Table 6-3
Computer Setup—Security (continued)
System Security
(these
options are hardware
dependent)
Data Execution Prevention (enable/disable) - Helps prevent operating system security breaches. Default
is enabled.
SVM CPU Virtualization (enable/disable). Controls the virtualization features of the processor. Changing
this setting requires turning the computer off and then back on. Default is disabled.
Embedded Security Device (enable/disable) - Permits activation and deactivation of the Embedded
Security Device.
NOTE:
To configure the Embedded Security Device, a Setup password must be set.
●
Reset to Factory Settings (Do not reset/Reset) - Resetting to factory defaults will erase all security
keys and leave the device in a disabled state. Changing this setting requires that you restart the
computer. Default is Do not reset.
CAUTION:
The embedded security device is a critical component of many security schemes.
Erasing the security keys will prevent access to data protected by the Embedded Security Device.
Choosing Reset to Factory Settings may result in significant data loss.
●
Measure boot variables/devices to PCR1 - Typically, the computer measures the boot path and
saves collected metrics to PCR5 (a register in the Embedded Security Device). Bitlocker tracks
changes to any of these metrics, and forces the user to re-authenticate if it detects any changes.
Enabling this feature lets you set Bitlocker to ignore detected changes to boot path metrics, thereby
avoiding re-authentication issues associated with USB keys inserted in a port. Default is enabled.
OS management of Embedded Security Device (enable/disable) - This option allows the user to limit OS
control of the Embedded Security Device. Default is enabled. This option is automatically disabled if
Trusted Execution Technology is enabled.
●
Reset of Embedded Security Device through OS (enable/disable) - This option allows the user to
limit the operating system ability to request a Reset to Factory Settings of the Embedded Security
Device. Default is disabled.
NOTE:
To enable this option, a Setup password must be set.
●
No PPI provisioning (Windows 8 only) - This option lets you set Windows 8 to bypass the PPI
(Physical Presence Interface) requirement and directly enable and take ownership of the TPM on
first boot. You cannot change this setting after TPM is owned/initialized, unless the TPM is reset.
Default is disabled for non-Windows 8 systems, and enabled for Windows 8.
●
Allow PPI policy to be changed by OS. Enabling this option allows the operating system to execute
TPM operations without Physical Presence Interface. Default is disabled.
NOTE:
To enable this option, a Setup password must be set.
●
Button Retask Password Protection (enable/disable) - Controls whether the Setup password must
be provided to WMI methods used to retask the function of the side panel buttons.
100 Chapter 6 Computer Setup (F10) Utility
ENWW
Summary of Contents for EliteOne 705 G1
Page 1: ...Maintenance Service Guide HP EliteOne 705 G1 23 inch Non Touch All in One Business PC ...
Page 4: ...iv About This Book ENWW ...
Page 10: ...x ENWW ...
Page 22: ...12 Chapter 2 Activating and Customizing the Software ENWW ...
Page 23: ...3 Illustrated parts catalog System parts ENWW System parts 13 ...
Page 178: ...168 Chapter 10 POST error messages ENWW ...
Page 190: ...180 Appendix C Specifications ENWW ...
Page 194: ...WLAN module illustrated 17 removing 49 184 Index ENWW ...