Bios Security Features; Security Cable - NEC Generation N3000 M760s User Manual

Table of Contents

Advertisement

Security Features and Passwords
Taking Care of Your Computer
The system has software and mechanical security features that offer protection against unauthorised
access to your system and data.

BIOS Security Features

Refer to
"Setup Utility"
Security Features in the Windows
For more information on how to set user accounts and passwords refer to:
"Tips for Using Microsoft

Security Cable

Your computer features a security cable slot. This lock prevents your computer from being moved or
stolen.
To locate this slot, see
Note:
Your computer does not ship with a security cable lock.
Install an optional security cable as follows:
1.
Select the object in the room to which you will secure your computer. Choose an immovable piece of
furniture or fixture (a table or desk leg with a cross bar).
2.
Take the looped end of the steel cable (optional) and wrap around an immovable object. Choose an
object that prevents an intruder from slipping the cable out from under the object.
3.
Feed the locking device through the looped end of the cable.
4.
To install the security cable, make sure that the lock is in the unlocked position. To do so, insert the
key into the lock and, holding the locking device stable, turn the key clockwise to the unlocked
position.
5.
Insert the locking device into the security cable slot in your computer. Turn the key 90° counter-
clockwise to lock and remove the key. Check that the security cable is secure by gently pulling on the
locking device.
TPM or Trusted Platform Module
The Trusted Platform Module (TPM) is a component on the motherboard that is specifically designed to
enhance platform security above-and-beyond the capabilities of today's software by providing a protected
space for some security critical tasks. Using both software and hardware, the TPM protects encryption and
signature keys at their most vulnerable stages/operations when the keys are being used in unencrypted
forms. The TPM is specifically designed to shield unencrypted keys as well as platform and user
authentication information from software-based attacks.
For more information refer to
Password Procedures
A good password should consist of:
© 2007-2009, NEC Computers S.A.S. All rights reserved.
for more information on how to set Supervisor and User passwords.
®
®
Windows Vista
"
"Around the Right Side of the System""Around the Left Side of the
"Installing Infineon TPM Professional
Taking Care of Your Computer
Operating Systems
®
Package".
System".
94

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents