EasyManua.ls Logo

Dell Alienware m18 R2 - Page 108

Dell Alienware m18 R2
125 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Table 37. System setup options—Security menu(continued)
Security
Start Data Wipe Data Wipe is a secure wipe operation that deletes information from a storage
device.
CAUTION: The secure Data Wipe operation deletes information in a way
that it cannot be reconstructed.
Commands such as delete and format in the operating system may remove files
from showing up in the file system. However, they can be reconstructed through
forensic means as they are still represented on the physical media. Data Wipe
prevents this reconstruction and is not recoverable.
When enabled, the data wipe option will prompt to wipe any storage devices that
are connected to the computer on the next boot.
By default, the Start Data Wipe option is disabled.
Absolute
Absolute Absolute Software provides various cyber security solutions, some requiring
software pre-loaded on Dell computers and integrated into the BIOS. To use
these features, you must enable the Absolute BIOS setting and contact Absolute
for configuration and activation.
By default, Enabled option is selected.
For additional security, Dell Technologies recommends keeping the Absolute
option enabled.
NOTE: When the Absolute features are activated, the Absolute integration
cannot be disabled from the BIOS setup screen.
UEFI Boot Path Security
UEFI Boot Path Security Enables or disables the computer to prompt the user to enter the Administrator
password (if set) when booting to a UEFI boot path device from the F12 boot
menu.
By default, Always Except Internal HDD option is selected.
Firmware Device Tamper Detection Allows you to control the firmware device tamper detection feature. This feature
notifies the user when the firmware device is tampered. When enabled, a screen
warning messages are displayed on the computer and a tamper detection event
is logged in the BIOS Events log. The computer fails to reboot until the event is
cleared.
Firmware Device Tamper Detection Enables or disables the Firmware Tamper Detection feature.
By default, Silent option is selected.
Clear Firmware Device Tamper Detection Enables the booting of the computer even after tamper detection.
By default, the Clear Firmware Device Tamper Detection option is disabled.
Table 38. System setup options—Passwords menu
Passwords
Admin Password
The Administrator Password prevents unauthorized access to the BIOS Setup
options. Once the administrator password is set, the BIOS setup options can only
be modified after providing the correct password.
The following rules and dependencies apply to the Administrator Password -
The administrator password cannot be set if computer and/or internal hard
drive passwords are previously set.
The administrator password can be used in place of the computer and/or
internal hard drive passwords.
When set, the administrator password must be provided during a firmware
update.
108

Table of Contents

Related product manuals