HP (Hewlett-Packard) dc7600 Personal Computer User Manual


 
Service Reference Guide, dc7600 390742-001 3–17
Desktop Management
3.5.1 Password Security
The power-on password prevents unauthorized use of the computer by requiring entry of a
password to access applications or data each time the computer is turned on or restarted. The
setup password specifically prevents unauthorized access to Computer Setup, and can also be
used as an override to the power-on password. That is, when prompted for the power-on
password, entering the setup password instead will allow access to the computer.
A network-wide setup password can be established to enable the system administrator to log in to
all network systems to perform maintenance without having to know the power-on password,
even if one has been established.
3.5.2 Establishing a Setup Password Using Computer Setup
If the system is equipped with an embedded security device, refer to the HP ProtectTools
Security Manager Guide at
www.hp.com. Establishing a setup password through Computer Setup
prevents reconsideration of the computer (use of the Computer Setup (F10) utility) until the
password is entered.
1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart.
2. As soon as the computer is turned on, press and hold the F10 key until you enter Computer
Setup. Press
Enter to bypass the title screen, if necessary.
If you do not press the F10 key at the appropriate time, you must restart the computer and press
and hold the
F10 key again to access the utility.
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
Mechanical Security Features
Feature Purpose How It Is Established
Memory Change Alerts Detects when memory modules
have been added, moved, or
removed; notifies user and
system administrator.
For information on enabling
Memory Change Alerts, refer
to the online Desktop
Management Guide on the
Documentation and
Diagnostics CD.
Cable Lock Provision Inhibits access to the interior of
the computer to prevent
unwanted configuration
changes or component
removal. Can also be used to
secure the computer to a fixed
object to prevent theft.
Install a cable lock to secure
the computer to a fixed
object.
Security Loop Provision Inhibits access to the interior of
the computer to prevent
unwanted configuration
changes or component
removal.
Install a lock in the security
loop to prevent unwanted
configuration changes or
component removal.