Securing Your Computer 778 Press .9 Press the left- and right-arrow keys to highlight Save/Exit, and then press to exit System Setup and restart your computer.NOTE: If prompted to IGNORE or MODIFY the changes to the TPM setting,select MODIFY, and then press .10 Use the Embassy Security Center to manage the TPM security feature.Security Management SoftwareSecurity management software is designed to utilize four different features tohelp you secure your computer:• Log-in management• Pre-boot authentication (using a fingerprint reader, smart card, orpassword)• Encryption• Private information managementFor information about how to use the software and the different securityfeatures, click Start→ All Programs→ Security by Wave Systems→ GettingStarted with EMBASSY® Trust Suite.Computer Tracking SoftwareComputer tracking software may enable you to locate your computer if it islost or stolen. The software is optional and may be purchased when you orderyour Dell computer.NOTE: Computer tracking software may not be available in certain countries.NOTE: If you have computer tracking software and your computer is lost or stolen,you must contact the company that provides the tracking service to report themissing computer.