Handleiding
Je bekijkt pagina 122 van 140

Table 12. BIOS Setup options—Security menu(continued)
Security Description
Dell Technologies recommends keeping the Disable USB4 PCIe Tunneling
option to disabled for full functionality.
For enhanced security, Dell Technologies recommends keeping the Disable
USB4 PCIe Tunneling option enabled.
Data Wipe on Next Boot
Start Data Wipe Data Wipe is a secure wipe operation that deletes information from a storage
device.
CAUTION: The secure Data Wipe operation deletes information in a
way that it cannot be reconstructed.
Commands such as delete and format in the operating system may remove files
from showing up in the file system. However, they can be reconstructed through
forensic means as they are still represented on the physical media. Data Wipe
prevents this reconstruction and the data can no longer be recovered.
When enabled, the data wipe option provides prompts to wipe any storage
devices that are connected to the computer on the next boot.
By default, the Start Data Wipe option is disabled.
Absolute Absolute Software provides various cyber security solutions, some requiring
software preloaded on Dell computers and integrated into the BIOS. To use these
features, you must enable the Absolute BIOS setting and contact Absolute for
configuration and activation.
By default, the Absolute option is enabled.
For additional security, Dell Technologies recommends keeping the Absolute
option enabled.
NOTE: When the Absolute features are activated, the Absolute integration
cannot be disabled from the BIOS setup screen.
UEFI Boot Path Security Enables or disables the computer to prompt the user to enter the Administrator
password (if set) when booting to a UEFI boot path device from the F12 boot
menu.
By default, the Always Except Internal HDD option is enabled.
Firmware Device Tamper Detection Allows you to control the firmware device tamper detection feature. This feature
notifies the user when the firmware device is tampered. When enabled, a screen
warning messages are displayed on the computer and a tamper detection event
is logged in the BIOS Events log. The computer fails to reboot until the event is
cleared.
By default, the Firmware Device Tamper Detection option is enabled.
For additional security, Dell Technologies recommends keeping the Firmware
Device Tamper Detection option enabled.
Table 13. BIOS Setup options—Passwords menu
Passwords
Administrator Password The Administrator Password prevents unauthorized access to the BIOS Setup
options. Once the administrator password is set, the BIOS setup options can only
be modified after providing the correct password.
The following rules and dependencies apply to the Administrator Password -
● The administrator password cannot be set if computer and/or internal storage
device passwords are already set.
● The administrator password can be used in place of the computer and/or
internal storage passwords.
122 BIOS Setup
Bekijk gratis de handleiding van Dell Pro 14 Essential PV14255, stel vragen en lees de antwoorden op veelvoorkomende problemen, of gebruik onze assistent om sneller informatie in de handleiding te vinden of uitleg te krijgen over specifieke functies.
Productinformatie
| Merk | Dell |
| Model | Pro 14 Essential PV14255 |
| Categorie | Laptop |
| Taal | Nederlands |
| Grootte | 64327 MB |







