Dell Latitude D530: Securing Your Computer

Securing Your Computer: Dell Latitude D530

10

Securing Your Computer

Security Cable Lock

NOTE: Your computer does not ship with a security cable lock.

A security cable lock is a commercially available antitheft device. To use the

lock, attach it to the security cable slot on your Dell™ computer. For more

information, see the instructions included with the device.

NOTICE: Before you buy an antitheft device, ensure that it will work with the

security cable slot on your computer.

Passwords

About Passwords

NOTE: Passwords are disabled when you receive your computer.

A primary (or system) password, an administrator password, and a hard drive

password all prevent unauthorized access to your computer in different ways.

The following table identifies types and features of passwords available on

your computer.

Securing Your Computer 93

Type of Password Features

Primary (or system)

Protects the computer from unauthorized access

Administrator

Gives system administrators or service technicians

access to computers for repair or reconfiguration

Allows you to restrict access to system setup in the same

way a primary password restricts access to the computer

Can be used instead of the primary password

Hard drive

Helps protect the data on your hard drive or external

hard drive (if one is being used) from unauthorized

access

NOTICE: Passwords provide a high level of security for data in your computer or

hard drive. However, they are not foolproof. If you require more security, obtain and

use additional forms of protection, such as smart cards, data encryption programs,

or PC Cards with encryption features.

NOTE: Some hard drives do not support hard drive passwords.

When using passwords, observe the following guidelines:

Choose passwords that you can remember, but not ones that are easy to

guess. For example, do not use the names of family members or pets for

passwords.

It is recommended that you do not write down passwords. If you do write it

down, however, ensure that the password is stored in a secure place.

Do not share passwords with other people.

Ensure that people are not watching you when you type your password(s).

If you forget any of your passwords, contact Dell (see "Contacting Dell" on

page 149). For your protection, Dell technical support staff will ask you for

proof of your identity to ensure that only an authorized person can use the

computer.

Using a Primary (or System) Password

The primary password allows you to protect the computer from unauthorized

access.

When you first start your computer, you must assign a primary password at

the prompt.

94 Securing Your Computer

If you do not enter a password within 2 minutes, the computer returns to its

previous operating state.

NOTICE: If you disable the administrator password, the primary password is also

disabled.

To add or change passwords, access User Accounts from the Control Panel.

If you have assigned an administrator password, you can use it instead of the

primary password. The computer does not specifically prompt you for the

administrator password.

Using an Administrator Password

The administrator password is designed to give system administrators or

service technicians access to computers for repair or reconfiguration. The

administrators or technicians can assign identical administrator passwords to

groups of computers, allowing you to assign a unique primary password.

To set or change administrator passwords, access User Accounts from the

Control Panel.

When you set an administrator password, the Configure Setup option

becomes available in system setup. The Configure Setup option allows you to

restrict access to system setup in the same way that a primary password

restricts access to the computer.

The administrator password can be used instead of the primary password.

Whenever you are prompted to enter the primary password, you can enter the

administrator password.

NOTICE: If you disable the administrator password, the primary password is also

disabled.

NOTE: The administrator password provides access to the computer, but it does

not provide access to the hard drive when a hard drive password is assigned.

If you forget the primary password and do not have an administrator password

assigned, or if you have both a primary and an administrator password

assigned but forget them both, contact your system administrator or contact

Dell (see "Contacting Dell" on page 149).

Securing Your Computer 95

Using a Hard Drive Password

The hard drive password helps protect the data on your hard drive from

unauthorized access. You can also assign a password for an external hard drive

(if one is being used) that can be the same as or different from the password

for the primary hard drive.

To assign or change a hard drive password, enter system setup (see "System

Setup Program" on page 123).

After assigning a hard drive password, you must enter it each time you turn on

the computer and each time you restore the computer to normal operation

from standby mode.

If the hard drive password is enabled, you must enter it each time you turn on

the computer: A message appears asking for the hard drive password.

To continue, enter your password (with no more than eight characters) and

press <Enter>.

If you do not enter a password within 2 minutes, the computer returns to its

previous operating state.

If you enter the wrong password, a message tells you that the password is

invalid. Press <Enter> to try again.

If you do not enter the correct password in three attempts, the computer tries

to start from another bootable device if the Boot First Device option in

system setup is set to allow start-up from another device. If the Boot First

Device option is not set to allow the computer to start from another device,

the computer returns to the operating state it was in when you turned it on.

If the hard drive password, the external hard-drive password, and the primary

password are the same, the computer prompts you only for the primary

password. If the hard drive password is different from the primary password,

the computer prompts you for both. Two different passwords provide greater

security.

NOTE: The administrator password provides access to the computer, but it does

not provide access to the hard drive when a hard drive password is assigned.

Trusted Platform Module (TPM)

NOTE: Computers shipping into China and Russia are not equipped with the TPM

feature.

96 Securing Your Computer

NOTE: The TPM feature supports encryption only if the operating system supports

TPM. For more information, see the TPM software documentation and the help files

that came with the software.

TPM is a hardware-based security feature that can be used to create and

manage computer-generated encryption keys. When combined with security

software, the TPM enhances existing network and computer security by

enabling features such as file protection capabilities and protected e-mail.

The TPM feature is enabled through a system setup option.

NOTICE: To secure your TPM data and encryption keys, follow the backup

procedures documented in the Broadcom Secure Foundation Getting Started

Guide. In the event of these backups being incomplete, lost, or damaged, Dell will

be unable to assist in the recovery of encrypted data.

Enabling the TPM Feature

1

Enable the TPM software:

a

Restart the computer and press <F2> during the Power On Self Test

to enter the system setup program.

b

Select

Security

TPM Security

and press <Enter>.

c

Under

TPM Security

, select

On

.

d

Press <Esc> to exit the setup program.

e

If prompted, click

Save/Exit

.

2

Activate the TPM setup program:

a

Restart the computer and press <F2> during the Power On Self Test

to enter the system setup program.

b

Select

Security

TPM Activation

and press <Enter>.

c

Under

TPM Activation

, select

Activate

and press <Enter>.

NOTE: You only need to activate the program once.

d

Once the process is complete, the computer either restarts

automatically or prompts you to restart your computer.

Security Management Software

The security management software is designed to utilize four different

features to help you secure your computer:

Securing Your Computer 97

Log-in management

Pre-boot authentication (using a fingerprint reader, smart card, or

password)

•Encryption

Private information management

Activating the Security Management Software

NOTE: You must first enable the TPM in order for the security management

software to have full functionality.

1

Enable the TPM feature (see "Enabling the TPM Feature" on page 97).

2

Load the security management software:

a

Turn on (or restart) your computer.

b

When the DELL™ logo appears, press <F2> immediately. If you wait

too long and the Windows logo appears, continue to wait until you see

the Windows desktop. Then shut down your computer and try again.

c

In the drop-down menu, select

Wave EMBASSY Trust Suite

and press

<Enter> to create the icons for the software components on the

computer desktop.

d

Press <Esc> to exit the setup program.

e

If prompted, click

Save/Exit

.

Using the Security Management Software

For information about how to use the software and the different security

features, see the Getting Started Guide for the software:

Click Start

All Programs

Wave EMBASSY Trust Suite

Getting Started

Guide

.

Computer Tracking Software

Computer tracking software may enable you to locate your computer if it is

lost or stolen. The software is optional and may be purchased when you order

your Dell™ computer, or you can contact your Dell sales representative for

information about this security feature.

NOTE: Computer tracking software may not be available in certain countries.

98 Securing Your Computer

NOTE: If you have computer tracking software and your computer is lost or stolen,

you must contact the company that provides the tracking service to report the

missing computer.

If Your Computer Is Lost or Stolen

Call a law enforcement agency to report the lost or stolen computer.

Include the Service Tag in your description of the computer. Ask that a

case number be assigned and write down the number, along with the

name, address, and phone number of the law enforcement agency. If

possible, obtain the name of the investigating officer.

NOTE: If you know where the computer was lost or stolen, call a law enforcement

agency in that area. If you do not know, call a law enforcement agency where you

live.

If the computer belongs to a company, notify the security office of the

company.

Contact Dell customer service to report the missing computer. Provide the

computer Service Tag, the case number, and the name, address, and phone

number of the law enforcement agency to which you reported the missing

computer. If possible, give the name of the investigating officer.

The Dell customer service representative will log your report under the

computer Service Tag and record the computer as missing or stolen. If

someone calls Dell for technical assistance and gives your Service Tag, the

computer is identified automatically as missing or stolen. The representative

will attempt to get the phone number and address of the caller. Dell will then

contact the law enforcement agency to which you reported the missing

computer.

Securing Your Computer 99

100 Securing Your Computer