Download Inhoudsopgave Inhoud Print deze pagina

Dell Inspiron 3030 Handleiding pagina 88

Verberg thumbnails Zie ook voor Inspiron 3030:
Inhoudsopgave

Advertenties

Table 31. System setup options—Security menu (continued)
Security
Start Data Wipe
Absolute
UEFI Boot Path Security
UEFI Boot Path Security
Firmware Device Tamper Detection
Table 32. System setup options—Passwords menu 
Passwords
Administrator Password
System Password
88
BIOS-instellingen
Data Wipe is a secure wipe operation that deletes information from a storage device.
CAUTION:
The secure Data Wipe operation deletes information in a way
that it cannot be reconstructed.
Commands such as delete and format in the operating system may remove files from
showing up in the file system. However, they can be reconstructed through forensic
means as they are still represented on the physical media. Data Wipe prevents this
reconstruction and is not recoverable.
When enabled, the data wipe option will prompt to wipe any storage devices that are
connected to the computer on the next boot.
By default, the Start Data Wipe option is disabled.
Absolute Software provides various cyber security solutions, some requiring software
preloaded on Dell computers and integrated into the BIOS. To use these features,
you must enable the Absolute BIOS setting and contact Absolute for configuration
and activation.
By default, the Absolute option is enabled.
For additional security, Dell Technologies recommends keeping the Absolute option
enabled.
NOTE:
When the Absolute features are activated, the Absolute integration
cannot be disabled from the BIOS setup screen.
Enables or disables the computer to prompt the user to enter the Administrator
password (if set) when booting to a UEFI boot path device from the F12 boot menu.
By default, the Always Except Internal HDD option is enabled.
Allows you to control the firmware device tamper detection feature. This feature
notifies the user when the firmware device is tampered. When enabled, a screen
warning messages are displayed on the computer and a tamper detection event is
logged in the BIOS Events log. The computer fails to reboot until the event is cleared.
By default, the Firmware Device Tamper Detection option is enabled.
For additional security, Dell Technologies recommends keeping the Firmware
Device Tamper Detection option enabled.
The Administrator Password prevents unauthorized access to the BIOS Setup options.
Once the administrator password is set, the BIOS setup options can only be modified
after providing the correct password.
The following rules and dependencies apply to the Administrator Password -
● The administrator password cannot be set if computer and/or internal hard drive
passwords are previously set.
● The administrator password can be used in place of the computer and/or internal
hard drive passwords.
● When set, the administrator password must be provided during a firmware update.
● Clearing the administrator password also clears the computer password (if set).
Dell Technologies recommends using an administrator password to prevent
unauthorized changes to BIOS setup options.
The System Password prevents the computer from booting to an operating system
without entering the correct password.
The following rules and dependencies apply when the System Password is used -

Advertenties

Inhoudsopgave
loading

Deze handleiding is ook geschikt voor:

D32mD32m004

Inhoudsopgave