HP ThinPro 7.0 - Administrator Guide
Registry key Description
root/screensaver/off
Sets the timeout delay in minutes before the monitor turns o.
root/screensaver/origImageCopyPath
This is the path where the custom image is saved when mode is
set to Default.
root/screensaver/solidColor
If useSolidColor is on and enableCustomLogo is o, this
solid color is used for the screen saver.
root/screensaver/standby
Sets the timeout delay in minutes before the monitor goes into
standby mode.
root/screensaver/suspend
Sets the timeout delay in minutes before the monitor goes into
suspend mode.
root/screensaver/timeoutScreensaver
Sets the timeout delay in minutes before the screen saver starts.
root/screensaver/timeoutSleep
Sets the timeout delay in minutes before the thin client goes into
the Sleep state.
root/screensaver/useSolidColor
If set to 1 and enableCustomLogo is o, the value of the
solidColor key is used by the screen saver.
security
Registry key Description
root/security/SecurityFeaturs/
SpeculativeStoreBypassControl
Controls whether mitigations for Speculative Store Bypass
(CVE-2018-3639) are enabled. By default, these mitigations are
not enabled. To enable them, set the key value to on.
For any change to this key to take eect, reboot the computer.
root/security/authenticationFailDelay
Sets the approximate time, in milliseconds, to delay after a failed
login attempt. The actual time will vary plus or minus 25% of this
value. For example, use a value of 3000 to obtain a delay of
approximately 3 seconds.
root/security/domainEntryMode
If set to 1, the domain is expected to be entered in a separate text
eld labeled Domain. if set to 0, the domain is expected to be
entered as part of the User eld.
root/security/enableLockOverride
If set to 1, administrators can override the screen lock of a local
desktop.
root/security/enableSecretPeek
If set to 1, password and PIN dialogs will have a button that, while
selected, will show the entered password/PIN in clear text.
root/security/encryption/identity/
encryptedSecretCipher
Sets the algorithm for symmetric encryption of a secret. All
algorithms use an appropriate amount of random salt, which is
regenerated each time the secret is stored. The encryption key is
dierent on each thin client, and encryption and decryption are
available only to authorized programs. The supported cipher list
includes most OpenSSL ciphers and ChaCha20–Poly1305.
root/security/encryption/identity/
encryptedSecretTTL
Sets the number of seconds since the last successful login that a
stored encrypted secret will be considered valid. If set to a
negative number, encrypted secrets will not time out.
root/security/encryption/identity/
encryptedSecretTTLnonSSO
Species the number of seconds that a stored, non-SSO encrypted
secret is considered valid. If set to a nonpositive number,
encrypted secrets do not time out.
160 Appendix D Registry keys