Home > Dell > Notebook > Dell D630 Manual

Dell D630 Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Dell D630 Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 327 Dell manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							Securing Your Computer91
    If you do not enter the correct password in three attempts, the computer tries to 
    start from another bootable device if the 
    Boot First Device option in system 
    setup is set to allow start-up from another device. If the 
    Boot First Device 
    option is not set to allow the computer to start from another device, the 
    computer returns to the operating state it was in when you turned it on.
    If the hard drive password, the external hard-drive password, and the primary 
    password are the same, the computer prompts you only for the primary 
    password. If the hard drive password is different from the primary password, the 
    computer prompts you for both. Two different passwords provide greater 
    security.
     NOTE: The administrator password provides access to the computer, but it does 
    not provide access to the hard drive when a hard drive password is assigned. 
    Trusted Platform Module (TPM)
     NOTE: Computers shipping into China are not equipped with the TPM feature. 
     
    NOTE: The TPM feature may not be supported in all countries. 
     
    NOTE: The TPM feature supports encryption only if the operating system supports 
    TPM. For more information, see the TPM software documentation and the help files 
    that came with the software.
    TPM is a hardware-based security feature that can be used to create and manage 
    computer-generated encryption keys. When combined with security software, 
    the TPM enhances existing network and computer security by enabling features 
    such as file protection capabilities and protected e-mail. The TPM feature is 
    enabled through a system setup option.
     NOTICE: To secure your TPM data and encryption keys, follow the backup 
    procedures documented in the Broadcom Secure Foundation Getting Started 
    Guide. In the event of these backups being incomplete, lost, or damaged, Dell will 
    be unable to assist in the recovery of encrypted data.
    Enabling the TPM Feature
    1Enable the TPM software:
    aRestart the computer and press  during the Power On Self Test 
    to enter the system setup program.
    bSelect Security→ TPM Security and press . 
    						
    							92Securing Your Computer
    cUnder TPM Security, select On.
    dPress  to exit the setup program. 
    eIf prompted, click Save/Exit.
    2Activate the TPM setup program: 
    aRestart the computer and press  during the Power On Self Test 
    to enter the system setup program.
    bSelect Security→ TPM Activation and press .
    cUnder TPM Activation, select Activate and press .
     NOTE: You only need to activate the program once.
    d
    Once the process is complete, the computer either restarts 
    automatically or prompts you to restart your computer.
    Security Management Software
    The security management software is designed to utilize four different features 
    to help you secure your computer:
    • Log-in management
    • Pre-boot authentication (using a fingerprint reader, smart card, or 
    password)
    •Encryption
    • Private information management
    Activating the Security Management Software
     NOTE: You must first enable the TPM in order for the security management 
    software to have full functionality.
    1Enable the TPM feature (see Enabling the TPM Feature on page 91).
    2Load the security management software:
    aTurn on (or restart) your computer.
    bWhen the DELL™ logo appears, press  immediately. If you wait 
    too long and the Windows logo appears, continue to wait until you see 
    the Windows desktop. Then shut down your computer and try again. 
    						
    							Securing Your Computer93
    cIn the drop-down menu, select Wave EMBASSY Trust Suite and press 
     to create the icons for the software components on the 
    computer desktop.
    dPress  to exit the setup program. 
    eIf prompted, click Save/Exit.
    Using the Security Management Software
    For information about how to use the software and the different security 
    features, see the 
    Getting Started Guide for the software: 
    Click 
    Start→ All Programs→ Wave EMBASSY Trust Suite→ Getting Started 
    Guide
    .
    Computer Tracking Software
    Computer tracking software may enable you to locate your computer if it is lost 
    or stolen. The software is optional and may be purchased when you order your 
    Dell™ computer, or you can contact your Dell sales representative for 
    information about this security feature.
     NOTE: Computer tracking software may not be available in certain countries.
     
    NOTE: If you have computer tracking software and your computer is lost or stolen, 
    you must contact the company that provides the tracking service to report the 
    missing computer.
    If Your Computer Is Lost or Stolen
    • Call a law enforcement agency to report the lost or stolen computer. 
    Include the Service Tag in your description of the computer. Ask that a 
    case number be assigned and write down the number, along with the 
    name, address, and phone number of the law enforcement agency. If 
    possible, obtain the name of the investigating officer.
     NOTE: If you know where the computer was lost or stolen, call a law enforcement 
    agency in that area. If you do not know, call a law enforcement agency where you 
    live.
    • If the computer belongs to a company, notify the security office of the 
    company. 
    						
    							94Securing Your Computer
    • Contact Dell customer service to report the missing computer. Provide the 
    computer Service Tag, the case number, and the name, address, and phone 
    number of the law enforcement agency to which you reported the missing 
    computer. If possible, give the name of the investigating officer.
    The Dell customer service representative will log your report under the 
    computer Service Tag and record the computer as missing or stolen. If someone 
    calls Dell for technical assistance and gives your Service Tag, the computer is 
    identified automatically as missing or stolen. The representative will attempt to 
    get the phone number and address of the caller. Dell will then contact the law 
    enforcement agency to which you reported of the missing computer. 
    						
    							95
    11
    Cleaning Your Computer
     CAUTION: Before you begin any of the procedures in this section, follow the 
    safety instructions in the 
    Product Information Guide.
    Computer, Keyboard, and Display
     CAUTION: Before you clean your computer, disconnect the computer from the 
    electrical outlet and remove any installed batteries. Clean your computer with a 
    soft cloth dampened with water. Do not use liquid or aerosol cleaners, which may 
    contain flammable substances.
    • Use a can of compressed air to remove dust from between the keys on the 
    keyboard.
     NOTICE: To avoid damaging the computer or display, do not spray cleaning solution 
    directly onto the display. Only use products specifically designed for cleaning 
    displays, and follow the instructions that are included with the product.
    • Moisten a soft, lint-free cloth with either water or a display cleaner, and 
    wipe the display until it is clean.
     NOTICE: To prevent damage to the antiglare coating, do not wipe the display with 
    soap or alcohol.
    • Moisten a soft, lint-free cloth with water and wipe the computer and 
    keyboard. Do not allow water from the cloth to seep between the touch 
    pad and the surrounding palm rest.
    • To clean your monitor screen, lightly dampen a soft, clean cloth with water. 
    You can also use a special screen-cleaning tissue or solution suitable for the 
    monitor’s antistatic coating.
    • Wipe the keyboard, computer, and monitor plastics with a soft cleaning 
    cloth moistened with a solution of three parts water and one part 
    dishwashing detergent.
    Do not soak the cloth or let water drip inside your computer or keyboard. 
    						
    							96
    Touch Pad
    1Shut down and turn off your computer.
    2Disconnect any attached devices from the computer and from their 
    electrical outlets.
    3Remove any installed batteries (see Replacing the Battery on page 47).
    4Moisten a soft, lint-free cloth with water, and wipe it gently across the 
    surface of the touch pad. Do not allow water from the cloth to seep 
    between the touch pad and the surrounding palm rest.
    Mouse
     NOTICE: Disconnect the mouse from the computer before cleaning the mouse
    If your screen cursor skips or moves abnormally, clean the mouse. 
    Cleaning a Non-Optical Mouse
    1Clean the outside casing of the mouse with a cloth moistened with a mild 
    cleaning solution.
     
    2Turn the retainer ring on the underside of your mouse counterclockwise, 
    and then remove the ball.
    3Wipe the ball with a clean, lint-free cloth.
    4Blow carefully into the ball cage or use a can of compressed air to dislodge 
    dust and lint.
    5If the rollers inside the ball cage are dirty, clean the rollers with a cotton 
    swab moistened lightly with isopropyl alcohol.
    6Recenter the rollers in their channels if they are misaligned. Ensure that 
    fluff from the swab is not left on the rollers.
    7Replace the ball and retainer ring, and turn the retainer ring clockwise 
    until it clicks into place.
    Cleaning an Optical Mouse
    Clean the outside casing of the mouse with a cloth moistened with a mild 
    cleaning solution.
      
    						
    							97
    Floppy Drive
     NOTICE: Do not attempt to clean drive heads with a swab. You might accidentally 
    misalign the heads which prevents the drive from operating.
    Clean your floppy drive using a commercially available cleaning kit. These kits 
    contain pretreated floppy disks to remove contaminants that accumulate during 
    normal operation.
    CDs and DVDs
     NOTICE: Always use compressed air to clean the lens in the CD/DVD drive, and 
    follow the instructions that come with the compressed-air product. Never touch the 
    lens in the drive.
    If you notice problems, such as skipping, with the playback quality of your CDs 
    or DVDs, try cleaning the discs.
    1Hold the disc by its outer edge. You can also touch the inside edge of the 
    center hole.
     NOTICE: To avoid damaging the surface, do not wipe in a circular motion around 
    the disc.
    2With a soft, lint-free cloth, gently wipe the bottom of the disc (the 
    unlabeled side) in a straight line from the center to the outer edge of the 
    disc.
    For stubborn dirt, try using water or a diluted solution of water and mild 
    soap. You can also purchase commercial products that clean discs and 
    provide some protection from dust, fingerprints, and scratches. Cleaning 
    products for CDs are also safe to use on DVDs. 
    						
    							Troubleshooting99
    12
    Troubleshooting
    Diagnostic Lights
     CAUTION: Before you begin any of the procedures in this section, follow the 
    safety instructions that shipped with your computer.
    Your computer has three keyboard status lights located above the keyboard. 
    During normal operation, the keyboard status lights display the current status 
    (
    on or off) of the Num Lock, Caps Lock, and Scroll Lock features. If the 
    computer starts without error, the lights flash, and then turn off. If the 
    computer malfunctions, however, you can use the status of the lights to help 
    identify the problem.
     NOTE: After the computer completes POST, the Num Lock light may remain on, 
    depending on your BIOS settings. For more information on using the system setup 
    program, see System Setup Program on page 135.
    Diagnostic Light Codes During POST
    To troubleshoot a problem with your computer, read the sequence of the 
    keyboard status lights in order from left to right (Num Lock, Caps Lock, and 
    then Scroll Lock). If the computer malfunctions the individual lights display a 
    status of either 
    On , Off , or Flashing . 
    						
    							100Troubleshooting
    Light Pattern Problem Description Suggested Resolution
    No memory modules 
    are detected.
    • If two or more memory modules are 
    installed, remove the modules, then 
    reinstall one module and restart the 
    computer. If the computer starts 
    normally, continue to install 
    additional memory modules (one at a 
    time) until you have identified a 
    faulty module or reinstalled all 
    modules without error (see Memory 
    on page 157).
    • If available, install working memory of 
    the same type into your computer (see 
    Memory on page 157).
    • If the problem persists, contact Dell 
    Support.
    Memory modules are 
    detected, but a 
    memory failure has 
    occurred.• If two or more memory modules are 
    installed, remove the modules, then 
    reinstall one module and restart the 
    computer. If the computer starts 
    normally, continue to install 
    additional memory modules (one at a 
    time) until you have identified a 
    faulty module or reinstalled all 
    modules without error (see Memory 
    on page 157).
    • If available, install working memory of 
    the same type into your computer (see 
    Memory on page 157).
    • If the problem persists, contact Dell 
    Support.
    System board failure 
    has occurred.Contact Dell Support.
    A possible processor 
    failure has occurred.
    • Reseat the processor (see Memory 
    on page 157).
    • If the problem persists, contact Dell 
    Support. 
    						
    All Dell manuals Comments (0)

    Related Manuals for Dell D630 Manual