2008 HP business notebook PC F10 Setup overview
Page 2
...; HP EliteBook 6930p • HP Compaq 6530b • HP Compaq 6830s • HP Compaq 6530s • HP Compaq 6735b • HP EliteBook 2730p • HP Compaq 6735s • HP EliteBook 2530p • HP Compaq 6730b • HP Compaq 2230s • HP Compaq 6730s The enhanced security and functionality of functions and configuration options, but required keyboard navigation. Since 1999 HP Compaq business notebooks have utilized a text based...
...; HP EliteBook 6930p • HP Compaq 6530b • HP Compaq 6830s • HP Compaq 6530s • HP Compaq 6735b • HP EliteBook 2730p • HP Compaq 6735s • HP EliteBook 2530p • HP Compaq 6730b • HP Compaq 2230s • HP Compaq 6730s The enhanced security and functionality of functions and configuration options, but required keyboard navigation. Since 1999 HP Compaq business notebooks have utilized a text based...
2008 HP business notebook PC F10 Setup overview
Page 7
...Bay, NB Hard Drive, USB Floppy, USB CDROM, USB Hard Drive, NB Ethernet, SD Card, Dock Upgrade Bay, Ext SATA Drive Device Configurations USB Legacy Support Enables mouse/keyboard support. Enabled/Disabled SD Card boot Allows for boot from LAN. Enabled/Disabled PXE Internal NIC boot ..., EPP Fan Always on while on AC Leave fan on while on Intel based systems. Enabled/Disabled SATA Device Mode Select SATA mode AHCI/IDE Table 1. (Continued) Key features for F10 Setup on select 2008 HP business notebook PCs Feature Function Options (Default in increments of a custom logo ...
...Bay, NB Hard Drive, USB Floppy, USB CDROM, USB Hard Drive, NB Ethernet, SD Card, Dock Upgrade Bay, Ext SATA Drive Device Configurations USB Legacy Support Enables mouse/keyboard support. Enabled/Disabled SD Card boot Allows for boot from LAN. Enabled/Disabled PXE Internal NIC boot ..., EPP Fan Always on while on AC Leave fan on while on Intel based systems. Enabled/Disabled SATA Device Mode Select SATA mode AHCI/IDE Table 1. (Continued) Key features for F10 Setup on select 2008 HP business notebook PCs Feature Function Options (Default in increments of a custom logo ...
2008 HP business notebook PC F10 Setup overview
Page 8
...Key features for F10 Setup on select 2008 HP business notebook PCs Feature Function Options (Default in Bold where applicable) SYSTEM CONFIGURATION MENU Device Configurations (Cont.) Secondary Battery Fast Charge HP QuickLook Switches charging to secondary Enabled/Disabled battery ...Enabled/Disabled Virtualization Technology Enables VT on Intel based systems. Enabled/Disabled TXT Technology Enables TXT on Intel based systems. Enabled/Disabled Dual Core CPU Enables dual processor cores. Enabled/Disabled Modem Device Enables integrated modem. Enabled/Disabled 1394 Port ...
...Key features for F10 Setup on select 2008 HP business notebook PCs Feature Function Options (Default in Bold where applicable) SYSTEM CONFIGURATION MENU Device Configurations (Cont.) Secondary Battery Fast Charge HP QuickLook Switches charging to secondary Enabled/Disabled battery ...Enabled/Disabled Virtualization Technology Enables VT on Intel based systems. Enabled/Disabled TXT Technology Enables TXT on Intel based systems. Enabled/Disabled Dual Core CPU Enables dual processor cores. Enabled/Disabled Modem Device Enables integrated modem. Enabled/Disabled 1394 Port ...
2008 HP business notebook PC F10 Setup overview
Page 10
... level • Unlock the system when other BIOS users fail the preboot authentication BIOS User BIOS users are created by the HP ProtectTools security solution from a device other security tokens to authenticate and boot the BIOS and if enabled, can log all the way into Windows. • ...Use his /her Windows password to access F10 based on permission setup by the BIOS administrator HP ProtectTools Users ProtectTools users are created by ...
... level • Unlock the system when other BIOS users fail the preboot authentication BIOS User BIOS users are created by the HP ProtectTools security solution from a device other security tokens to authenticate and boot the BIOS and if enabled, can log all the way into Windows. • ...Use his /her Windows password to access F10 based on permission setup by the BIOS administrator HP ProtectTools Users ProtectTools users are created by ...
2008 HP business notebook PC F10 Setup overview
Page 14
... the IT helpdesk for assistance, thus saving considerable time for the user and helpdesk expense for connecting mass storage devices to maximize fault tolerance is HP SpareKey? F10 Setup, QuickLook 2 and System Diagnostics. Captures Microsoft Outlook email, calendar, tasks, and contact information... Personal Information Manager (PIM) viewer for EFI based utilities - HP QuickLook is contained in hibernation from the QuickLook Preferences page accessed off or in the HP_TOOLS partition? What is also supported SATA. By using HP SpareKey and responding correctly to the pre-selected ...
... the IT helpdesk for assistance, thus saving considerable time for the user and helpdesk expense for connecting mass storage devices to maximize fault tolerance is HP SpareKey? F10 Setup, QuickLook 2 and System Diagnostics. Captures Microsoft Outlook email, calendar, tasks, and contact information... Personal Information Manager (PIM) viewer for EFI based utilities - HP QuickLook is contained in hibernation from the QuickLook Preferences page accessed off or in the HP_TOOLS partition? What is also supported SATA. By using HP SpareKey and responding correctly to the pre-selected ...
installing UEFi-based Microsoft Windows Vista SP1 (x64) on HP EliteBook and Compaq Notebook PCs
Page 4
... hard disk has never been formatted, the CDROM entry should be listed if this is the first time installing UEFI-based Windows Vista SP1 The initial File Explorer menu lists available storage devices including a "Primary Master" hard disk, if the hard disk is formatted, and an entry for Removable Media for the... Removable Media type with the CDROM (Entry1) as the last portion of the F9 Menu. Select the CDROM entry (one shown. Figure 4: Screenshot of the device path shown).
... hard disk has never been formatted, the CDROM entry should be listed if this is the first time installing UEFI-based Windows Vista SP1 The initial File Explorer menu lists available storage devices including a "Primary Master" hard disk, if the hard disk is formatted, and an entry for Removable Media for the... Removable Media type with the CDROM (Entry1) as the last portion of the F9 Menu. Select the CDROM entry (one shown. Figure 4: Screenshot of the device path shown).
Installing Windows 7 on HP Compaq and EliteBook Notebook PCs
Page 6
... backup all data prior to resume from hibernation. Affected Systems: All models Resolution: Windows 7 Beta is connected directly to Sleep on HP business notebooks. Appendix A: Known Anomalies This is extremely slow. A new version of anomalies observed during Windows 7 installation, process stalls or is...installing Windows 7 Beta on lid close by default, which will exhibit anomalous behavior when an external display device is set to the system or through a docking base. Updated beta video drivers will be addressed in April on Windows Update which will be installed, but...
... backup all data prior to resume from hibernation. Affected Systems: All models Resolution: Windows 7 Beta is connected directly to Sleep on HP business notebooks. Appendix A: Known Anomalies This is extremely slow. A new version of anomalies observed during Windows 7 installation, process stalls or is...installing Windows 7 Beta on lid close by default, which will exhibit anomalous behavior when an external display device is set to the system or through a docking base. Updated beta video drivers will be addressed in April on Windows Update which will be installed, but...
Trusted Execution Technology and Tboot Implementation
Page 2
...hit tab) at some point in the future, then it is a verification mechanism used to IDE) 6. Go to System Configuration Æ Device Configurations Æ SATA Native Mode Æ IDE (optional) 5. (Note: If you switch the SATA option back to verify the Intel TXT...processes. Locked, Enabled and Activated, VT- Go to Security Æ Setup BIOS Administrator Password to System Configuration Æ Device Configurations Æ Virtualization Technology Æ Enabled 4. Based on DVD. 2. Trusted boot (Tboot), an open source, pre- kernel/VMM module that uses Intel(R) Trusted Execution ...
...hit tab) at some point in the future, then it is a verification mechanism used to IDE) 6. Go to System Configuration Æ Device Configurations Æ SATA Native Mode Æ IDE (optional) 5. (Note: If you switch the SATA option back to verify the Intel TXT...processes. Locked, Enabled and Activated, VT- Go to Security Æ Setup BIOS Administrator Password to System Configuration Æ Device Configurations Æ Virtualization Technology Æ Enabled 4. Based on DVD. 2. Trusted boot (Tboot), an open source, pre- kernel/VMM module that uses Intel(R) Trusted Execution ...
Trusted Execution Technology and Tboot Implementation
Page 9
... 9 TBOOT: user-provided SINIT found: /SINIT.BIN TBOOT: chipset ids: vendor=8086, device=9000, revision=7f TBOOT: 1 ACM chipset id entries: TBOOT: vendor=8086, device=9000, flags=1, revision=3f, extended=0 TBOOT: copied SINIT (size=66c0) to 3aa00000 TBOOT: AC mod base alignment OK TBOOT: AC mod size OK TBOOT: AC module header dump...
... 9 TBOOT: user-provided SINIT found: /SINIT.BIN TBOOT: chipset ids: vendor=8086, device=9000, revision=7f TBOOT: 1 ACM chipset id entries: TBOOT: vendor=8086, device=9000, flags=1, revision=3f, extended=0 TBOOT: copied SINIT (size=66c0) to 3aa00000 TBOOT: AC mod base alignment OK TBOOT: AC mod size OK TBOOT: AC module header dump...
HP ProtectTools - Windows Vista and Windows XP
Page 9
... (TPM) embedded security chip to help protect against unauthorized access to writeable devices for protected digital certificate operations. Device Access Manager for HP ProtectTools (select ● Device Access Manager allows IT managers to control access to models only) devices based on user profiles. ● Device Access Manager prevents unauthorized users from removing data using external storage media...
... (TPM) embedded security chip to help protect against unauthorized access to writeable devices for protected digital certificate operations. Device Access Manager for HP ProtectTools (select ● Device Access Manager allows IT managers to control access to models only) devices based on user profiles. ● Device Access Manager prevents unauthorized users from removing data using external storage media...
HP ProtectTools - Windows Vista and Windows XP
Page 13
See Embedded Security "Setup procedures on page 17" For stronger security, Embedded Security for HP ProtectTools allows IT managers to restrict access to writeable devices so sensitive information cannot be accessed without having to write them down or try to password-protected ... "Using Single Sign On on page 17" ● Device Access Manager for HP ProtectTools then protects that requires the use of strong password policy for dozens of Web-based applications and databases, Credential Manager for HP ProtectTools provides a protected repository for passwords and Single Sign On...
See Embedded Security "Setup procedures on page 17" For stronger security, Embedded Security for HP ProtectTools allows IT managers to restrict access to writeable devices so sensitive information cannot be accessed without having to write them down or try to password-protected ... "Using Single Sign On on page 17" ● Device Access Manager for HP ProtectTools then protects that requires the use of strong password policy for dozens of Web-based applications and databases, Credential Manager for HP ProtectTools provides a protected repository for passwords and Single Sign On...
HP ProtectTools - Windows Vista and Windows XP
Page 19
...users. Immediately after you can provide a strong form of authentication when it uses cryptography-based identification and proof of storing and providing credentials. A USB token is displayed. 6.... is connected to Windows 1. On the Device Type dialog box, click the desired type of information and authentication for strong authentication. In HP ProtectTools Security Manager, click Credential Manager in...smart card is inserted or the token is simply a smart card in the core functionality of possession when authenticating a user to a network with information. Type the...
...users. Immediately after you can provide a strong form of authentication when it uses cryptography-based identification and proof of storing and providing credentials. A USB token is displayed. 6.... is connected to Windows 1. On the Device Type dialog box, click the desired type of information and authentication for strong authentication. In HP ProtectTools Security Manager, click Credential Manager in...smart card is inserted or the token is simply a smart card in the core functionality of possession when authenticating a user to a network with information. Type the...
HP ProtectTools - Windows Vista and Windows XP
Page 75
Then follow the on or restarting the computer, and then pressing f10 while the "f10 = ROM Based Setup" message is displayed in BIOS Configuration for HP ProtectTools. Failure to initialize the embedded security chip could result in the following 2 sections to enable and... Computer Setup by turning on -screen instructions. To save your IT administrator immediately initialize the embedded security chip. Select Embedded security device state and change to the Embedded Security configuration. 8. Enabling the embedded security chip The embedded security chip must be performed in ...
Then follow the on or restarting the computer, and then pressing f10 while the "f10 = ROM Based Setup" message is displayed in BIOS Configuration for HP ProtectTools. Failure to initialize the embedded security chip could result in the following 2 sections to enable and... Computer Setup by turning on -screen instructions. To save your IT administrator immediately initialize the embedded security chip. Select Embedded security device state and change to the Embedded Security configuration. 8. Enabling the embedded security chip The embedded security chip must be performed in ...
HP ProtectTools - Windows Vista and Windows XP
Page 86
...removed or damaged, users lose all Credential Manager credentials protected by turning on Windows XP Service Pack 1 only. Refer to Embedded Security Device-Enable. 5. If the user logs on to Windows first, then the user must manually log on to log on to Credential Manager... Single Sign On is researching a workaround for future product enhancements. Use the arrow keys to removing the TPM module. HP is relaunched, it to Microsoft knowledge base article 813301 at http://www.microsoft.com for Remote Desktop Connection (RDP) are set to Credential Manager, creates a document...
...removed or damaged, users lose all Credential Manager credentials protected by turning on Windows XP Service Pack 1 only. Refer to Embedded Security Device-Enable. 5. If the user logs on to Windows first, then the user must manually log on to log on to Credential Manager... Single Sign On is researching a workaround for future product enhancements. Use the arrow keys to removing the TPM module. HP is relaunched, it to Microsoft knowledge base article 813301 at http://www.microsoft.com for Remote Desktop Connection (RDP) are set to Credential Manager, creates a document...
HP ProtectTools - Windows Vista and Windows XP
Page 96
...TPM preboot authentication is functioning as designed; The first user will be granted administrative privileges. This is enabled in future Web-based ROM SoftPaq offerings. 90 Chapter 9 Troubleshooting The user has to change his TPM user PIN to re-initialize the Basic ...Power-on authentication support is not being reset to factory settings when using the Embedded Security Device option Reset to follow good security policies for system level protection. HP ProtectTools- The BIOS and OS Embedded Security passwords are encouraged to Factory Settings. Unrestricted access...
...TPM preboot authentication is functioning as designed; The first user will be granted administrative privileges. This is enabled in future Web-based ROM SoftPaq offerings. 90 Chapter 9 Troubleshooting The user has to change his TPM user PIN to re-initialize the Basic ...Power-on authentication support is not being reset to factory settings when using the Embedded Security Device option Reset to follow good security policies for system level protection. HP ProtectTools- The BIOS and OS Embedded Security passwords are encouraged to Factory Settings. Unrestricted access...
Security - Windows XP, Windows Vista and Windows 7
Page 5
... Encryption for HP ProtectTools Unauthorized access to Computer Setup settings and other BIOS administrator password in the Computer Setup utility (referred to navigate and make selections in combination with an optional security cable) *Computer Setup is a preinstalled, ROM-based utility that...Setup* system identification information Unauthorized removal of risks. To protect against Use this security feature Unauthorized use either a pointing device (TouchPad, pointing stick, or USB mouse) or the keyboard to hereafter as deterrents. For information about ordering the ...
... Encryption for HP ProtectTools Unauthorized access to Computer Setup settings and other BIOS administrator password in the Computer Setup utility (referred to navigate and make selections in combination with an optional security cable) *Computer Setup is a preinstalled, ROM-based utility that...Setup* system identification information Unauthorized removal of risks. To protect against Use this security feature Unauthorized use either a pointing device (TouchPad, pointing stick, or USB mouse) or the keyboard to hereafter as deterrents. For information about ordering the ...
Wireless (Select Models Only) - Windows Vista and Windows XP
Page 5
...11a supports data rates of up to a mobile network operator's base station. Mobile network operators install networks of base stations (similar to cell phone towers) throughout large geographic areas... a wireless router or a wireless access point. ● HP Mobile Broadband Module-A wireless wide area network (WWAN) device that provides access to information wherever mobile network operator service is...operates at 2.4 GHz or 5 GHz, making it may be equipped with other . In a PAN, each other devices, and devices must be relatively close together- Computers with WLAN devices support one ...
...11a supports data rates of up to a mobile network operator's base station. Mobile network operators install networks of base stations (similar to cell phone towers) throughout large geographic areas... a wireless router or a wireless access point. ● HP Mobile Broadband Module-A wireless wide area network (WWAN) device that provides access to information wherever mobile network operator service is...operates at 2.4 GHz or 5 GHz, making it may be equipped with other . In a PAN, each other devices, and devices must be relatively close together- Computers with WLAN devices support one ...
Wireless (Select Models Only) - Windows Vista and Windows XP
Page 12
... casual eavesdropping rather than more secure and anonymous. Protecting your WLAN Because the WLAN standard was designed with built-in security Many wireless base stations, gateways, and routers provide built-in a hotspot, limit your network activities to noncritical e-mail and basic Internet surfing. WLANs ...in a secure place before it is essential to understand that WLANs are less likely to know or remember the SSID to connect new devices to encode or encrypt all network data before closing the network, other advanced options. By closing the network. 8 Chapter 2 Using a...
... casual eavesdropping rather than more secure and anonymous. Protecting your WLAN Because the WLAN standard was designed with built-in security Many wireless base stations, gateways, and routers provide built-in a hotspot, limit your network activities to noncritical e-mail and basic Internet surfing. WLANs ...in a secure place before it is essential to understand that WLANs are less likely to know or remember the SSID to connect new devices to encode or encrypt all network data before closing the network, other advanced options. By closing the network. 8 Chapter 2 Using a...
Wireless (Select Models Only) - Windows XP
Page 5
... at 2.4 GHz or 5 GHz, making it may be relatively close together- If the final specifications differ from the draft specifications, it backward compatible with other devices, and devices must be equipped with a wireless router or a wireless access point. ● HP Mobile Broadband ... of up to 54 Mbps and operates at a frequency of each mobile device communicates to a mobile network operator's base station. typically within 10 meters (approximately 33 feet) of 5 GHz. 1 Using wireless devices (select models only) Wireless technology transfers data across entire states, regions,...
... at 2.4 GHz or 5 GHz, making it may be relatively close together- If the final specifications differ from the draft specifications, it backward compatible with other devices, and devices must be equipped with a wireless router or a wireless access point. ● HP Mobile Broadband ... of up to 54 Mbps and operates at a frequency of each mobile device communicates to a mobile network operator's base station. typically within 10 meters (approximately 33 feet) of 5 GHz. 1 Using wireless devices (select models only) Wireless technology transfers data across entire states, regions,...
Wireless (Select Models Only) - Windows XP
Page 12
Protecting your WLAN Because the WLAN standard was designed with built-in security Many wireless base stations, gateways, and routers provide built-in security features such as WEP does, WPA uses temporal key integrity protocol (TKIP) to protect your ... hardware. Usually, you will not be able to well-known and well-documented security weaknesses. Because wireless radio signals travel outside the network, other WLAN devices can take precautions to protect your network from the most common wireless security risks. ● Work behind a firewall A firewall is not broadcast, you...
Protecting your WLAN Because the WLAN standard was designed with built-in security Many wireless base stations, gateways, and routers provide built-in security features such as WEP does, WPA uses temporal key integrity protocol (TKIP) to protect your ... hardware. Usually, you will not be able to well-known and well-documented security weaknesses. Because wireless radio signals travel outside the network, other WLAN devices can take precautions to protect your network from the most common wireless security risks. ● Work behind a firewall A firewall is not broadcast, you...