66 Securing Your Computer
c
Under
TPM Activation
, select
Activate
and press <Enter>.
NOTE: You only need to activate the program once.
d
Once the process is complete, the computer either restarts automatically or prompts you to restart
your computer.
Security Management SoftwareThe security management software is designed to utilize four different features to help you secure your
computer:
• Log-in management
• Pre-boot authentication (using a fingerprint reader, smart card, or password)
•Encryption
• Private information management
Using the Security Management Software
For information about how to use the software and the different security features, see the Getting Started
Guide for the software:
Click Start
→
All Programs
→
Wave EMBASSY Trust Suite
→
Getting Started Guide
.
Computer Tracking SoftwareComputer t racking s oftware m ay enable you to loc ate your c omputer if it is lo st or stol en. The so ftware is
optional and may be purchased when you order your Dell™ computer, or you can contact your Dell sales
representative for information about this security feature.
NOTE: Computer tracking software may not be available in certain countries.
NOTE: If you have computer tracking software and your computer is lost or stolen, you must contact the company
that provides the tracking service to report the missing computer.
If Your Computer Is Lost or Stolen• Call a law enforcement agency to report the lost or stolen computer. Include the Service Tag in your
description of the computer. Ask that a case number be assigned and write down the number, along
with the name, address, and phone number of the law enforcement agency. If possible, obtain the
name of the investigating officer.
NOTE: If you know where the computer was lost or stolen, call a law enforcement agency in that area. If you do not
know, call a law enforcement agency where you live.
• If the computer belongs to a company, notify the security office of the company.