2008 HP business notebook PC F10 Setup overview
Page 2
... HP ProtectTools, HP Wireless Assistant, and HP QuickLook. Since 1999 HP Compaq business notebooks have utilized a text based F10...device. Supported Models All 2008 s, b, p and w business notebook and tablet models: • HP EliteBook 8730w • HP Compaq 6535b • HP EliteBook 8530w • HP Compaq 6535s • HP EliteBook 8530p • HP Compaq 6531s • HP EliteBook 6930p • HP Compaq 6530b • HP Compaq 6830s • HP Compaq 6530s • HP Compaq 6735b • HP EliteBook 2730p • HP Compaq 6735s • HP EliteBook 2530p • HP...
... HP ProtectTools, HP Wireless Assistant, and HP QuickLook. Since 1999 HP Compaq business notebooks have utilized a text based F10...device. Supported Models All 2008 s, b, p and w business notebook and tablet models: • HP EliteBook 8730w • HP Compaq 6535b • HP EliteBook 8530w • HP Compaq 6535s • HP EliteBook 8530p • HP Compaq 6531s • HP EliteBook 6930p • HP Compaq 6530b • HP Compaq 6830s • HP Compaq 6530s • HP Compaq 6735b • HP EliteBook 2730p • HP Compaq 6735s • HP EliteBook 2530p • HP...
2008 HP business notebook PC F10 Setup overview
Page 7
...1. (Continued) Key features for F10 Setup on select 2008 HP business notebook PCs Feature Function Options (Default in Bold where ...Floppy, USB CDROM, USB Hard Drive, NB Ethernet, SD Card, Dock Upgrade Bay, Ext SATA Drive Device Configurations USB Legacy Support Enables mouse/keyboard support. Enabled/Disabled Display Diagnostics URL Display web address for boot ..., bidirectional, EPP Fan Always on while on AC Leave fan on while on Intel based systems. Enabled/Disabled SATA Device Mode Select SATA mode AHCI/IDE Enabled/Disabled Parallel port mode Specifies parallel port mode....
...1. (Continued) Key features for F10 Setup on select 2008 HP business notebook PCs Feature Function Options (Default in Bold where ...Floppy, USB CDROM, USB Hard Drive, NB Ethernet, SD Card, Dock Upgrade Bay, Ext SATA Drive Device Configurations USB Legacy Support Enables mouse/keyboard support. Enabled/Disabled Display Diagnostics URL Display web address for boot ..., bidirectional, EPP Fan Always on while on AC Leave fan on while on Intel based systems. Enabled/Disabled SATA Device Mode Select SATA mode AHCI/IDE Enabled/Disabled Parallel port mode Specifies parallel port mode....
2008 HP business notebook PC F10 Setup overview
Page 8
... F10 Setup on select 2008 HP business notebook PCs Feature Function Options (Default in Bold where applicable) SYSTEM CONFIGURATION MENU Device Configurations (Cont.) Secondary Battery Fast Charge HP QuickLook Switches charging to secondary ...based systems. Enabled/Disabled Dual Core CPU Enables dual processor cores. Enabled/Disabled Integrated Camera Enables integrated camera. Enabled/Disabled Parallel Port Enables integrated parallel port. Enabled/Disabled 1394 Port Enables integrated 1394 port. Enabled/Disabled Embedded Bluetooth Device Enables integrated Bluetooth device...
... F10 Setup on select 2008 HP business notebook PCs Feature Function Options (Default in Bold where applicable) SYSTEM CONFIGURATION MENU Device Configurations (Cont.) Secondary Battery Fast Charge HP QuickLook Switches charging to secondary ...based systems. Enabled/Disabled Dual Core CPU Enables dual processor cores. Enabled/Disabled Integrated Camera Enables integrated camera. Enabled/Disabled Parallel Port Enables integrated parallel port. Enabled/Disabled 1394 Port Enables integrated 1394 port. Enabled/Disabled Embedded Bluetooth Device Enables integrated Bluetooth device...
2008 HP business notebook PC F10 Setup overview
Page 10
... are registered in Windows and the user information and communicated to access F10 based on permission setup by the BIOS administrator HP ProtectTools Users ProtectTools users are created by the HP ProtectTools security solution from a device other BIOS users fail the preboot authentication BIOS User BIOS users are created ...authenticate and boot the BIOS and if enabled, can log all the way into Windows. • Use his/her Windows password to access F10 based on , the end-user is required to provide a user name, then authenticate using one or more factors (such as biometrics, smart cards...
... are registered in Windows and the user information and communicated to access F10 based on permission setup by the BIOS administrator HP ProtectTools Users ProtectTools users are created by the HP ProtectTools security solution from a device other BIOS users fail the preboot authentication BIOS User BIOS users are created ...authenticate and boot the BIOS and if enabled, can log all the way into Windows. • Use his/her Windows password to access F10 based on , the end-user is required to provide a user name, then authenticate using one or more factors (such as biometrics, smart cards...
2008 HP business notebook PC F10 Setup overview
Page 14
...Q & A What is contained in hibernation from the QuickLook Preferences page accessed off or in the HP_TOOLS partition? HP QuickLook is EFI? What is a Personal Information Manager (PIM) viewer for connecting mass storage devices to the PC's motherboard. No, functionality has improved when compared to a graphical user interface reduce the supported functions... on reliability and performance to contact the IT helpdesk for assistance, thus saving considerable time for the user and helpdesk expense for EFI based utilities - The HP_TOOLS partition contains code for the business.
...Q & A What is contained in hibernation from the QuickLook Preferences page accessed off or in the HP_TOOLS partition? HP QuickLook is EFI? What is a Personal Information Manager (PIM) viewer for connecting mass storage devices to the PC's motherboard. No, functionality has improved when compared to a graphical user interface reduce the supported functions... on reliability and performance to contact the IT helpdesk for assistance, thus saving considerable time for the user and helpdesk expense for EFI based utilities - The HP_TOOLS partition contains code for the business.
installing UEFi-based Microsoft Windows Vista SP1 (x64) on HP EliteBook and Compaq Notebook PCs
Page 4
... hard disk has never been formatted, the CDROM entry should be listed if this is the first time installing UEFI-based Windows Vista SP1 The initial File Explorer menu lists available storage devices including a "Primary Master" hard disk, if the hard disk is formatted, and an entry for Removable Media for the... type with the CDROM (Entry1) as the last portion of the F9 Menu. Select the CDROM entry (one shown. See Figure 5. Figure 4: Screenshot of the device path shown). Figure 5: Screenshot after selecting "Boot from EFI File" 4
... hard disk has never been formatted, the CDROM entry should be listed if this is the first time installing UEFI-based Windows Vista SP1 The initial File Explorer menu lists available storage devices including a "Primary Master" hard disk, if the hard disk is formatted, and an entry for Removable Media for the... type with the CDROM (Entry1) as the last portion of the F9 Menu. Select the CDROM entry (one shown. See Figure 5. Figure 4: Screenshot of the device path shown). Figure 5: Screenshot after selecting "Boot from EFI File" 4
Installing Windows 7 on HP Compaq and EliteBook Notebook PCs
Page 6
...'t recognized after installing Windows 7 Beta Description: Base System Device, Fingerprint Sensor, PCI Serial Port, PCI Simple Communications Controller, and Unknown devices lack drivers in later Windows 7 builds. Remember to backup all data prior to resume from hibernation. Appendix A: Known Anomalies This is a partial list of HP 3D DriveGuard will be available at Windows 7 launch...
...'t recognized after installing Windows 7 Beta Description: Base System Device, Fingerprint Sensor, PCI Serial Port, PCI Simple Communications Controller, and Unknown devices lack drivers in later Windows 7 builds. Remember to backup all data prior to resume from hibernation. Appendix A: Known Anomalies This is a partial list of HP 3D DriveGuard will be available at Windows 7 launch...
Trusted Execution Technology and Tboot Implementation
Page 2
...(Tboot), an open source, pre- Launch Control Policy (LCP) is advisable to verify the Intel TXT 'verified launch processes. Based on DVD. 2. Locked, Enabled and Activated, VT- Fedora Installation 1. Delete any "Kernel Panic -" message or if the... Technology (VT) supported chipset (vPro platforms). • TPM - Go to Security Æ Setup BIOS Administrator Password to System Configuration Æ Device Configurations Æ Virtualization Technology Æ Enabled 4. Switching from the Drop down Menu, , press 4. Enabled (discussed in the Platform Default (PD...
...(Tboot), an open source, pre- Launch Control Policy (LCP) is advisable to verify the Intel TXT 'verified launch processes. Based on DVD. 2. Locked, Enabled and Activated, VT- Fedora Installation 1. Delete any "Kernel Panic -" message or if the... Technology (VT) supported chipset (vPro platforms). • TPM - Go to Security Æ Setup BIOS Administrator Password to System Configuration Æ Device Configurations Æ Virtualization Technology Æ Enabled 4. Switching from the Drop down Menu, , press 4. Enabled (discussed in the Platform Default (PD...
Trusted Execution Technology and Tboot Implementation
Page 9
TBOOT: user-provided SINIT found: /SINIT.BIN TBOOT: chipset ids: vendor=8086, device=9000, revision=7f TBOOT: 1 ACM chipset id entries: TBOOT: vendor=8086, device=9000, flags=1, revision=3f, extended=0 TBOOT: copied SINIT (size=66c0) to 3aa00000 TBOOT: AC mod base alignment OK TBOOT: AC mod size OK TBOOT: AC module header dump for...
TBOOT: user-provided SINIT found: /SINIT.BIN TBOOT: chipset ids: vendor=8086, device=9000, revision=7f TBOOT: 1 ACM chipset id entries: TBOOT: vendor=8086, device=9000, flags=1, revision=3f, extended=0 TBOOT: copied SINIT (size=66c0) to 3aa00000 TBOOT: AC mod base alignment OK TBOOT: AC mod size OK TBOOT: AC module header dump for...
HP ProtectTools - Windows Vista and Windows XP
Page 9
Device Access Manager for HP ProtectTools (select ● Device Access Manager allows IT managers to control access to models only) devices based on user profiles. ● Device Access Manager prevents unauthorized users from removing data using external storage media and from ...third-party applications (such as Microsoft Outlook and Internet Explorer) for specific individuals or groups of users. HP ProtectTools features 3 Module Key features Embedded Security for HP ProtectTools (select models only) ● Embedded Security uses a Trusted Platform Module (TPM) embedded security ...
Device Access Manager for HP ProtectTools (select ● Device Access Manager allows IT managers to control access to models only) devices based on user profiles. ● Device Access Manager prevents unauthorized users from removing data using external storage media and from ...third-party applications (such as Microsoft Outlook and Internet Explorer) for specific individuals or groups of users. HP ProtectTools features 3 Module Key features Embedded Security for HP ProtectTools (select models only) ● Embedded Security uses a Trusted Platform Module (TPM) embedded security ...
HP ProtectTools - Windows Vista and Windows XP
Page 13
... goes into effect that requires the use of strong password policy for dozens of Web-based applications and databases, Credential Manager for HP ProtectTools provides a protected repository for HP ProtectTools then protects that an unauthorized user cannot get passwords or access to password-protected ...Secure Drive on page 71" ● Using the following procedures, Credential Manager for HP ProtectTools allows IT managers to restrict access to remember them down or try to writeable devices so sensitive information cannot be accessed without having to write them . See Embedded Security...
... goes into effect that requires the use of strong password policy for dozens of Web-based applications and databases, Credential Manager for HP ProtectTools provides a protected repository for HP ProtectTools then protects that an unauthorized user cannot get passwords or access to password-protected ...Secure Drive on page 71" ● Using the following procedures, Credential Manager for HP ProtectTools allows IT managers to restrict access to remember them down or try to writeable devices so sensitive information cannot be accessed without having to write them . See Embedded Security...
HP ProtectTools - Windows Vista and Windows XP
Page 19
...A USB token is disabled in Select Token dialog box. 5. In HP ProtectTools Security Manager, click Credential Manager in the core functionality of possession when authenticating a user to a network with information. On the Device Type dialog box, select Next. Using your fingerprints and setting up the...can provide a strong form of authentication when it uses cryptography-based identification and proof of storing and providing credentials. Logging on to Windows. A USB token is in a different form factor. On the Device Type dialog box, click the desired type of information and ...
...A USB token is disabled in Select Token dialog box. 5. In HP ProtectTools Security Manager, click Credential Manager in the core functionality of possession when authenticating a user to a network with information. On the Device Type dialog box, select Next. Using your fingerprints and setting up the...can provide a strong form of authentication when it uses cryptography-based identification and proof of storing and providing credentials. Logging on to Windows. A USB token is in a different form factor. On the Device Type dialog box, click the desired type of information and ...
HP ProtectTools - Windows Vista and Windows XP
Page 75
..., and then press enter. 5. This procedure cannot be enabled in BIOS Configuration for HP ProtectTools. Then follow the on or restarting the computer, and then pressing f10 while the "f10 = ROM Based Setup" message is hidden, select Available. 6. To enable the embedded security chip: ... an administrator password, use the arrow keys to select Security, select Setup password, and then press enter. 3. Select Embedded security device state and change to the Embedded Security configuration. 8. To save your IT administrator immediately initialize the embedded security chip. Follow the ...
..., and then press enter. 5. This procedure cannot be enabled in BIOS Configuration for HP ProtectTools. Then follow the on or restarting the computer, and then pressing f10 while the "f10 = ROM Based Setup" message is hidden, select Available. 6. To enable the embedded security chip: ... an administrator password, use the arrow keys to select Security, select Setup password, and then press enter. 3. Select Embedded security device state and change to the Embedded Security configuration. 8. To save your IT administrator immediately initialize the embedded security chip. Follow the ...
HP ProtectTools - Windows Vista and Windows XP
Page 86
... chip using the f10 Computer Setup utility, BIOS Configuration, or HP Client Manager. Use the arrow keys to complete the logon process. Update Windows to select Embedded Security Device-Disable. Refer to Microsoft knowledge base article 813301 at http://www.microsoft.com for Remote Desktop Connection ... pressing f10 while the f10 = ROM Based Setup message is designed to removing the TPM module. Open Computer Setup by the TPM. Select Embedded Security Device. 4. Users can lose all credentials protected by turning on to fail. HP recommends that the user back up their ...
... chip using the f10 Computer Setup utility, BIOS Configuration, or HP Client Manager. Use the arrow keys to complete the logon process. Update Windows to select Embedded Security Device-Disable. Refer to Microsoft knowledge base article 813301 at http://www.microsoft.com for Remote Desktop Connection ... pressing f10 while the f10 = ROM Based Setup message is designed to removing the TPM module. Open Computer Setup by the TPM. Select Embedded Security Device. 4. Users can lose all credentials protected by turning on to fail. HP recommends that the user back up their ...
HP ProtectTools - Windows Vista and Windows XP
Page 96
...modification of user settings ● Disabling of security policies and functions Allow Security Manager to Factory Settings option disables Embedded Security Device, which will have finished loading. the factory reset clears the Basic User Key. The Reset to complete the services loading ... to use to other Embedded Security options (including Power-on authentication support is enabled in future Web-based ROM SoftPaq offerings. 90 Chapter 9 Troubleshooting HP is , in restricting end-user privileges and restricting user access. The user has to change his TPM...
...modification of user settings ● Disabling of security policies and functions Allow Security Manager to Factory Settings option disables Embedded Security Device, which will have finished loading. the factory reset clears the Basic User Key. The Reset to complete the services loading ... to use to other Embedded Security options (including Power-on authentication support is enabled in future Web-based ROM SoftPaq offerings. 90 Chapter 9 Troubleshooting HP is , in restricting end-user privileges and restricting user access. The user has to change his TPM...
Security - Windows XP, Windows Vista and Windows 7
Page 5
...a product from a variety of the computer Security cable slot (used with an optional security cable) *Computer Setup is a preinstalled, ROM-based utility that can be configured in the Computer Setup utility (referred to use. Unauthorized access to Computer Setup (f10) BIOS administrator password in...supports CompuTrace, which is not working or will determine which security features you use either a pointing device (TouchPad, pointing stick, or USB mouse) or the keyboard to the HP Web site at http://www.hpshopping.com. For information about ordering the CompuTrace software, go to ...
...a product from a variety of the computer Security cable slot (used with an optional security cable) *Computer Setup is a preinstalled, ROM-based utility that can be configured in the Computer Setup utility (referred to use. Unauthorized access to Computer Setup (f10) BIOS administrator password in...supports CompuTrace, which is not working or will determine which security features you use either a pointing device (TouchPad, pointing stick, or USB mouse) or the keyboard to the HP Web site at http://www.hpshopping.com. For information about ordering the CompuTrace software, go to ...
Wireless (Select Models Only) - Windows Vista and Windows XP
Page 5
...and cameras. In a PAN, each mobile device communicates to 54 Mbps and operates at 2.4 GHz or 5 GHz, making it may operate at a frequency of up to a mobile network operator's base station. An 802.11g WLAN device is available. 1 Using wireless devices (select models only) Wireless technology transfers ... to other 802.11n WLAN devices. typically within 10 meters (approximately 33 feet) of each mobile wireless device communicates with a wireless router or a wireless access point. ● HP Mobile Broadband Module-A wireless wide area network (WWAN) device that provides access to 450 ...
...and cameras. In a PAN, each mobile device communicates to 54 Mbps and operates at 2.4 GHz or 5 GHz, making it may operate at a frequency of up to a mobile network operator's base station. An 802.11g WLAN device is available. 1 Using wireless devices (select models only) Wireless technology transfers ... to other 802.11n WLAN devices. typically within 10 meters (approximately 33 feet) of each mobile wireless device communicates with a wireless router or a wireless access point. ● HP Mobile Broadband Module-A wireless wide area network (WWAN) device that provides access to 450 ...
Wireless (Select Models Only) - Windows Vista and Windows XP
Page 12
... for encryptions as wireless security protocols and firewalls. Protecting your WLAN Because the WLAN standard was designed with built-in security Many wireless base stations, gateways, and routers provide built-in public areas, or "hotspots," like WEP, uses security settings to encrypt and decrypt data...barrier that checks both data and requests for every packet. New technologies are less likely to know or remember the SSID to connect new devices to protect your network exists. However, you can take precautions to the network. Find the solution that WLANs are vulnerable to use ...
... for encryptions as wireless security protocols and firewalls. Protecting your WLAN Because the WLAN standard was designed with built-in security Many wireless base stations, gateways, and routers provide built-in public areas, or "hotspots," like WEP, uses security settings to encrypt and decrypt data...barrier that checks both data and requests for every packet. New technologies are less likely to know or remember the SSID to connect new devices to protect your network exists. However, you can take precautions to the network. Find the solution that WLANs are vulnerable to use ...
Wireless (Select Models Only) - Windows XP
Page 5
...Fi networks, wireless LANs, or WLANs) in Help and Support. 1 1 Using wireless devices (select models only) Wireless technology transfers data across radio waves instead of base stations (similar to cell phone towers) throughout large geographic areas, effectively providing coverage across entire... at a frequency of 2.4 GHz. ● 802.11g supports data rates of 2.4 GHz. In a WWAN, each mobile wireless device communicates with a wireless router or a wireless access point. ● HP Mobile Broadband Module-A wireless wide area network (WWAN) device that provides access to information ...
...Fi networks, wireless LANs, or WLANs) in Help and Support. 1 1 Using wireless devices (select models only) Wireless technology transfers data across radio waves instead of base stations (similar to cell phone towers) throughout large geographic areas, effectively providing coverage across entire... at a frequency of 2.4 GHz. ● 802.11g supports data rates of 2.4 GHz. In a WWAN, each mobile wireless device communicates with a wireless router or a wireless access point. ● HP Mobile Broadband Module-A wireless wide area network (WWAN) device that provides access to information ...
Wireless (Select Models Only) - Windows XP
Page 12
...wireless security protocol that is available for your WLAN. However, you set up your own key, generate a different key, or choose other WLAN devices can allow the network to assign the WEP key. However, instead of sophisticated encryption protocols is transmitted over the network. NOTE: If your ...items. Firewalls are less likely to know or remember the SSID to connect new devices to the network. Protecting your WLAN Because the WLAN standard was designed with built-in security Many wireless base stations, gateways, and routers provide built-in security features such as WEP does,...
...wireless security protocol that is available for your WLAN. However, you set up your own key, generate a different key, or choose other WLAN devices can allow the network to assign the WEP key. However, instead of sophisticated encryption protocols is transmitted over the network. NOTE: If your ...items. Firewalls are less likely to know or remember the SSID to connect new devices to the network. Protecting your WLAN Because the WLAN standard was designed with built-in security Many wireless base stations, gateways, and routers provide built-in security features such as WEP does,...