Use HP Password Manager to store all of your user names and passwords for all of your websites and applications. You can securely read them in the future if they cannot be remembered.

Do not store passwords in a file on the tablet.

The following tables list commonly used Windows and BIOS administrator passwords and describe their functions.

Setting passwords in Windows

Password

Function

 

 

Administrator password*

Protects access to a Windows administrator-level account.

 

NOTE: Setting the Windows Administrator password does

 

not set the BIOS Administrator password.

 

 

User password*

Protects access to a Windows user account.

*For information about setting a Windows administrator password or a Windows user password, access HP Support Assistant. To access HP Support Assistant, on the Start screen, tap the HP Support Assistant app.

Setting passwords in Computer Setup

Password

Function

 

 

BIOS administrator password

Protects access to Computer Setup.

 

 

 

 

Using antivirus software

When you use the tablet to access email, a network, or the Internet, you potentially expose it to computer viruses. Computer viruses can disable the operating system, programs, or utilities, or cause them to function abnormally.

Antivirus software can detect most viruses, destroy them, and, in most cases, repair any damage they have caused. To provide ongoing protection against newly discovered viruses, antivirus software must be kept up to date.

Windows Defender, which includes antivirus features, is preinstalled on your tablet. It is strongly recommended that you continue to use an antivirus program in order to fully protect your tablet.

For more information about viruses, access HP Support Assistant. To access HP Support Assistant, on the Start screen, tap the HP Support Assistant app.

Using firewall software

Firewalls are designed to prevent unauthorized access to a system or network. A firewall can be a software program you install on your tablet and/or network, or it can be a solution made up of both hardware and software.

34 Chapter 8 Security