View system information

Set date and time

Exit F10 Setup with and without saving changes to settings

View system diagnostics

Security menu

The security menu provides access to security related options such as:

Power-on and DriveLock passwords

Integrated security device configuration

Disk Sanitizer2

Intel® Anti-Theft3

Asset tag configuration

System configuration menu

The system configuration menu provides access to:

Boot options

integrated device configuration

Port options

AMT options4 (on select models)

F10 Setup feature access options

Language support

HP F10 Setup for business notebooks has extensive language support. You can display the GUI in English, French, German, Spanish, Italian, Dutch, Danish, Japanese, Norwegian, Portuguese, Swedish, Finnish, Chinese Traditional, or Chinese Simplified. Switch languages by using the Language options on the System Configuration page.

F10 Setup options for HP business notebooks

Table 1 provides a detailed list of F10 Setup options for HP business notebooks.

Table 1: Key features for F10 Setup on select 2012 HP business notebook PCs

Feature

Function

Default Setting,

 

 

if applicable

 

 

 

 

File Menu

 

 

 

 

System Information

Provides key system information, such as serial number,

N/A

 

model number, CPU type, and memory configuration

 

 

 

 

Set System Date and Time

Configures the date and time

N/A

2For the use cases outlined in the Department of Defense 5220.22 M Supplement.

3Intel AT security requires a separately purchased Absolute Computrace service subscription and must be activated and configured. Check with Absolute for availability in your country. Windows® required. Intel and HP assume no liability for lost or stolen data and/or systems, or any other damages resulting therefrom. See http://www.absolute.com/en/partners/alliances/intel.

4Intel Active Management Technology requires an Intel AMT-enabled chipset, network hardware and software, connection to a power source, and a corporate network connection. Setup of this technology requires configuration by the purchaser. To enable certain functionality, setup may also require further integration into existing security frameworks or scripting using the management console. Implementation of new business processes may also require modification.

3