66 Securing Your Computer
c
Under
TPM Activation
, select
Activate
and press <Enter>.
NOTE: You only need to activate the program once.
d
Once the process is complete, the computer either restarts automatically or prompts you to restart
your computer.
Security Management Software
The security management software is designed to utilize four different features to help you secure your
computer:
Log-in management
Pre-boot authentication (using a fingerprint reader, smart card, or password)
•Encryption
Private information management

Using the Security Management Software

For information about how to use the software and the different security features, see the Getting Started
Guide for the software:
Click Start
All Programs
Wave EMBASSY Trust Suite
Getting Started Guide
.
Computer Tracking Software
Computer t racking s oftware m ay enable you to loc ate your c omputer if it is lo st or stol en. The so ftware is
optional and may be purchased when you order your Dell™ computer, or you can contact your Dell sales
representative for information about this security feature.
NOTE: Computer tracking software may not be available in certain countries.
NOTE: If you have computer tracking software and your computer is lost or stolen, you must contact the company
that provides the tracking service to report the missing computer.
If Your Computer Is Lost or Stolen
Call a law enforcement agency to report the lost or stolen computer. Include the Service Tag in your
description of the computer. Ask that a case number be assigned and write down the number, along
with the name, address, and phone number of the law enforcement agency. If possible, obtain the
name of the investigating officer.
NOTE: If you know where the computer was lost or stolen, call a law enforcement agency in that area. If you do not
know, call a law enforcement agency where you live.
If the computer belongs to a company, notify the security office of the company.