Securing Your Computer
77
8
Press <Esc>.
9
Press the left- and right-arrow keys to highlight
Save/Exit
, and then press
<Enter> to exit System Setup and restart your computer.
NOTE:
If prompted to
IGNORE
or
MODIFY
the changes to the TPM setting,
select
MODIFY
, and then press <Enter>.
10
Use the Embassy Security Center to manage the TPM security feature.
Security Management Software
Security management software is designed to utilize four different features to
help you secure your computer:
•
Log-in management
•
Pre-boot authentication (using a fingerprint reader, smart card, or
password)
•
Encryption
•
Private information management
For information about how to use the software and the different security
features, click
Start
→
All Programs
→
Security by Wave Systems
→
Getting
Started with EMBASSY® Trust Suite
.
Computer Tracking Software
Computer tracking software may enable you to locate your computer if it is
lost or stolen. The software is optional and may be purchased when you order
your Dell computer.
NOTE:
Computer tracking software may not be available in certain countries.
NOTE:
If you have computer tracking software and your computer is lost or stolen,
you must contact the company that provides the tracking service to report the
missing computer.
Summary of Contents for Precision NT499
Page 13: ...Contents 13 ...
Page 14: ...14 Contents ...
Page 38: ...38 About Your Computer ...
Page 42: ...42 Advanced Features ...
Page 70: ...70 Setting Up Your Computer ...
Page 98: ...98 Clearing Passwords and CMOS Settings ...
Page 112: ...112 Troubleshooting Tools ...
Page 130: ...130 Troubleshooting ...
Page 270: ...270 Getting Help ...
Page 290: ...290 Glossary ...