HP dc7800 tower manual System Security some

Models: dc7800 tower

1 17
Download 17 pages 59.95 Kb
Page 13
Image 13

Table 4 Computer Setup—Security (continued)

 

is successfully entered, the hard drive will remain inaccessible until one of the passwords is

 

successfully provided during a subsequent cold-boot sequence.

 

NOTE: This selection will only appear when at least one drive that supports the DriveLock feature

 

is attached to the system.

 

See the Desktop Management Guide for more information.

 

 

System Security (some

Data Execution Prevention (some models) (enable/disable) Helps prevent operating system security

models: these options

breaches.

are hardware

Virtualization Technology (some models) (enable/disable) Controls the virtualization features of the

dependent)

 

processor. Changing this setting requires turning the computer off and then back on.

 

Virtualization Technology Directed I/O (some models) (enable/disable) Controls virtualization DMA

 

remapping features of the chipset. Changing this setting requires turning the computer off and then

 

back on.

 

Trusted Execution Technology (some models) (enable/disable) Controls the underlying processor

 

and chipset features needed to support a virtual appliance. Changing this setting requires turning

 

the computer off and then back on. To enable this feature you must enable the following features:

 

Embedded Security Device Support

 

Virtualization Technology

 

Virtualization Technology Directed I/O

 

Embedded Security Device Support (some models) (enable/disable) Permits activation and

 

deactivation of the Embedded Security Device. Changing this setting requires turning the computer

 

off and then back on.

 

NOTE: To configure the Embedded Security Device, a Setup password must be set.

 

Reset to Factory Settings (some models) (Do not reset/Reset) Resetting to factory defaults will

 

erase all security keys. Changing this setting requires turning the computer off and then back

 

on.

 

CAUTION: The embedded security device is a critical component of many security schemes.

 

Erasing the security keys will prevent access to data protected by the Embedded Security

 

Device. Choosing Reset to Factory Settings may result in significant data loss.

 

Power-on authentication support (some models) (enable/disable) Controls the power-on

 

password authentication scheme that utilizes the Embedded Security Device. Changing this

 

setting requires turning the computer off and then back on.

 

Reset authentication credentials (some models) (Do not reset/Reset) Selecting Reset disables

 

the power-on authentication support and clears the authentication information from the

 

Embedded Security Device. Changing this setting requires turning the computer off and then

 

back on

 

OS management of Embedded Security Device (some models) (enable/disable) This option allows

 

the user to limit operating system control of the Embedded Security Device. Changing this setting

 

requires turning the computer off and then back on. This option allows the user to limit OS control

 

of the Embedded Security Device.

 

Reset of Embedded Security Device through OS (some models) (enable/disable) This option

 

allows the user to limit the operating system ability to request a Reset to Factory Settings of

 

the Embedded Security Device. Changing this setting requires turning the computer off and

 

then back on.

 

NOTE: To enable this option, a Setup password must be set.

 

Virtual Appliance (enable/disable) Controls Verified Launch of a hypervisor.

 

NOTE: Virtual Appliance options are only available when Trusted Execution Technology is enabled

 

and VA 3.0 is installed.

 

 

ENWW

Computer Setup (F10) Utilities 7

Page 13
Image 13
HP dc7800 tower manual System Security some

dc7800 tower specifications

The HP dc7800 Tower is a powerful desktop computer designed for professional and enterprise environments. Known for its stability, performance, and versatility, this model has secured its place in a variety of business settings. Launched in the mid-2000s, it embodies HP’s commitment to quality and innovation.

One of the main features of the HP dc7800 is its form factor. The tower configuration allows for easy upgrades and maintenance, providing ample space for additional hard drives, memory, and other components. This level of accessibility makes it ideal for businesses that need to adapt their systems to changing requirements.

The dc7800 is powered by Intel's Core 2 Duo processors, offering dual-core technology that enhances multitasking capabilities. With clock speeds ranging from 1.8 GHz to 3.0 GHz, this system can handle demanding applications with relative ease. It also supports Intel's vPro technology, which allows for remote management and security features, making it an excellent choice for organizations prioritizing IT control.

Another notable characteristic is the support for up to 8GB of DDR2 RAM. This allows for efficient data processing and improved performance when running multiple applications simultaneously. Additionally, the dc7800 features multiple storage options, accommodating both SATA hard drives and solid-state drives, which can significantly enhance boot times and overall system responsiveness.

Connectivity options on the HP dc7800 are robust. It includes a variety of USB ports, audio jacks, and optional legacy ports, ensuring compatibility with a wide range of peripherals and accessories. Networking capabilities are also prominent, with built-in Gigabit Ethernet providing high-speed internet access.

Furthermore, the desktop tower is designed with energy efficiency in mind. It meets ENERGY STAR certification standards, which not only helps reduce operational costs but also minimizes environmental impact.

Overall, the HP dc7800 Tower embodies a blend of performance, expandability, and energy efficiency, making it a reliable choice for businesses in need of a robust desktop solution. With its legacy of dependability and its suite of modern technologies, it continues to serve as a valuable asset in enterprise environments.