Intel Boot Agent; Lanclient Control Manager (Lccm); System Migration Assistant; Desktop Management Interface - IBM INTELLISTATION E PRO 6204 User Manual

Hide thumbs Also See for INTELLISTATION E PRO 6204:
Table of Contents

Advertisement

management software, many functions, such as data transfers, software updates, and
POST or BIOS updates can be performed on many computers simultaneously.

Intel Boot Agent

The Intel Boot Agent is a software program that enables your computer to startup
using a program code image supplied by a remote server. The features of Intel Boot
Agent are as follows:
For information about configuring the Intel Boot Agent, see "Using the Intel Boot
Agent Utility program" on page 33.

LANClient Control Manager (LCCM)

LANClient Control Manager (LCCM) is a graphical, server-based program that
performs mass unattended installations of operating systems, software, device
drivers, and BIOS code updates to remote systems. Used with the Wake on LAN
feature, LCCM can remotely turn on your computer, so that the installation can be
done while the computer is not being used.
For more information or to download this software go to
http://www.ibm.com/pc/us/desktop/lccm on the World Wide Web.

System Migration Assistant

System Migration Assistant (SMA) helps administrators remotely transfer
configurations, profile settings, printer device drivers, and files from an IBM or non-
IBM PC to supported IBM systems.
For more information or to download this software go to
http://www.ibm.com/pc/us/software/sysmgmt/products/sma on the World Wide Web.

Desktop Management Interface

DMI is a method for gathering information about the hardware and software in your
computer. In a network environment, network administrators can use DMI to remotely
monitor and control your computer.

Using security features

To deter unauthorized use of your computer, you can use anti-intrusion features and
other security features that are provided with your computer.

Anti-intrusion features

IBM anti-intrusion features help protect against the theft of computer components,
such as the microprocessor, system memory modules, or disk drives.
A cover lock is built into your computer to prevent the cover from being removed. Two
identical keys for the cover lock are also supplied. A tag attached to the keys has the
key serial number and the address of the key manufacturer.
22
IBM® IntelliStation® E Pro: User's Guide
Compliant with the Wired for Management Baseline 2.0 (WfM 2.0)
Incorporates the software defined in the PXE Boot Agent specification
Includes support for Remote Program Load (RPL) runtime and loader software
(10/100 adapters only)
Compatible with legacy boot agent environments that use BOOTP protocol
Supported by remote installation programs such as LCCM and Microsoft RIS

Advertisement

Table of Contents
loading

Table of Contents