Service Reference Guide, d300, dx6050
319865-008
3–11
Desktop Management
3.5.1 Password Security
The power-on password prevents unauthorized use of the computer by requiring entry of a
password to access applications or data each time the computer is turned on or restarted. The
setup password specifically prevents unauthorized access to Computer Setup, and can also be
used as an override to the power-on password. That is, when prompted for the power-on
password, entering the setup password instead will allow access to the computer.
A network-wide setup password can be established to enable the system administrator to log in to
all network systems to perform maintenance without having to know the power-on password,
even if one has been established.
3.5.2 Establishing a Setup Password Using Computer Setup
Establishing a setup password through Computer Setup prevents reconfiguration of the computer
(use of the Computer Setup (F10) utility) until the password is entered.
1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart.
2. As soon as the computer is turned on, press and hold the
F10
key until you enter Computer
Setup. Press
Enter
to bypass the title screen, if necessary.
✎
If you do not press the
F10
key at the appropriate time, you must restart the computer and press
and hold the
F10
key again to access the utility.
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
3. Select Security, then select Setup Password and follow the instructions on the screen.
4. Before exiting, click File > Save Changes and Exit.
Cable Lock Provision
Inhibits access to the interior of
the computer to prevent
unwanted configuration
changes or component
removal. Can also be used to
secure the computer to a fixed
object to prevent theft.
Install a cable lock to secure
the computer to a fixed
object.
Security Loop Provision
Inhibits access to the interior of
the computer to prevent
unwanted configuration
changes or component
removal.
Install a lock in the security
loop to prevent unwanted
configuration changes or
component removal.
Security Features Overview
(Continued)
Feature
Purpose
How It Is Established
✎
For more information about Computer Setup, see the
Computer Setup (F10) Utility Guide
.
Support for security features may vary depending on your specific computer configuration.
Содержание Compaq d300 Series
Страница 2: ......
Страница 10: ...viii 319865 008 Service Reference Guide d300 dx6050 Contents ...
Страница 32: ...2 20 319865 007 Service Reference Guide d300 Setup Utilities and Diagnostics Features ...
Страница 64: ...4 12 319865 008 Service Reference Guide d300 dx6050 Serial and Parallel ATA Drive Guidelines and Features ...
Страница 178: ...8 36 319865 008 Service Reference Guide d300 dx6050 Removal and Replacement Procedures Desktop DT Chassis ...
Страница 196: ...C 8 319865 008 Service Reference Guide d300 dx6050 POST Error Messages ...
Страница 222: ...D 26 319865 008 Service Reference Guide d300 dx6050 Troubleshooting Without Diagnostics ...
Страница 226: ...E 4 319865 008 Service Reference Guide d300 dx6050 Memory ...
Страница 230: ...F 4 319865 008 Service Reference Guide d300 dx6050 System Board and Riser Board Reference Designators ...
Страница 238: ...Index 8 319865 008 Service Reference Guide d300 dx6050 Index ...