User Manual Windows 8 User Manual Ver.1.1 (English)
Page 2
... Brightness Control 62 Wireless Network (Optional) 64 NFC (Near Field Communication) (Optional) 66 Using the Keyboard Dock (Optional) 72 Using the TPM Security Device (Optional) 81 Using the Multimedia App (Optional) Chapter 1 Getting Started 1 85 Using the S Note app (S Note, Optional... Chapter 4. Appendix 128 Important Safety Information 130 Replacement Parts and Accessories 132 Regulatory Compliance Statements 148 WEEE Symbol Information 149 Samsung Packaging Take-Back Program 150 TCO Certified 151 Product Specifications 153 Glossary 157 Index Getting Started 3 Before You Start 6 ...
... Brightness Control 62 Wireless Network (Optional) 64 NFC (Near Field Communication) (Optional) 66 Using the Keyboard Dock (Optional) 72 Using the TPM Security Device (Optional) 81 Using the Multimedia App (Optional) Chapter 1 Getting Started 1 85 Using the S Note app (S Note, Optional... Chapter 4. Appendix 128 Important Safety Information 130 Replacement Parts and Accessories 132 Regulatory Compliance Statements 148 WEEE Symbol Information 149 Samsung Packaging Take-Back Program 150 TCO Certified 151 Product Specifications 153 Glossary 157 Index Getting Started 3 Before You Start 6 ...
User Manual Windows 8 User Manual Ver.1.1 (English)
Page 44
... the Volume 59 LCD Brightness Control 61 Wireless Network (Optional) 62 NFC (Near Field Communication) (Optional) 64 Using the Keyboard Dock (Optional) 66 Using the TPM Security Device (Optional) 72 Using the Multimedia App (Optional) 81 Using the S Note app (S Note, Optional) 85 Sharing content using the AllShare Play app (Optional...
... the Volume 59 LCD Brightness Control 61 Wireless Network (Optional) 62 NFC (Near Field Communication) (Optional) 64 Using the Keyboard Dock (Optional) 66 Using the TPM Security Device (Optional) 72 Using the Multimedia App (Optional) 81 Using the S Note app (S Note, Optional) 85 Sharing content using the AllShare Play app (Optional...
User Manual Windows 8 User Manual Ver.1.1 (English)
Page 73
.... •• The program version described in this manual may differ from the actual product. Setting Up the TPM To use the TPM function. Using the computer 72 A TPM (Trusted Platform Module) security device is subject to complete the following steps. 1 Initializing the... TPM chip Initializes the authentication information saved on the computer. Using the TPM Security Device (Optional) Chapter 3. If you complete the steps above, you can use the TPM function, you have to change and the screenshots and terms...
.... •• The program version described in this manual may differ from the actual product. Setting Up the TPM To use the TPM function. Using the computer 72 A TPM (Trusted Platform Module) security device is subject to complete the following steps. 1 Initializing the... TPM chip Initializes the authentication information saved on the computer. Using the TPM Security Device (Optional) Chapter 3. If you complete the steps above, you can use the TPM function, you have to change and the screenshots and terms...
User Manual Windows 8 User Manual Ver.1.1 (English)
Page 74
... - Any decision to initialize must be able to Enabled. •• Initializing the TPM chip erases all authentication information saved on the TPM chip. Copy (C) 2012 American Megatrends, Inc. TPM Device TPM State Security Chip State Enabled Clear No Change Clear Enabled & Activate Deactivate & Disable Aptio...computer. Using the computer 73 Initializing the TPM chip When you use , you have to Clear. Otherwise, you will not be taken carefully. •• To initialize the TPM chip again while the TPM function is in use the TPM function for the first time or you...
... - Any decision to initialize must be able to Enabled. •• Initializing the TPM chip erases all authentication information saved on the TPM chip. Copy (C) 2012 American Megatrends, Inc. TPM Device TPM State Security Chip State Enabled Clear No Change Clear Enabled & Activate Deactivate & Disable Aptio...computer. Using the computer 73 Initializing the TPM chip When you use , you have to Clear. Otherwise, you will not be taken carefully. •• To initialize the TPM chip again while the TPM function is in use the TPM function for the first time or you...
User Manual Windows 8 User Manual Ver.1.1 (English)
Page 75
...to the Desktop screen, the SW Update program runs. Select TPM Host SW and click Install Now. 7 Select Save to save the changes. 검색 5 If the system automatically restarts and th공e유 Samsung logo screen appears, press the Home button several times. ...시작 6 Select Security > TPM Configuration and set the TPM Device item to Enabled. 장치 Set the TPM State to save the changes. 8 The computer automatically ...
...to the Desktop screen, the SW Update program runs. Select TPM Host SW and click Install Now. 7 Select Save to save the changes. 검색 5 If the system automatically restarts and th공e유 Samsung logo screen appears, press the Home button several times. ...시작 6 Select Security > TPM Configuration and set the TPM Device item to Enabled. 장치 Set the TPM State to save the changes. 8 The computer automatically ...
User Manual Windows 8 User Manual Ver.1.1 (English)
Page 76
... or copying them to the virtual drive. You can use files and folders to the instructions. 5 The user registration for the TPM program has been completed. The virtual drive is created in the following location. When the Initialization Wizard appears, click Next. 3 ...Platform Feature and set a basic user password. 4 Complete the registration according to be encrypted by using the encryption file system, and use the TPM security device more safely. Click All Apps > Infineon Security Platform Solution > Security Platform Management > User Settings. (Run as administrator) Alternatively, ...
... or copying them to the virtual drive. You can use files and folders to the instructions. 5 The user registration for the TPM program has been completed. The virtual drive is created in the following location. When the Initialization Wizard appears, click Next. 3 ...Platform Feature and set a basic user password. 4 Complete the registration according to be encrypted by using the encryption file system, and use the TPM security device more safely. Click All Apps > Infineon Security Platform Solution > Security Platform Management > User Settings. (Run as administrator) Alternatively, ...
User Manual Windows 8 User Manual Ver.1.1 (English)
Page 77
You can safely protect documents through the Encrypt File System (EFS). Using the computer 76 Using the TPM program For more information about using the TPM program, refer to the online help for the program. 2 If the Confirm Attribute Changes window appears, select the range to apply the encryption to be ... (or file) to and click OK. (This dialog box only appears when the folder is Windows 8/7/Vista, the user account control window appears. Using the TPM Security Device (Optional) Chapter 3.
You can safely protect documents through the Encrypt File System (EFS). Using the computer 76 Using the TPM program For more information about using the TPM program, refer to the online help for the program. 2 If the Confirm Attribute Changes window appears, select the range to apply the encryption to be ... (or file) to and click OK. (This dialog box only appears when the folder is Windows 8/7/Vista, the user account control window appears. Using the TPM Security Device (Optional) Chapter 3.
User Manual Windows 8 User Manual Ver.1.1 (English)
Page 78
Using the computer 77 3 In the user authentication window, enter the Basic user password you entered when registering the user and click OK. 3 The folder (file) opens. 4 You will be able to confirm that the color of the folder (file) name in the encrypted folder has been changed to green. Opening an encrypted folder (file) 1 Double-click an encrypted folder (file). 2 If the user authentication window appears, enter the basic user password you entered when registering the user and click OK. Using the TPM Security Device (Optional) Chapter 3.
Using the computer 77 3 In the user authentication window, enter the Basic user password you entered when registering the user and click OK. 3 The folder (file) opens. 4 You will be able to confirm that the color of the folder (file) name in the encrypted folder has been changed to green. Opening an encrypted folder (file) 1 Double-click an encrypted folder (file). 2 If the user authentication window appears, enter the basic user password you entered when registering the user and click OK. Using the TPM Security Device (Optional) Chapter 3.
User Manual Windows 8 User Manual Ver.1.1 (English)
Page 79
... (PSD) does not appear You can only use confidential data saved on another drive by copying the data to the virtual drive (PSD). Using the TPM Security Device (Optional) Chapter 3. Click All Apps > Infineon Security Platform Solution > Security Platform Management > User Settings > Security Platform Features. 2 When the Initialization Wizard appears, select...
... (PSD) does not appear You can only use confidential data saved on another drive by copying the data to the virtual drive (PSD). Using the TPM Security Device (Optional) Chapter 3. Click All Apps > Infineon Security Platform Solution > Security Platform Management > User Settings > Security Platform Features. 2 When the Initialization Wizard appears, select...
User Manual Windows 8 User Manual Ver.1.1 (English)
Page 80
... to the PSD, the original data files are not encrypted. Note that when you have to register again (to erase the authentication information on the TPM chip) To register a user again, you can confirm that the Personal Secure Drive has been created. When you have copied confidential data to the ...procedures below. 1 Right-click over the Security Platform icon in the Taskbar on the TPM chip. Using the computer 79 When the virtual drive (PSD) is not loaded, you click on Windows Explorer in the system tray of the ...
... to the PSD, the original data files are not encrypted. Note that when you have to register again (to erase the authentication information on the TPM chip) To register a user again, you can confirm that the Personal Secure Drive has been created. When you have copied confidential data to the ...procedures below. 1 Right-click over the Security Platform icon in the Taskbar on the TPM chip. Using the computer 79 When the virtual drive (PSD) is not loaded, you click on Windows Explorer in the system tray of the ...
User Manual Windows 8 User Manual Ver.1.1 (English)
Page 81
... click Uninstall. 2 If the message window appears, click Yes to permanently delete my Personal Secure Drive without saving an unencrypted copy of the TPM chip initialization process. Using the computer 80 Deleting the virtual drive If a virtual drive has been created, you have to delete the virtual ...drive before deleting the existing authentication information saved on the TPM chip. 1 Right-click over > and click Personal Secure Drive > Create/Manage. 2 Click Next. 3 Enter the password that you entered when ...
... click Uninstall. 2 If the message window appears, click Yes to permanently delete my Personal Secure Drive without saving an unencrypted copy of the TPM chip initialization process. Using the computer 80 Deleting the virtual drive If a virtual drive has been created, you have to delete the virtual ...drive before deleting the existing authentication information saved on the TPM chip. 1 Right-click over > and click Personal Secure Drive > Create/Manage. 2 Click Next. 3 Enter the password that you entered when ...
User Manual Windows 8 User Manual Ver.1.1 (English)
Page 104
... the service center. Supervisor Password User Password HDD Password Clear Clear Clear Set Supervisor Password > Set User Password > Set HDD Password > Power On Boot On TPM Configuration > Aptio Setup Utility - In this case, a service fee will need to enter the password when you can restrict system access to increase the security...
... the service center. Supervisor Password User Password HDD Password Clear Clear Clear Set Supervisor Password > Set User Password > Set HDD Password > Power On Boot On TPM Configuration > Aptio Setup Utility - In this case, a service fee will need to enter the password when you can restrict system access to increase the security...