Security User Guide
© Copyright 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
Table of contents 1 Security features 2 Passwords Guidelines for setting passwords ......................................................................................................... 4 Computer Setup setup password ......................................................................................................... 5 Setting a setup password .................................................................................................... 5 Entering a setup password ............................
8 Security cable 9 Fingerprint reader (select models only) Using the fingerprint reader ................................................................................................................ 29 Registering fingerprints ...................................................................................................... 29 Step 1: Set up the fingerprint reader ................................................................. 30 Step 2: Use your registered fingerprint to log on to Windows .........
1 Security features NOTE Security solutions are designed to act as deterrents. These deterrents may not prevent a product from being mishandled or stolen. NOTE Your computer supports CompuTrace, which is an online security-based tracking and recovery service. If the computer is stolen, CompuTrace can track the computer if the unauthorized user accesses the Internet. You must purchase the software and subscribe to the service in order to use CompuTrace.
2 Chapter 1 Security features ENWW
2 Passwords Most security features use passwords. Whenever you set a password, write down the password and store it in a secure location away from the computer. Note the following password considerations: ● Setup, power-on, and DriveLock passwords are set in Computer Setup and are managed by the system BIOS.
Computer Setup passwords Function This password requires the optional embedded security chip to support this security feature. Windows passwords Function Administrator password* Protects access to Windows administrator-level computer contents. User password Protects access to a Windows user account. It also protects access to the computer contents and must be entered when you resume from standby or restore from hibernation.
Computer Setup setup password The Computer Setup setup password protects the configuration settings and system identification information in Computer Setup. After this password is set, it must be entered to access Computer Setup and to make changes using Computer Setup. The setup password ● Is not interchangeable with a Windows administrator password, although both passwords can be identical. ● Is not displayed as it is set, entered, changed, or deleted. ● Must be set and entered with the same keys.
Computer Setup power-on password The Computer Setup power-on password prevents unauthorized use of the computer. After this password is set, it must be entered each time the computer is turned on. A power-on password ● Is not displayed as it is set, entered, changed, or deleted. ● Must be set and entered with the same keys. For example, a power-on password set with keyboard number keys will not be recognized if you enter it thereafter with embedded numeric keypad number keys.
Entering a power-on password At the Power-on Password prompt, type your password (using the same kind of keys you used to set the password), and then press enter. After 3 unsuccessful attempts to enter the password, you must turn off the computer, turn it back on, and then try again.
Computer Setup DriveLock CAUTION To prevent the DriveLock-protected hard drive from becoming permanently unusable, record the DriveLock user password and the DriveLock master password in a safe place away from your computer. If you forget both DriveLock passwords, the hard drive will be permanently locked and can no longer be used. DriveLock protection prevents unauthorized access to the contents of a hard drive. DriveLock can be applied only to the internal hard drive(s) of the computer.
Setting a DriveLock password To access the DriveLock settings in Computer Setup: 1. Open Computer Setup by turning on or restarting the computer, and then pressing f10 while the “F10 = ROM Based Setup” message is displayed in the lower-left corner of the screen. 2. Use the arrow keys to select Security > DriveLock passwords, and then press enter. 3. Select the location of the hard drive for protection, and then press f10. 4.
Entering a DriveLock password Be sure that the hard drive is inserted into the computer (not into an optional docking device or external MultiBay). At the DriveLock HDD Bay Password prompt, type your user or master password (using the same kind of keys you used to set the password), and then press enter. After 2 incorrect attempts to enter the password, you must restart the computer and try again. Changing a DriveLock password To access the DriveLock settings in Computer Setup: 1.
3 Computer Setup security features Device security From the Boot options menu or the Port options menu in Computer Setup, you can disable or enable system devices. To disable or reenable the system devices in Computer Setup: 1. Open Computer Setup by turning on or restarting the computer, and then pressing f10 while the “F10 = ROM Based Setup” message is displayed in the lower-left corner of the screen. 2.
Setting stringent security To enable stringent security in Computer Setup: 1. Open Computer Setup by turning on or restarting the computer, and then pressing f10 while the “F10 = ROM Based Setup” message is displayed in the lower-left corner of the screen. 2. Use the arrow keys to select Security > Password options, and then press enter. 3. Use the arrow keys to select the Stringent security field. 4. Read the warning. To continue, press f10. 5.
Computer Setup System Information The System Information feature in Computer Setup provides 2 types of system information: ● Identification information about the computer model and the battery packs. ● Specification information about the processor, cache, memory, ROM, video revision, and keyboard controller revision. To view this general system information, use the arrow keys to select File > System Information.
Computer Setup System IDs The System IDs feature in Computer Setup allows you to display or enter the computer asset tag and ownership tag. NOTE To prevent unauthorized access to this information, you must create a setup password in Computer Setup. For additional information, refer to “Setting a setup password.” To manage this feature: 1.
4 Antivirus software When you use the computer for e-mail, network, or Internet access, you expose the computer to computer viruses. Computer viruses can disable the operating system, applications, or utilities, or cause them to function abnormally. Antivirus software can detect most viruses, destroy them, and in most cases, repair any damage they have caused. To provide ongoing protection against newly discovered viruses, antivirus software must updated.
16 Chapter 4 Antivirus software ENWW
5 Firewall software When you use the computer for e-mail, network, or Internet access, unauthorized persons may be able to gain access to information about you, the computer, and your information. Use the firewall software preinstalled on the computer to protect your privacy. Firewall features include logging, reporting, and automatic alarms to monitor all incoming and outgoing traffic. Refer to the firewall documentation or contact your firewall manufacturer for more information.
18 Chapter 5 Firewall software ENWW
6 Critical security updates (select models only) CAUTION To protect the computer from security breaches and computer viruses, install the online critical updates from Microsoft as soon as you receive an alert. A Critical Security Updates for Windows XP disc may have been included with your computer to provide additional updates delivered after the computer was configured. To update your system using the Critical Security Updates for Windows XP disc: 1. Insert the disc into the drive.
20 Chapter 6 Critical security updates (select models only) ENWW
7 ProtectTools Security Manager (select models only) Select computer models come with ProtectTools Security Manager preinstalled. This software can be accessed through the Microsoft Windows Control Panel. It provides security features that help protect against unauthorized access to the computer, networks, and critical data.
Embedded Security for ProtectTools NOTE You must have the optional trusted platform module (TPM) embedded security chip installed in your computer in order to use Embedded Security for ProtectTools. Embedded Security for ProtectTools has security features that protect against unauthorized access to user data or credentials, which include the following: ● Administrative functions, such as ownership and management of the owner pass phrase.
Credential Manager for ProtectTools Credential Manager for ProtectTools has security features that provide protection against unauthorized access to your computer, including the following: ● Alternatives to passwords when logging on to Microsoft Windows, such as using a smart card to log on to Windows. ● Single sign-on capability that automatically remembers credentials for Web sites, applications, and protected network resources.
BIOS Configuration for ProtectTools BIOS Configuration for ProtectTools provides access to BIOS (Computer Setup) security and configuration settings within the ProtectTools Security Manager application. This gives users better access to system security features that are managed by Computer Setup. With BIOS Configuration for ProtectTools, you can ● Manage power-on passwords and setup passwords.
Smart Card Security for ProtectTools Smart Card Security for ProtectTools manages the smart card setup and configuration for computers equipped with an optional smart card reader. NOTE Both smart cards and Java Cards use a smart card reader. With Smart Card Security for ProtectTools, you can ● Access smart card security features. Security enhancements are supported by the optional ProtectTools Smart Card and a smart card reader.
Java Card Security for ProtectTools Java™ Card Security for ProtectTools manages the Java Card setup and configuration for computers equipped with an optional smart card reader. NOTE Both Java Cards and smart cards use a smart card reader. With Java Card Security for ProtectTools, you can ● Access Java Card security features. Security enhancements are supported by the optional ProtectTools Java Card and a smart card reader.
8 Security cable NOTE The security cable is designed to act as a deterrent, but may not prevent the computer from being mishandled or stolen. To install a security cable: 1. Loop the security cable around a secured object. 2. Insert the key (1) into the cable lock (2). 3. Insert the cable lock into the security cable slot on the computer (3), and then lock the cable lock with the key. NOTE Your computer may look different from the illustration.
28 Chapter 8 Security cable ENWW
9 Fingerprint reader (select models only) Using the fingerprint reader NOTE The location of the fingerprint reader varies by model. Registering fingerprints A fingerprint reader allows you to log on to Windows using a fingerprint registered in ProtectTools Security Manager, instead of using a Windows password. Whether you are using an HP computer with an integrated fingerprint reader or an optional fingerprint reader, two steps are required for fingerprint logon to Windows: ENWW 1.
Step 1: Set up the fingerprint reader NOTE If you are using an optional fingerprint reader, connect the reader to the computer before performing the steps below. To set up the fingerprint reader: 1. In Windows, double-click the Credential Manager icon in the notification area of the taskbar. – or – Select Start > All Programs > ProtectTools Security Manager, and then click the Credential Manager tab, which is located on the left. 2.
9. After you have registered at least 2 fingers, click Finish, and then click OK. 10. To set up the fingerprint reader for a different Windows user, log on to Windows as that user and then repeat steps 1 through 9. Step 2: Use your registered fingerprint to log on to Windows To log on to Windows using your fingerprint: 1. Immediately after you have registered your fingerprints, restart Windows. 2. In the upper-left corner of the screen, click Log on to Credential Manager. 3.
32 Chapter 9 Fingerprint reader (select models only) ENWW
Index A administrator password antivirus software 15 4 B BIOS Configuration for ProtectTools 24 C cable security 27 Computer Setup device security 11 DriveLock password 8 power-on password 6 setup password 5 stringent security 11 Credential Manager for ProtectTools 23 critical updates, software 19 D device security 11 DriveLock password changing 10 description 8 entering 10 removing 10 setting 9 J Java Card Security for ProtectTools 26 P passwords administrator 4 DriveLock 8 guidelines 4 power-on 6 setu
34 Index ENWW