization features of the chipset. Virtualization Technology (some models) (enable/disable) - Changing this setting requires turning the computer off and then back on...and then back on OS management of many security schemes. Controls the underlying processor and chipset features needed to support a virtual appliance. Permits activation and deactivation of the Embedded Security Device. System Security (some models: these options are used to ...
HP ProtectTools User Guide
Page 6
... 21 Using your registered fingerprint to log on to Windows 21 Registering a Smart Card or Token 22 Registering other credentials 22 General tasks ...23 Creating a virtual token ...23 Changing the Windows logon password 23 Changing a token PIN ...23 Locking the computer (workstation 24 Using Windows Logon ...24 Logging on to Windows...
... 21 Using your registered fingerprint to log on to Windows 21 Registering a Smart Card or Token 22 Registering other credentials 22 General tasks ...23 Creating a virtual token ...23 Changing the Windows logon password 23 Changing a token PIN ...23 Locking the computer (workstation 24 Using Windows Logon ...24 Logging on to Windows...
HP ProtectTools User Guide
Page 32
...microchip that smart card is inserted or the token is connected to a domain. A USB token is simply a smart card in Creating a virtual token on -screen instructions. 22 Chapter 3 Credential Manager for Administrators, click Credential Manager. 2. In HP ProtectTools Security Manager for Administrators, click...plugs directly into a plastic token, also known as the device type, make sure that can be loaded with a smart card can register a virtual token as described in a different form factor. A USB token is inserted into any USB port. It provides enhanced security and ensures safe ...
...microchip that smart card is inserted or the token is connected to a domain. A USB token is simply a smart card in Creating a virtual token on -screen instructions. 22 Chapter 3 Credential Manager for Administrators, click Credential Manager. 2. In HP ProtectTools Security Manager for Administrators, click...plugs directly into a plastic token, also known as the device type, make sure that can be loaded with a smart card can register a virtual token as described in a different form factor. A USB token is inserted into any USB port. It provides enhanced security and ensures safe ...
HP ProtectTools User Guide
Page 33
...the "My Identity" page, you are asked for Administrators, click Credential Manager in the Windows registry database. 5. On the Device Type dialog box, click Virtual Token, and then click Next. 4. The Token Properties dialog box is saved either in a file or in the left pane. 2. Type your old ...to allow Windows logon from Credential Manager on the computer hard drive or in the left pane. 2. The token is displayed. 6. To create a new virtual token: 1. Click My Identity, and then click Register Smart Card or Token. 3. Type the User PIN, select Register smart card or token for ...
...the "My Identity" page, you are asked for Administrators, click Credential Manager in the Windows registry database. 5. On the Device Type dialog box, click Virtual Token, and then click Next. 4. The Token Properties dialog box is saved either in a file or in the left pane. 2. Type your old ...to allow Windows logon from Credential Manager on the computer hard drive or in the left pane. 2. The token is displayed. 6. To create a new virtual token: 1. Click My Identity, and then click Register Smart Card or Token. 3. Type the User PIN, select Register smart card or token for ...
HP ProtectTools User Guide
Page 47
... obtain Certificates of Authority, which includes the following security logon methods: ● Fingerprint authentication ● Windows® password ● HP ProtectTools Java™ Card ● Virtual Token ● Embedded Security for Administrators in Windows Vista or HP ProtectTools Security Manager in Privacy Manager. or - Opening Privacy Manager To open Privacy Manager: 1.
... obtain Certificates of Authority, which includes the following security logon methods: ● Fingerprint authentication ● Windows® password ● HP ProtectTools Java™ Card ● Virtual Token ● Embedded Security for Administrators in Windows Vista or HP ProtectTools Security Manager in Privacy Manager. or - Opening Privacy Manager To open Privacy Manager: 1.
HP ProtectTools User Guide
Page 63
... Windows only deletes the reference to shredded assets. About free space bleaching Free space bleaching allows you can also customize a shred profile, which makes it virtually impossible to exclude from shredding. Free space bleaching provides no additional security to the asset. You can set up an automatic shred schedule, and you...
... Windows only deletes the reference to shredded assets. About free space bleaching Free space bleaching allows you can also customize a shred profile, which makes it virtually impossible to exclude from shredding. Free space bleaching provides no additional security to the asset. You can set up an automatic shred schedule, and you...
HP ProtectTools User Guide
Page 90
...Sign On support. Some Web-based applications stop functioning and report errors due to the disabling functionality pattern of a registered virtual token in Credential Manager because the option to browse was removed because it allowed non-users to authenticate other authentication methods work... ENWW Credential Manager can change Windows password even with Administrator's rights on to change the Credential Manager cannot change the local PC account passwords. Some application Web pages create errors that prevent the user from performing or completing tasks. For example, an ...
...Sign On support. Some Web-based applications stop functioning and report errors due to the disabling functionality pattern of a registered virtual token in Credential Manager because the option to browse was removed because it allowed non-users to authenticate other authentication methods work... ENWW Credential Manager can change Windows password even with Administrator's rights on to change the Credential Manager cannot change the local PC account passwords. Some application Web pages create errors that prevent the user from performing or completing tasks. For example, an ...
HP ProtectTools User Guide
Page 92
...the token is restored through identity restore. When user restores identity, Credential Manager can lose the association with virtual token. Even though Credential Manager has the virtual token registered, the user must reregister the token to restore the association. This is investigating long-term ... Details Solution HP is destroyed, so the token cannot be used anymore for logging on, even if the client part of the virtual token at logon screen. When uninstalling Credential Manager without keeping identities, the system (server) part of the token is investigating resolution ...
...the token is restored through identity restore. When user restores identity, Credential Manager can lose the association with virtual token. Even though Credential Manager has the virtual token registered, the user must reregister the token to restore the association. This is investigating long-term ... Details Solution HP is destroyed, so the token cannot be used anymore for logging on, even if the client part of the virtual token at logon screen. When uninstalling Credential Manager without keeping identities, the system (server) part of the token is investigating resolution ...
HP ProtectTools User Guide
Page 106
...owner to complete the authentication. trusted IM communication. Like a Java Card or biometric reader, it is saved either on with a virtual token, you are asked for a user PIN to a computer. Security feature that information on the computer will be compromised by ...sends signed and/or encrypted e-mails and Microsoft Office documents. Trusted Platform Module (TPM) embedded security chip. A listing of Trusted Contacts. virtual token. Profile for the HP ProtectTools Embedded Security Chip. trusted message. user. They can only enroll (with full rights to the host...
...owner to complete the authentication. trusted IM communication. Like a Java Card or biometric reader, it is saved either on with a virtual token, you are asked for a user PIN to a computer. Security feature that information on the computer will be compromised by ...sends signed and/or encrypted e-mails and Microsoft Office documents. Trusted Platform Module (TPM) embedded security chip. A listing of Trusted Contacts. virtual token. Profile for the HP ProtectTools Embedded Security Chip. trusted message. user. They can only enroll (with full rights to the host...
HP ProtectTools User Guide
Page 107
...7 logon wizard 21 recovery file password 7 registering fingerprints 21 registering other credentials 22 registering Smart Card 22 registering token 22 registering virtual token 22 restriction application access 28 settings, configuring 30 setup procedures 20 Single Sign On (SSO) 25 SSO application, exporting 26... 25 SSO credentials, modifying 27 SSO manual registration 26 SSO new application 25 token PIN, changing 23 troubleshooting 80 user verification 31 virtual token, creating 23 Windows Logon 24 Windows logon password, changing 23 Windows logon, allow 30 D data, restricting access to 5 ...
...7 logon wizard 21 recovery file password 7 registering fingerprints 21 registering other credentials 22 registering Smart Card 22 registering token 22 registering virtual token 22 restriction application access 28 settings, configuring 30 setup procedures 20 Single Sign On (SSO) 25 SSO application, exporting 26... 25 SSO credentials, modifying 27 SSO manual registration 26 SSO new application 25 token PIN, changing 23 troubleshooting 80 user verification 31 virtual token, creating 23 Windows Logon 24 Windows logon password, changing 23 Windows logon, allow 30 D data, restricting access to 5 ...