Table 3-3Computer Setup—Security (continued)

System Security

Data Execution Prevention (enable/disable) - Helps prevent operating system security breaches.

(these options are

Default is enabled.

hardware dependent)

SVM CPU Virtualization (enable/disable). Controls the virtualization features of the processor.

 

 

Changing this setting requires turning the computer off and then back on. Default is disabled.

 

Virtualization Technology (VTx) (enable/disable) - Controls the virtualization features of the

 

processor. Changing this setting requires turning the computer off and then back on. Default is

 

disabled.

 

Virtualization Technology Directed I/O (VTd) (enable/disable) - Controls virtualization DMA

 

remapping features of the chipset. Changing this setting requires turning the computer off and then

 

back on. Default is disabled.

 

Trusted Execution Technology (enable/disable) - Controls the underlying processor and chipset

 

features needed to support a virtual appliance. Changing this setting requires turning the computer

 

off and then back on. Default is disabled. To enable this feature you must enable the following

 

features:

 

Embedded Security Device Support

 

Virtualization Technology

 

Virtualization Technology Directed I/O

 

Embedded Security Device (enable/disable) - Permits activation and deactivation of the Embedded

 

Security Device.

 

NOTE: To configure the Embedded Security Device, a Setup password must be set.

 

Reset to Factory Settings (Do not reset/Reset) - Resetting to factory defaults will erase all

 

 

security keys and leave the device in a disabled state. Changing this setting requires that you

 

 

restart the computer. Default is Do not reset.

 

 

CAUTION: The embedded security device is a critical component of many security schemes.

 

 

Erasing the security keys will prevent access to data protected by the Embedded Security

 

 

Device. Choosing Reset to Factory Settings may result in significant data loss.

 

Measure boot variables/devices to PCR1 - Typically, the computer measures the boot path and

 

 

saves collected metrics to PCR5 (a register in the Embedded Security Device). Bitlocker tracks

 

 

changes to any of these metrics, and forces the user to re-authenticate if it detects any

changes. Enabling this feature lets you set Bitlocker to ignore detected changes to boot path metrics, thereby avoiding re-authentication issues associated with USB keys inserted in a port. Default is enabled.

Computer Setup (F10) Utilities

21

Page 31
Image 31
HP 8300 manual System Security, Virtualization Technology Directed I/O

8300 specifications

The HP 8300 is a versatile and efficient desktop computer designed for business environments and power users. As part of the HP Elite series, the 8300 is tailored to deliver robust performance, security, and manageability.

One of the key features of the HP 8300 is its selection of Intel processors. Users can opt for third-generation Intel Core i3, i5, or i7 CPUs, providing a range of performance levels suitable for various workloads, from basic office tasks to more intensive applications. This adaptability makes the 8300 a suitable choice for organizations needing reliable computing power.

The system supports up to 32GB of DDR3 RAM, allowing for smooth multitasking and improved efficiency in handling resource-heavy applications. The flexibility in memory options ensures that businesses can configure the machine to meet their specific needs.

For storage, the HP 8300 offers various choices including traditional Hard Disk Drives (HDD) and Solid State Drives (SSD), significantly enhancing data access speeds and system responsiveness. With multiple configuration options, users can select from up to 1TB of storage capacity, providing ample room for files and applications.

Connectivity is also a strong point for the HP 8300. The desktop is equipped with multiple USB 3.0 ports, facilitating quick file transfers and easy peripheral connectivity. Additional ports, including USB 2.0, VGA, DP, and serial ports, ensure compatibility with a wide array of devices and legacy equipment.

Security technologies are integrated within the HP 8300 framework, including features like BIOS protection, HP Client Security, and optional fingerprint readers. These security measures help safeguard sensitive data and provide an additional layer of protection against unauthorized access.

The HP 8300 also supports various operating systems, including Windows 10 Pro, ensuring organizations can deploy the desktop within their existing IT ecosystem. Furthermore, the machine’s compatibility with HP tools for remote management enhances administrators' ability to oversee multiple devices efficiently.

In summary, the HP 8300 embodies a blend of powerful hardware, extensive configuration options, robust security features, and effective management capabilities, making it a compelling desktop solution for businesses aiming for productivity and reliability. With its comprehensive feature set, it stands out as an exceptional choice for both individual and organizational computing needs.