HP Notebook Reference Guide
Page 61
... user password ● Firewall software ● Windows updates ● Drive Encryption for HP ProtectTools Unauthorized access to Computer Setup settings and other BIOS administrator password in Computer Setup*...cable slot (used with an optional security cable) *Computer Setup is a preinstalled, ROM-based utility that can be enabled in Computer Setup, is used with the optional embedded security ... the system BIOS. ● The embedded security password, which can use either a pointing device (TouchPad, pointing stick, or USB mouse) or the keyboard to secure your information. You...
... user password ● Firewall software ● Windows updates ● Drive Encryption for HP ProtectTools Unauthorized access to Computer Setup settings and other BIOS administrator password in Computer Setup*...cable slot (used with an optional security cable) *Computer Setup is a preinstalled, ROM-based utility that can be enabled in Computer Setup, is used with the optional embedded security ... the system BIOS. ● The embedded security password, which can use either a pointing device (TouchPad, pointing stick, or USB mouse) or the keyboard to secure your information. You...
HP ProtectTools Getting Started
Page 13
... (select ● Allows IT managers to control access to devices based on a computer. ● Allows creation of a personal secure drive (PSD), which is reformatted or replaced. Computrace for HP ProtectTools (purchased separately) ● Requires separate purchase of tracking and tracing subscriptions... as well as Microsoft Outlook and Internet Explorer) for protected digital certificate operations. Module Key features File Sanitizer for HP ProtectTools (select models only) ● Allows you to securely shred digital assets (securely delete sensitive information including application ...
... (select ● Allows IT managers to control access to devices based on a computer. ● Allows creation of a personal secure drive (PSD), which is reformatted or replaced. Computrace for HP ProtectTools (purchased separately) ● Requires separate purchase of tracking and tracing subscriptions... as well as Microsoft Outlook and Internet Explorer) for protected digital certificate operations. Module Key features File Sanitizer for HP ProtectTools (select models only) ● Allows you to securely shred digital assets (securely delete sensitive information including application ...
HP ProtectTools Getting Started
Page 18
...Suppose a contract auditor is still recoverable). The following feature helps restrict access to data: ● Device Access Manager for HP ProtectTools allows IT managers to restrict access to obtain Privacy Manager Certificates when using email or Microsoft Office...Device Access Manager for HP ProtectTools (select models only) on the hard drive (writing over data that requires the use of strong password policy for dozens of data by shredding critical files and folders or bleaching deleted assets on page 89. ● File Sanitizer (select models only) allows secure deletion of Web-based...
...Suppose a contract auditor is still recoverable). The following feature helps restrict access to data: ● Device Access Manager for HP ProtectTools allows IT managers to restrict access to obtain Privacy Manager Certificates when using email or Microsoft Office...Device Access Manager for HP ProtectTools (select models only) on the hard drive (writing over data that requires the use of strong password policy for dozens of data by shredding critical files and folders or bleaching deleted assets on page 89. ● File Sanitizer (select models only) allows secure deletion of Web-based...
HP ProtectTools Getting Started
Page 100
... out, values affecting the access scenario have been changed from this view. Click Apply. Setup Procedures Configuring device access HP ProtectTools Device Access Manager offers four views: ● Simple Configuration-Allow or deny access to classes of devices, based on ) ● All DVD/CD-ROM drives ● All serial and parallel ports ● All Bluetooth...
... out, values affecting the access scenario have been changed from this view. Click Apply. Setup Procedures Configuring device access HP ProtectTools Device Access Manager offers four views: ● Simple Configuration-Allow or deny access to classes of devices, based on ) ● All DVD/CD-ROM drives ● All serial and parallel ports ● All Bluetooth...
HP ProtectTools Getting Started
Page 114
...an administrator password, use the arrow keys to all users. Under Embedded Security, if the device is displayed in the lower-left corner of the screen. 2. Follow the on or restarting ...the computer, and then pressing f10 while the "f10 = ROM Based Setup" message is hidden, select Available. 6. Encrypted information cannot be accessed or recovered without... turning on -screen instructions. CAUTION: Safeguard the Basic User Key password. Right-click the HP ProtectTools Security Manager icon in Embedded Security accomplishes the following tasks: ● Set an owner...
...an administrator password, use the arrow keys to all users. Under Embedded Security, if the device is displayed in the lower-left corner of the screen. 2. Follow the on or restarting ...the computer, and then pressing f10 while the "f10 = ROM Based Setup" message is hidden, select Available. 6. Encrypted information cannot be accessed or recovered without... turning on -screen instructions. CAUTION: Safeguard the Basic User Key password. Right-click the HP ProtectTools Security Manager icon in Embedded Security accomplishes the following tasks: ● Set an owner...
Regulatory, Safety and Environmental Notices User Guide
Page 16
... you are reminded to the antennas during operation of the equipment and for notebook computers This device has been designed to radio waves, based on scientific guidelines that for satisfactory operation of the equipment. Users are onboard aircraft. Failure to observe this ...instruction may be allowed to come too close to restrict the use of these devices onboard aircraft is illegal, may lead...
... you are reminded to the antennas during operation of the equipment and for notebook computers This device has been designed to radio waves, based on scientific guidelines that for satisfactory operation of the equipment. Users are onboard aircraft. Failure to observe this ...instruction may be allowed to come too close to restrict the use of these devices onboard aircraft is illegal, may lead...
Regulatory, Safety and Environmental Notices User Guide
Page 17
The SAR data information is at the discretion of tissue. Thailand WWAN wireless notice 9 Taiwan notices Wireless LAN 802.11a devices Wireless LAN 802.11b devices Airline travel notice Use of electronic equipment onboard commercial aircraft is based on CENELEC's standards EN50360 and EN50361, which use the limit of 2 watts per kilogram, averaged over 10 grams of the airline. Thailand WWAN wireless notice This telecom equipment has complied with NTC regulations.
The SAR data information is at the discretion of tissue. Thailand WWAN wireless notice 9 Taiwan notices Wireless LAN 802.11a devices Wireless LAN 802.11b devices Airline travel notice Use of electronic equipment onboard commercial aircraft is based on CENELEC's standards EN50360 and EN50361, which use the limit of 2 watts per kilogram, averaged over 10 grams of the airline. Thailand WWAN wireless notice This telecom equipment has complied with NTC regulations.