Antitheft devices usually include a segment of metal-stranded cable with an attached locking device and key. The documentation that comes with the
device contains instructions for installing it.
Trusted Platform Module (TPM)
TPM is a hardware-based security feature that can be used to create and manage computer-generated encryption keys. When combined with security
software, the TPM enhances existing network and computer security by enabling features such as file protection capabilities and protected e-mail. The TPM
feature is enabled through a system setup option.
Enabling the TPM Feature
1.
Enable the TPM software:
a.
Enter System Setup (see
Entering System Setup
).
b.
Select
Security
®
TPM Security
and press <Enter>.
c.
Under
TPM Security
, select
On
.
d.
Save and exit the system setup program.
2.
Activate the TPM setup program:
a.
Enter System Setup (see
Entering System Setup
).
b.
Select
Security
®
TPM Activation
and press <Enter>.
c.
Under
TPM Activation
, select
Activate
and press <Enter>.
d.
Once the process is complete, the computer either restarts automatically or prompts you to restart your computer.
Security Management Software
The security management software is designed to utilize four different features to help you secure your computer:
l
Log-in management
l
Pre-boot authentication (using a fingerprint reader, smart card, or password)
l
Encryption
l
Private information management
For information about how to use the software and the different security features, see
Getting Started Guide
for the software:
Click
Start
®
All Programs
®
Wave Systems Corp
®
Getting Started Guide
.
NOTE:
On the ultra small form factor computer, the security cable slot is located on the back of the computer (see the
Setup and Quick Reference
Guide
that ships with your computer for more information).
NOTE:
Before you purchase an antitheft device, make sure that it works with the security cable slot on your computer.
NOTE:
Computers shipping into China are not equipped with TPM.
NOTE:
The TPM feature supports encryption only if the operating system supports TPM. For more information, see the TPM software documentation and
the help files that came with the software.
CAUTION:
To secure your TPM data and encryption keys, follow the backup procedures documented in the
Archive and Restore
section of the
EMBASSY Security Center help file. In the event of these backups being incomplete, lost, or damaged, Dell will be unable to assist in the recovery
of encrypted data.
NOTE:
You only need to activate TPM once.
Summary of Contents for OptiPlex 760
Page 29: ......
Page 48: ......
Page 101: ......
Page 106: ...Back to Contents Page 1 release knob ...
Page 140: ...5 Replace the computer cover 6 Turn on power to the computer Back to Contents Page ...
Page 143: ...Back to Contents Page 19 fan connector FAN_CPU ...
Page 146: ...Desktop System Board Screws Small Form Factor System Board Screws 1 screws 9 1 screws 9 ...
Page 148: ...Back to Contents Page ...
Page 157: ...Mini Tower Desktop Small Form Factor Ultra Small Form Factor ...
Page 194: ...7 Replace the cable cover if used Back to Contents Page ...
Page 196: ...Back to Contents Page ...
Page 199: ...5 Replace the computer cover 6 Turn on power to the computer Back to Contents Page ...