Trusted Platform Module (Tpm); Enabling The Tpm Feature; Security Management Software - Dell precision M65 User Manual

Mobile workstation
Hide thumbs Also See for precision M65:
Table of Contents

Advertisement

FILE LOCATION: C:\Documents and Settings\reggie_davis\Desktop\Projects-07\BEN\Source\security.fm

Trusted Platform Module (TPM)

NOTE:
The TPM feature supports encryption only if the operating system supports TPM. For more information, see
the TPM software documentation and the help files that came with the software.
TPM is a hardware-based security feature that can be used to create and manage computer-generated
encryption keys. When combined with security software, the TPM enhances existing network and
computer security by enabling features such as file protection capabilities and protected e-mail. The
TPM feature is enabled through a system setup option.
NOTICE:
To secure your TPM data and encryption keys, follow the backup procedures documented in the Archive
and Restore section of the EMBASSY Security Center help file. In the event of these backups being incomplete,
lost, or damaged, Dell will be unable to assist in the recovery of encrypted data.

Enabling the TPM Feature

1 Enable the TPM software:
Restart the computer and press <F2> during the Power On Self Test to enter the system setup
a
program.
Select Security→ TPM Security and press <Enter>.
b
Under TPM Security, select On.
c
Press <Esc> to exit the setup program.
d
If prompted, click Save/Exit.
e
2 Activate the TPM setup program:
Restart the computer and press <F2> during the Power On Self Test to enter the system setup
a
program.
Select Security→ TPM Activation and press <Enter>.
b
Under TPM Activation, select Activate and press <Enter>.
c
NOTE:
You only need to activate TPM once.
Once the process is complete, the computer either restarts automatically or prompts you to restart
d
your computer.

Security Management Software

The security management software is designed to utilize four different features to help you secure your
computer:
Log-in management
Pre-boot authentication (using a fingerprint reader, smart card, or password)
Encryption
Private information management
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 1 / 2 5 / 0 7 – F O R P R O O F O N LY
Securing Your Computer
59

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the precision M65 and is the answer not in the manual?

Questions and answers

Table of Contents