Trusted platform module (tpm), Security management software, Computer tracking software – Dell OptiPlex 755 User Manual

Page 6: Enabling the tpm feature

Advertising
background image

Antitheft devices usually include a segment of metal-stranded cable with an attached locking device and key. The documentation that comes with the
device contains instructions for installing it.

 

Trusted Platform Module (TPM)

TPM is a hardware-based security feature that can be used to create and manage computer-generated encryption keys. When combined with security
software, the TPM enhances existing network and computer security by enabling features such as file protection capabilities and protected e-mail. The TPM
feature is enabled through a system setup option.

 

Enabling the TPM Feature

 

1.

Enable the TPM software:

a.

 Restart the computer and press <F2> during the Power On Self Test to enter the system setup program. 

b.

 

Select Security® TPM Security and press <Enter>.

c.

 

Under TPM Security, select On.

d.

 

Press <Esc> to exit the setup program.

e.

 

If prompted, click Save/Exit.

 

2.

Activate the TPM setup program:

a.

 Restart the computer and press <F2> during the Power On Self Test to enter the system setup program. 

b.

 

Select Security® TPM Activation and press <Enter>.

c.

 

Under TPM Activation, select Activate and press <Enter>.

d.

 

Once the process is complete, the computer either restarts automatically or prompts you to restart your computer.

 

Security Management Software

The security management software is designed to utilize four different features to help you secure your computer:

l

 

Log-in management

l

 

Pre-boot authentication (using a fingerprint reader, smart card, or password)

l

 

Encryption

l

 

Private information management

For information about how to use the software and the different security features, see the Getting Started Guide for the software:

Click Start®

All Programs®

Wave Systems Corp®

Getting Started Guide

.

 

Computer Tracking Software

Computer tracking software may enable you to locate your computer if it is lost or stolen. The software is optional and may be purchased when you order your
Dell™ computer, or you can contact your Dell sales representative for information about this security feature.

NOTE:

On the ultra small form factor computer, the security cable slot is located on the back of the computer (see

Back View

).

NOTE:

Before you purchase an antitheft device, make sure that it works with the security cable slot on your computer.

NOTE:

Computers shipping into China are not equipped with TPM.

NOTE:

The TPM feature supports encryption only if the operating system supports TPM. For more information, see the TPM software documentation and

the help files that came with the software.

NOTICE:

To secure your TPM data and encryption keys, follow the backup procedures documented in the Archive and Restore section of the EMBASSY

Security Center help file. In the event of these backups being incomplete, lost, or damaged, Dell will be unable to assist in the recovery of encrypted
data.

NOTE:

You only need to activate TPM once.

NOTE:

Computer tracking software may not be available in certain countries.

NOTE:

If you have computer tracking software and your computer is lost or stolen, you must contact the company that provides the tracking service to

report the missing computer.

Advertising