HP ThinPro 7.0 - Administrator Guide

Registry key Description
root/screensaver/off
Sets the timeout delay in minutes before the monitor turns o.
root/screensaver/origImageCopyPath
This is the path where the custom image is saved when mode is
set to Default.
root/screensaver/solidColor
If useSolidColor is on and enableCustomLogo is o, this
solid color is used for the screen saver.
root/screensaver/standby
Sets the timeout delay in minutes before the monitor goes into
standby mode.
root/screensaver/suspend
Sets the timeout delay in minutes before the monitor goes into
suspend mode.
root/screensaver/timeoutScreensaver
Sets the timeout delay in minutes before the screen saver starts.
root/screensaver/timeoutSleep
Sets the timeout delay in minutes before the thin client goes into
the Sleep state.
root/screensaver/useSolidColor
If set to 1 and enableCustomLogo is o, the value of the
solidColor key is used by the screen saver.
security
Registry key Description
root/security/SecurityFeaturs/
SpeculativeStoreBypassControl
Controls whether mitigations for Speculative Store Bypass
(CVE-2018-3639) are enabled. By default, these mitigations are
not enabled. To enable them, set the key value to on.
For any change to this key to take eect, reboot the computer.
root/security/authenticationFailDelay
Sets the approximate time, in milliseconds, to delay after a failed
login attempt. The actual time will vary plus or minus 25% of this
value. For example, use a value of 3000 to obtain a delay of
approximately 3 seconds.
root/security/domainEntryMode
If set to 1, the domain is expected to be entered in a separate text
eld labeled Domain. if set to 0, the domain is expected to be
entered as part of the User eld.
root/security/enableLockOverride
If set to 1, administrators can override the screen lock of a local
desktop.
root/security/enableSecretPeek
If set to 1, password and PIN dialogs will have a button that, while
selected, will show the entered password/PIN in clear text.
root/security/encryption/identity/
encryptedSecretCipher
Sets the algorithm for symmetric encryption of a secret. All
algorithms use an appropriate amount of random salt, which is
regenerated each time the secret is stored. The encryption key is
dierent on each thin client, and encryption and decryption are
available only to authorized programs. The supported cipher list
includes most OpenSSL ciphers and ChaCha20–Poly1305.
root/security/encryption/identity/
encryptedSecretTTL
Sets the number of seconds since the last successful login that a
stored encrypted secret will be considered valid. If set to a
negative number, encrypted secrets will not time out.
root/security/encryption/identity/
encryptedSecretTTLnonSSO
Species the number of seconds that a stored, non-SSO encrypted
secret is considered valid. If set to a nonpositive number,
encrypted secrets do not time out.
160 Appendix D Registry keys