<Security Settings>

You can configure settings related to system modification.
<Verify System at Startup>
<Set>  <Management Settings>  <Security Settings>  <System Verification Settings>
You can set the machine to verify the integrity of the firmware and applications installed in the machine during startup.
<Trellix Embedded Control>
<Set>  <Management Settings>  <Security Settings>  <System Verification Settings>
When the machine is operating, the <Trellix Embedded Control> function is used to prevent unauthorized program modification and the execution of unauthorized programs, for improved system reliability.
<Recommended Security Set. for Usage Env.>
<Set>  <Management Settings>  <Security Settings>
You can specify all the recommended security settings for your usage environment simply by selecting the machine's environment type. You can also display the recommended environment type for the network environment you are using and display a protective notification when the environment changes. See "Security Settings Navigator" for the available environment types. Security Settings Navigator
A3Y5-09C