2008 HP business notebook PC F10 Setup overview
Page 2
...; HP Compaq 6531s • HP EliteBook 6930p • HP Compaq 6530b • HP Compaq 6830s • HP Compaq 6530s • HP Compaq 6735b • HP EliteBook 2730p • HP Compaq 6735s • HP EliteBook 2530p • HP Compaq 6730b • HP Compaq 2230s • HP Compaq 6730s HP BIOS enables customers to a broad set of features that HP provides. Since 1999 HP Compaq business notebooks have utilized a text based F10...
...; HP Compaq 6531s • HP EliteBook 6930p • HP Compaq 6530b • HP Compaq 6830s • HP Compaq 6530s • HP Compaq 6735b • HP EliteBook 2730p • HP Compaq 6735s • HP EliteBook 2530p • HP Compaq 6730b • HP Compaq 2230s • HP Compaq 6730s HP BIOS enables customers to a broad set of features that HP provides. Since 1999 HP Compaq business notebooks have utilized a text based F10...
2008 HP business notebook PC F10 Setup overview
Page 7
... boot from LAN. ECP, standard, bidirectional, EPP Fan Always on while on AC Leave fan on while on Intel based systems. Enabled/Disabled SATA Device Mode Select SATA mode AHCI/IDE Enabled/Disabled Multiboot: Express Boot Popup Delay Amount of time the Express Boot (Sec)...AC. Table 1. (Continued) Key features for diagnostics. Enabled/Disabled Display Diagnostics URL Display web address for F10 Setup on select 2008 HP business notebook PCs Feature Function Options (Default in Bold where applicable) SYSTEM CONFIGURATION MENU Boot Options Startup Menu Delay (Sec.) Amount of...
... boot from LAN. ECP, standard, bidirectional, EPP Fan Always on while on AC Leave fan on while on Intel based systems. Enabled/Disabled SATA Device Mode Select SATA mode AHCI/IDE Enabled/Disabled Multiboot: Express Boot Popup Delay Amount of time the Express Boot (Sec)...AC. Table 1. (Continued) Key features for diagnostics. Enabled/Disabled Display Diagnostics URL Display web address for F10 Setup on select 2008 HP business notebook PCs Feature Function Options (Default in Bold where applicable) SYSTEM CONFIGURATION MENU Boot Options Startup Menu Delay (Sec.) Amount of...
2008 HP business notebook PC F10 Setup overview
Page 8
... on select 2008 HP business notebook PCs Feature Function Options (Default in Bold where applicable) SYSTEM CONFIGURATION MENU Device Configurations (Cont.) Secondary Battery Fast Charge HP QuickLook Switches charging to HP QuickLook. Enabled/Disabled Fingerprint Device Enables fingerprint reader... Intel based systems. Enabled/Disabled TXT Technology Enables TXT on Intel based systems. Enabled/Disabled Dual Core CPU Enables dual processor cores. Network/Follow Boot order Notebook Upgrade Bay Enables integrated upgrade bay. Enabled/Disabled Modem Device Enables ...
... on select 2008 HP business notebook PCs Feature Function Options (Default in Bold where applicable) SYSTEM CONFIGURATION MENU Device Configurations (Cont.) Secondary Battery Fast Charge HP QuickLook Switches charging to HP QuickLook. Enabled/Disabled Fingerprint Device Enables fingerprint reader... Intel based systems. Enabled/Disabled TXT Technology Enables TXT on Intel based systems. Enabled/Disabled Dual Core CPU Enables dual processor cores. Network/Follow Boot order Notebook Upgrade Bay Enables integrated upgrade bay. Enabled/Disabled Modem Device Enables ...
2008 HP business notebook PC F10 Setup overview
Page 10
...user privilege includes: • Use of BIOS password to authenticate and boot the BIOS • Use of BIOS password to access F10 based on the permission setup by the BIOS administrator One-Step Logon Pre-boot has been enhanced by combining security tokens (such as a ...automatically made available in the pre-boot environment. user accounts created in Windows are created by the HP ProtectTools security solution from a device other than the primary hard drive. HP business notebooks offer a range of pre-boot authentication solutions, allowing businesses to provide an additional layer...
...user privilege includes: • Use of BIOS password to authenticate and boot the BIOS • Use of BIOS password to access F10 based on the permission setup by the BIOS administrator One-Step Logon Pre-boot has been enhanced by combining security tokens (such as a ...automatically made available in the pre-boot environment. user accounts created in Windows are created by the HP ProtectTools security solution from a device other than the primary hard drive. HP business notebooks offer a range of pre-boot authentication solutions, allowing businesses to provide an additional layer...
2008 HP business notebook PC F10 Setup overview
Page 14
... personal questions an individual can quickly recover his Windows password without launching Microsoft Outlook by desktop and laptop manufacturers for EFI based utilities - Note: HP QuickLook 2 is accessible when the notebook is a storage interface bus used by pressing a single button. What is also... supported SATA. The HP_TOOLS partition contains code for connecting mass storage devices to contact the IT helpdesk for assistance, thus saving considerable ...
... personal questions an individual can quickly recover his Windows password without launching Microsoft Outlook by desktop and laptop manufacturers for EFI based utilities - Note: HP QuickLook 2 is accessible when the notebook is a storage interface bus used by pressing a single button. What is also... supported SATA. The HP_TOOLS partition contains code for connecting mass storage devices to contact the IT helpdesk for assistance, thus saving considerable ...
installing UEFi-based Microsoft Windows Vista SP1 (x64) on HP EliteBook and Compaq Notebook PCs
Page 4
... hard disk has never been formatted, the CDROM entry should be listed if this is the first time installing UEFI-based Windows Vista SP1 The initial File Explorer menu lists available storage devices including a "Primary Master" hard disk, if the hard disk is formatted, and an entry for Removable Media for the... Removable Media type with the CDROM (Entry1) as the last portion of the F9 Menu. Select the CDROM entry (one shown. Figure 4: Screenshot of the device path shown).
... hard disk has never been formatted, the CDROM entry should be listed if this is the first time installing UEFI-based Windows Vista SP1 The initial File Explorer menu lists available storage devices including a "Primary Master" hard disk, if the hard disk is formatted, and an entry for Removable Media for the... Removable Media type with the CDROM (Entry1) as the last portion of the F9 Menu. Select the CDROM entry (one shown. Figure 4: Screenshot of the device path shown).
Installing Windows 7 on HP Compaq and EliteBook Notebook PCs
Page 6
... does not park when the system is set to Sleep on HP business notebooks. Description: Listed models will exhibit anomalous behavior when an external display device is extremely slow. Unrecognized devices in Device Manager Anomaly: Several devices aren't recognized after installing Windows 7 Beta Description: Base System Device, Fingerprint Sensor, PCI Serial Port, PCI Simple Communications Controller, and...
... does not park when the system is set to Sleep on HP business notebooks. Description: Listed models will exhibit anomalous behavior when an external display device is extremely slow. Unrecognized devices in Device Manager Anomaly: Several devices aren't recognized after installing Windows 7 Beta Description: Base System Device, Fingerprint Sensor, PCI Serial Port, PCI Simple Communications Controller, and...
Trusted Execution Technology and Tboot Implementation
Page 2
Trusted boot (Tboot), an open source, pre- Based on DVD. 2. Go to Security Æ Setup BIOS Administrator Password to System Configuration Æ Device Configurations Æ TXT Technology Æ Enabled 2. Enter BIOS setup by the owner, the LCP determines whether the...Go to enter the BIOS administrator password. 2. kernel/VMM module that uses Intel(R) Trusted Execution Technology (Intel(R) TXT) to System Configuration Æ Device Configurations Æ Virtualization Technology Æ Enabled 4. Enabled, TXT- Go to perform a measured and verified launch of an OS kernel/VMM (...
Trusted boot (Tboot), an open source, pre- Based on DVD. 2. Go to Security Æ Setup BIOS Administrator Password to System Configuration Æ Device Configurations Æ TXT Technology Æ Enabled 2. Enter BIOS setup by the owner, the LCP determines whether the...Go to enter the BIOS administrator password. 2. kernel/VMM module that uses Intel(R) Trusted Execution Technology (Intel(R) TXT) to System Configuration Æ Device Configurations Æ Virtualization Technology Æ Enabled 4. Enabled, TXT- Go to perform a measured and verified launch of an OS kernel/VMM (...
Trusted Execution Technology and Tboot Implementation
Page 9
TBOOT: user-provided SINIT found: /SINIT.BIN TBOOT: chipset ids: vendor=8086, device=9000, revision=7f TBOOT: 1 ACM chipset id entries: TBOOT: vendor=8086, device=9000, flags=1, revision=3f, extended=0 TBOOT: copied SINIT (size=66c0) to 3aa00000 TBOOT: AC mod base alignment OK TBOOT: AC mod size OK TBOOT: AC module header dump for...
TBOOT: user-provided SINIT found: /SINIT.BIN TBOOT: chipset ids: vendor=8086, device=9000, revision=7f TBOOT: 1 ACM chipset id entries: TBOOT: vendor=8086, device=9000, flags=1, revision=3f, extended=0 TBOOT: copied SINIT (size=66c0) to 3aa00000 TBOOT: AC mod base alignment OK TBOOT: AC mod size OK TBOOT: AC module header dump for...
HP ProtectTools - Windows Vista and Windows XP
Page 9
... operations. Module Key features Embedded Security for HP ProtectTools (select models only) ● Embedded Security uses a Trusted Platform Module (TPM) embedded security chip to help protect against unauthorized access to writeable devices for specific individuals or groups of a personal... applications (such as Microsoft Outlook and Internet Explorer) for HP ProtectTools (select ● Device Access Manager allows IT managers to control access to models only) devices based on user profiles. ● Device Access Manager prevents unauthorized users from removing data using external ...
... operations. Module Key features Embedded Security for HP ProtectTools (select models only) ● Embedded Security uses a Trusted Platform Module (TPM) embedded security chip to help protect against unauthorized access to writeable devices for specific individuals or groups of a personal... applications (such as Microsoft Outlook and Internet Explorer) for HP ProtectTools (select ● Device Access Manager allows IT managers to control access to models only) devices based on user profiles. ● Device Access Manager prevents unauthorized users from removing data using external ...
HP ProtectTools - Windows Vista and Windows XP
Page 13
... policies If a mandate goes into effect that requires the use of strong password policy for dozens of Web-based applications and databases, Credential Manager for HP ProtectTools provides a protected repository for passwords and Single Sign On convenience using the following procedures: ◦ Embedded...having to write them down or try to the operating system. See Embedded Security "Setup procedures on page 17" ● Device Access Manager for HP ProtectTools allows IT managers to restrict access to password-protected applications: ◦ Credential Manager "Setup procedures on page 11" ...
... policies If a mandate goes into effect that requires the use of strong password policy for dozens of Web-based applications and databases, Credential Manager for HP ProtectTools provides a protected repository for passwords and Single Sign On convenience using the following procedures: ◦ Embedded...having to write them down or try to the operating system. See Embedded Security "Setup procedures on page 17" ● Device Access Manager for HP ProtectTools allows IT managers to restrict access to password-protected applications: ◦ Credential Manager "Setup procedures on page 11" ...
HP ProtectTools - Windows Vista and Windows XP
Page 19
In HP ProtectTools Security Manager, click Credential Manager in the core functionality of device, and then click Next. 4. Using your fingerprints and setting up the fingerprint reader. 4. Smart cards provide protection of your fingerprints, restart Windows. ... have a card reader configured for this procedure. Logging on to a network with a smart card can provide a strong form of authentication when it uses cryptography-based identification and proof of a credit card with an embedded microchip that can register a virtual token as a USB key. A card requires a reader, while a...
In HP ProtectTools Security Manager, click Credential Manager in the core functionality of device, and then click Next. 4. Using your fingerprints and setting up the fingerprint reader. 4. Smart cards provide protection of your fingerprints, restart Windows. ... have a card reader configured for this procedure. Logging on to a network with a smart card can provide a strong form of authentication when it uses cryptography-based identification and proof of a credit card with an embedded microchip that can register a virtual token as a USB key. A card requires a reader, while a...
HP ProtectTools - Windows Vista and Windows XP
Page 75
If you have not set an administrator password, use the arrow keys to Enable. 7. Select Embedded security device state and change to select Security, select Setup password, and then press enter. 3. To save your preferences and exit Computer Setup, use the arrow keys... click Save Changes and Exit. Then follow the on or restarting the computer, and then pressing f10 while the "f10 = ROM Based Setup" message is displayed in BIOS Configuration for HP ProtectTools. Follow the steps in an unauthorized user, a computer worm, or a virus taking ownership of the screen. 2. Type your IT ...
If you have not set an administrator password, use the arrow keys to Enable. 7. Select Embedded security device state and change to select Security, select Setup password, and then press enter. 3. To save your preferences and exit Computer Setup, use the arrow keys... click Save Changes and Exit. Then follow the on or restarting the computer, and then pressing f10 while the "f10 = ROM Based Setup" message is displayed in BIOS Configuration for HP ProtectTools. Follow the steps in an unauthorized user, a computer worm, or a virus taking ownership of the screen. 2. Type your IT ...
HP ProtectTools - Windows Vista and Windows XP
Page 86
... Pack 1 only. The TPM Module is relaunched, it to Embedded Security Device-Enable. 5. Use the arrow keys to removing the TPM module. Users can lose all credentials protected by the TPM. HP recommends that the user back up their identity from Credential Manager prior to ... cause of the issue. Open Computer Setup by the TPM. Select Embedded Security Device. 4. Use the arrow keys to Microsoft knowledge base article 813301 at http://www.microsoft.com for future product enhancements. HP is researching a workaround for Remote Desktop Connection (RDP) are set to fail....
... Pack 1 only. The TPM Module is relaunched, it to Embedded Security Device-Enable. 5. Use the arrow keys to removing the TPM module. Users can lose all credentials protected by the TPM. HP recommends that the user back up their identity from Credential Manager prior to ... cause of the issue. Open Computer Setup by the TPM. Select Embedded Security Device. 4. Use the arrow keys to Microsoft knowledge base article 813301 at http://www.microsoft.com for future product enhancements. HP is researching a workaround for Remote Desktop Connection (RDP) are set to fail....
HP ProtectTools - Windows Vista and Windows XP
Page 96
...right of security policies and functions Allow Security Manager to Factory Settings option disables Embedded Security Device, which will have finished loading. However, after a TPM factory reset. HP ProtectTools- Numerous risks are encouraged to make TPM preboot work . The BIOS and OS ...User password and authenticating it depends on . Closing the shell before all plug-ins listed in future Web-based ROM SoftPaq offerings. 90 Chapter 9 Troubleshooting HP recommends that the customer's IT department follow "best practices" in to load. Since PTHOST.exe is ...
...right of security policies and functions Allow Security Manager to Factory Settings option disables Embedded Security Device, which will have finished loading. However, after a TPM factory reset. HP ProtectTools- Numerous risks are encouraged to make TPM preboot work . The BIOS and OS ...User password and authenticating it depends on . Closing the shell before all plug-ins listed in future Web-based ROM SoftPaq offerings. 90 Chapter 9 Troubleshooting HP recommends that the customer's IT department follow "best practices" in to load. Since PTHOST.exe is ...
Security - Windows XP, Windows Vista and Windows 7
Page 5
... Unauthorized use of the computer HP ProtectTools Security Manager, in order to the HP Web site at http://www.... accesses the Internet. If the computer is an online security-based tracking and recovery service available in the Computer Setup utility (referred... Unauthorized access to data HP ProtectTools Security Manager ● Firewall software ● Windows updates ● Drive Encryption for HP ProtectTools Unauthorized access to ...with an optional security cable) *Computer Setup is a preinstalled, ROM-based utility that can be used even when the operating system is not working...
... Unauthorized use of the computer HP ProtectTools Security Manager, in order to the HP Web site at http://www.... accesses the Internet. If the computer is an online security-based tracking and recovery service available in the Computer Setup utility (referred... Unauthorized access to data HP ProtectTools Security Manager ● Firewall software ● Windows updates ● Drive Encryption for HP ProtectTools Unauthorized access to ...with an optional security cable) *Computer Setup is a preinstalled, ROM-based utility that can be used even when the operating system is not working...
Wireless (Select Models Only) - Windows Vista and Windows XP
Page 5
...) of each mobile device communicates to a mobile network operator's base station. 1 Using wireless devices (select models only) Wireless technology transfers data across radio waves instead of base stations (similar to ...of wires. An 802.11g WLAN device is backward compatible with other devices, and devices must be equipped with one or more of 5 GHz. NOTE: The specifications for the 802...a wireless router or a wireless access point. ● HP Mobile Broadband Module-A wireless wide area network (WWAN) device that provides access to information wherever mobile network operator service...
...) of each mobile device communicates to a mobile network operator's base station. 1 Using wireless devices (select models only) Wireless technology transfers data across radio waves instead of base stations (similar to ...of wires. An 802.11g WLAN device is backward compatible with other devices, and devices must be equipped with one or more of 5 GHz. NOTE: The specifications for the 802...a wireless router or a wireless access point. ● HP Mobile Broadband Module-A wireless wide area network (WWAN) device that provides access to information wherever mobile network operator service...
Wireless (Select Models Only) - Windows Vista and Windows XP
Page 12
... of both data and requests for data that uses a WEP key to encode or encrypt all network data before closing the network, other WLAN devices can protect your network from unauthorized access. By closing the network. 8 Chapter 2 Using a WLAN WLANs in public areas, or "hotspots," like..., you can allow the network to the network. Protecting your WLAN Because the WLAN standard was designed with built-in security Many wireless base stations, gateways, and routers provide built-in security features such as WEP does, WPA uses temporal key integrity protocol (TKIP) to dynamically...
... of both data and requests for data that uses a WEP key to encode or encrypt all network data before closing the network, other WLAN devices can protect your network from unauthorized access. By closing the network. 8 Chapter 2 Using a WLAN WLANs in public areas, or "hotspots," like..., you can allow the network to the network. Protecting your WLAN Because the WLAN standard was designed with built-in security Many wireless base stations, gateways, and routers provide built-in security features such as WEP does, WPA uses temporal key integrity protocol (TKIP) to dynamically...
Wireless (Select Models Only) - Windows XP
Page 5
...9679; 802.11b, the first popular standard, supports data rates of up to 11 Mbps and operates at a frequency of 2.4 GHz. ● 802.11g supports data rates of up to cell phone towers) throughout large geographic areas, effectively providing coverage across radio ...the computer to a mobile network operator's base station. typically within 10 meters (approximately 33 feet) of each mobile wireless device communicates with a wireless router or a wireless access point. ● HP Mobile Broadband Module-A wireless wide area network (WWAN) device that provides access to information wherever mobile...
...9679; 802.11b, the first popular standard, supports data rates of up to 11 Mbps and operates at a frequency of 2.4 GHz. ● 802.11g supports data rates of up to cell phone towers) throughout large geographic areas, effectively providing coverage across radio ...the computer to a mobile network operator's base station. typically within 10 meters (approximately 33 feet) of each mobile wireless device communicates with a wireless router or a wireless access point. ● HP Mobile Broadband Module-A wireless wide area network (WWAN) device that provides access to information wherever mobile...
Wireless (Select Models Only) - Windows XP
Page 12
...all network data before closing the network. 8 Chapter 2 Using a WLAN Because wireless radio signals travel outside the network, other WLAN devices can allow the network to protect your WLAN: ● Use a wireless transmitter with only limited security capabilities-basically to foil casual ...well-known and well-documented security weaknesses. Protecting your WLAN Because the WLAN standard was designed with built-in security Many wireless base stations, gateways, and routers provide built-in a hotspot, limit your network activities to the network. It also generates different ...
...all network data before closing the network. 8 Chapter 2 Using a WLAN Because wireless radio signals travel outside the network, other WLAN devices can allow the network to protect your WLAN: ● Use a wireless transmitter with only limited security capabilities-basically to foil casual ...well-known and well-documented security weaknesses. Protecting your WLAN Because the WLAN standard was designed with built-in security Many wireless base stations, gateways, and routers provide built-in a hotspot, limit your network activities to the network. It also generates different ...