Nec Application And Driver Cd; Security Features; Password Security; Windows Network Security Features - NEC POWERMATE 2000 Service And Reference Manual

Pentium iii 600-mhz or higher processor -based series
Hide thumbs Also See for POWERMATE 2000:
Table of Contents

Advertisement

NEC Application and Driver CD

Use the NEC Application and Driver CD to install drivers for NEC system
options that are not part of the factory configuration. Also use the NEC
Application and Driver CD to reinstall NECC-supplied software. See "NEC
Application and Driver CD" in Section 2 for information about installing
software from the CD.

Security Features

The system has hardware, software, and mechanical security features that offer
protection against unauthorized access to the system and data. The following
security features are available.

Password Security

The BIOS Setup Utility includes a feature that allows a user to set a user or
supervisor password, or both.
The user password controls booting of the system and controls access to the
Setup Utility and the keyboard. User access to the BIOS Setup Utility is limited
when a supervisor password is set. The supervisor password allows full access
to the system and the BIOS.

Windows Network Security Features

The Windows Network Security feature is available through the Windows
operating system. See the Windows documentation for details.

Security Lock Slot

The security lock slot accepts a Kensington Security Standard connector or
other locking device to physically protect the system unit from intrusion.

Hard Drive Security

The system supports password protection for the hard drive. Hard drive
password protection restricts access to the drive if the drive is removed and
installed in another system. The system does not prompt for hard drive
passwords while the drive remains in the current system.
The passwords are written to the system BIOS and to the hard drive to ensure
that the password protection travels with the drive if it is moved to another
system. See Section 2, "System Configuration," for additional information on
using hard drive security.
1-12 System Overview

Advertisement

Table of Contents
loading

Table of Contents