Desktop Management Guide
Table Of Contents

24 www.hp.com Desktop Management Guide
Desktop Management Guide
Asset Tracking and Security
Asset tracking features incorporated into the computer provide key 
asset tracking data that can be managed using HP Systems Insight 
Manager, HP Client Manager or other system management 
applications. Seamless, automatic integration between asset tracking 
features and these products enables you to choose the management 
tool that is best suited to the environment and to leverage the 
investment in existing tools. 
HP also offers several solutions for controlling access to valuable 
components and information. HP Embedded Security for 
ProtectTools, if installed, p
revents unauthorized access to data and 
checks system integrity and authenticates third-party users attempting 
system access. (For more information, refer to the HP ProtectTools 
Security Manager Guide at 
www.hp.com.) Security features such as 
HP Embedded Security for ProtectTools, the Smart Cover Sensor and 
the Smart Cover Lock, available on some models, help to prevent 
unauthorized access to the internal components of the personal 
computer. By disabling parallel, serial, or USB ports, or by disabling 
removable media boot capability, you can protect valuable data assets. 
Memory Change and Smart Cover Sensor alerts can be automatically 
forwarded to system management applications to deliver proactive 
notification of tampering with a computer’s internal components.
✎
HP Embedded Security for ProtectTools, the Smart Cover Sensor, and 
the Smart Cover Lock are available as options on some systems.
Use the following utilities to manage security settings on the HP 
computer:
■ Locally, using the Computer Setup Utilities. See the Computer 
Setup (F10) Utility Guide on the Documentation and Diagnostics 
CD included with the computer for additional information and 
instructions on using the Computer Setup Utilities.
■ Remotely, using HP Client Manager Software or System 
Software Manager. This software enables the secure, consistent 
deployment and control of security settings from a simple 
command-line utility.










