Setting stringent security, Removing stringent security, Viewing computer setup system information – HP ProBook 5220m Notebook PC User Manual
Page 67: Using firewall software
Setting stringent security
To enable stringent security in Computer Setup, follow these steps:
1.
Open Computer Setup by turning on or restarting the computer, and then pressing
f10
while the
“F10 = ROM Based Setup” message is displayed in the lower-left corner of the screen.
2.
Use the arrow keys to select Security > Password options, and then press
enter
.
3.
Use the arrow keys to select Enable in the Stringent security field.
4.
Read the warning. To continue, press
f10
.
5.
To enable the feature each time the computer is turned on, press
f10
.
6.
To save your preferences, use the arrow keys to select File > Save changes and exit. Then follow
the instructions on the screen.
Your preferences go into effect when the computer restarts.
Removing stringent security
To remove stringent security in Computer Setup, follow these steps:
1.
Open Computer Setup by turning on or restarting the computer, and then pressing
f10
while the
“F10 = ROM Based Setup” message is displayed in the lower-left corner of the screen.
2.
Use the arrow keys to select Security > Password options and then press
enter
.
3.
Use the arrow keys to select Disable in the Stringent security field, and then press
f10
.
4.
To save your preferences, use the arrow keys to select File > Save changes and exit. Then follow
the instructions on the screen.
Your preferences go into effect when the computer restarts.
Viewing Computer Setup System Information
The System Information feature in Computer Setup provides 2 types of system information:
●
Identification information about the computer model.
●
Specification information for the processor, cache and memory size, and system ROM.
To view this general system information, follow these steps:
1.
Open Computer Setup by turning on or restarting the computer, and then pressing
f10
while the
“F10 = ROM Based Setup” message is displayed in the lower-left corner of the screen.
2.
Use the arrow keys to select File > System Information, and then press
enter
.
NOTE:
To prevent unauthorized access to this information, you must create a setup password in
Computer Setup.
Using firewall software
When you use the computer to access e-mail, a network, or the Internet, unauthorized persons may be
able to gain access to information about you, the computer, and your personal files. Use the firewall
software preinstalled on the computer to protect your privacy:
▲
Select Computer > Control Center > YaST > Security and Users > Firewall.
Using firewall software
59