Desktop Management

The password jumper is green so that it can be easily identified. For assistance locating the password jumper and other system board components, see the Illustrated Parts Map (IPM) for that particular system.

5.Remove the jumper from pins 1 and 2. Place the jumper on either pin 1 or 2, but not both, so that it does not get lost.

6.Replace the computer cover or access panel.

7.Reconnect the external equipment.

8.Plug in the computer and turn on power. Allow the operating system to start. This clears the current passwords and disables the password features.

9.To establish new passwords, repeat steps 1 through 4, replace the password jumper on pins 1 and 2, then repeat steps 6 through 8. Establish the new passwords in Computer Setup. Refer to the Computer Setup (F10) Utility Guide on the Documentation CD for Computer Setup instructions.

3.5.4DriveLock

DriveLock is an industry-standard security feature that prevents unauthorized access to the data on specific hard drives. DriveLock has been implemented as an extension to Computer Setup. It is only available on certain systems and only when DriveLock-capable hard drives are detected.

DriveLock is intended for HP customers for whom data security is the paramount concern. For such customers, the cost of the hard drive and the loss of the data stored on it is inconsequential when compared with the damage that could result from unauthorized access to its contents. In order to balance this level of security with the practical need to accommodate a forgotten password, the HP implementation of DriveLock employs a two-password security scheme. One password is intended to be set and used by a system administrator while the other is typically set and used by the end-user. There is no “back-door” that can be used to unlock the drive if both passwords are lost. Therefore, DriveLock is most safely used when the data contained on the hard drive is replicated on a corporate information system or is regularly backed up.

In the event that both DriveLock passwords are lost, the hard drive is rendered unusable. For users who do not fit the previously defined customer profile, this may be an unacceptable risk. For users who do fit the customer profile, it may be a tolerable risk given the nature of the data stored on the hard drive.

3–14

360201-002

Service Reference Guide, dc5000