●
Use HP Password Manager to store all of your user names and passwords for all of your
websites and applications. You can securely read them in the future if they cannot be
remembered.
●
Do not store passwords in a file on the tablet.
The following tables list commonly used Windows and BIOS administrator passwords and describe
their functions.
Setting passwords in Windows
Password Function
Administrator password* Protects access to a Windows administrator-level account.
NOTE: Setting the Windows Administrator password does
not set the BIOS Administrator password.
User password* Protects access to a Windows user account.
*For information about setting a Windows administrator password or a Windows user password, access HP Support
Assistant. To access HP Support Assistant, on the Start screen, tap the HP Support Assistant app.
Setting passwords in HP BIOS Settings
Password Function
BIOS administrator password* Protects access to HP BIOS Settings.
*For details on setting passwords in HP BIOS Settings, see
BIOS Password on page 43.
Using antivirus software
When you use the tablet to access email, a network, or the Internet, you potentially expose it to
computer viruses. Computer viruses can disable the operating system, programs, or utilities, or cause
them to function abnormally.
Antivirus software can detect most viruses, destroy them, and, in most cases, repair any damage they
have caused. To provide ongoing protection against newly discovered viruses, antivirus software
must be kept up to date.
Windows Defender, which includes antivirus features, is preinstalled on your tablet. It is strongly
recommended that you continue to use an antivirus program in order to fully protect your tablet.
For more information about viruses, access HP Support Assistant. To access HP Support Assistant,
on the Start screen, tap the HP Support Assistant app.
Using firewall software
Firewalls are designed to prevent unauthorized access to a system or network. A firewall can be a
software program you install on your tablet and/or network, or it can be a solution made up of both
hardware and software.
34 Chapter 8 Security