![Ciara Astro PB60S User Manual Download Page 56](http://html1.mh-extra.com/html/ciara/astro-pb60s/astro-pb60s_user-manual_2606556056.webp)
CIARA Astro PB60S
- 56 -
4.10.3 Intel® Virtualisation Technology for Directed I/O (Intel® VT-d)
Intel
®
Virtualization Technology for Directed I/O (Intel VT-d) compliments Intel
®
VT by providing the ability to isolate and restrict
device accesses to the resources owned by the virtual partition managing the device.
NOTE
Requires an Intel processor that supports Intel VT.
4.10.4 Intel® Trusted Execution Technology (Intel® TXT)
Intel
®
Trusted Execution Technology (Intel
®
TXT) is a hardware security solution that protects systems against software-based attacks
by validating the behavior of key components at startup against a known good source. It requires that Intel VT be enabled and the
presence of a TPM.
NOTE
Intel
®
TXT requires the use of a processor with Intel TXT support. Additionally, third party software may also be required.
4.10.5 Intel® Identity Protection Technology
Intel
®
Identity Protection Technology (Intel
®
IPT) provides a simple way for websites and enterprises to validate that a user is logging
in from a trusted computer. This is accomplished by using the Intel
®
Manageability Engine embedded in the chipset to generate a
six-digit number that, when coupled with a user name and password, will generate a One-Time Password (OTP) when visiting Intel
IPT-enabled websites. Intel
®
IPT eliminates the need for the additional token or key fob required previously for two-factor
authentication.
4.10.6 Intel® Anti-Theft Technology
Intel
®
Anti-Theft (Intel
®
AT) provides local, tamper-resistant defense that works like a poison pill that disables the computer and
access to its data even if the operating system (OS) is reimaged, a new hard drive is installed, or the computer is disconnected from
the network.
NOTE
No computer system can provide absolute security under all conditions. Intel
®
AT requires the computer system to have an Intel
®
AT-
enabled chipset, BIOS, firmware release, software, and an Intel
®
AT-capable Service Provider/ISV application and service subscription.
The detection (triggers), response (actions), and recovery mechanisms only work after the Intel
®
AT functionality has been activated
and configured. Certain functionality may not be offered by some ISVs or service providers and may not be available in all countries.
Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof.
4.11 Trusted Platform Module (TPM)
The TPM module version 2.0 component is specifically designed to enhance platform security above-and-beyond the capabilities of
today’s software by providing a protected space for key operations and other security critical tasks. Using both hardware and
software, the TPM protects encryption and signature keys at their most vulnerable stages
—
operations when the keys are being used
unencrypted in plain-text form. The TPM shields unencrypted keys and platform authentication information from software-based
attacks.
NOTE
The Intel
®
TPM uses the onboard coin-cell battery (CR2032) to maintain its monotonic counters. One major function of the monotonic
counters is for anti-replay protection of the internal Intel
®
TPM data. If the battery is removed or exhausted, the Intel
®
TPM data will
be deleted in accordance with Trusted Computing Group guidelines. Please back-up TPM keys and data before removing the battery.
Summary of Contents for Astro PB60S
Page 1: ...Astro PB60S User Guide...
Page 67: ...CIARA Astro PB60S 67 NOTES...
Page 68: ...CIARA Astro PB60S 68...