Using Security Features; Anti-Intrusion Features - IBM IntelliStation M Pro Type 6868 User Manual

Professional workstation
Table of Contents

Advertisement

Using security features

To deter unauthorized use of your computer, you can use anti-intrusion
features and other security features that are provided with your computer.

Anti-intrusion features

IBM anti-intrusion features help protect against the theft of computer
components, such as the microprocessor, system memory modules, or
drives.
A cover lock is built into the chassis of your computer to prevent the cover
from being removed. Two identical keys for the cover lock are also
supplied. A tag attached to the keys has the key serial number and the
address of the key manufacturer.
Important
Record the "key code" number along with the manufacturer address and
phone number in the space provided in Appendix B, "Computer
records" on page 141. Because locksmiths are not authorized to
duplicate the cover lock keys, you must order replacement keys from
the key manufacturer. When ordering replacement keys, you will need
the key code number.
You can set a chassis-intrusion detector inside your computer to alert the
system administrator each time the computer cover is removed. This
detector is enabled after you set an administrator password in the
Configuration/Setup utility program. After the password is set, and after
the computer cover is removed, a POST error message (176) displays on the
computer screen the next time the computer is plugged in and turned on.
You must type the correct administrator password to start up the computer.
For information on setting passwords, see Chapter 4, "Using the
Configuration/Setup Utility program" on page 43.
If your computer uses the Alert on LAN feature, and you are connected to a
network that uses Intel LANDesk
Manager, a message is also sent to the network administrator console
notifying that the computer cover has been removed. For more
information, see "Alert on LAN" on page 35 and contact your network
administrator.
Desktop Manager or IBM LANClient
Chapter 3. Operating and caring for your computer
37

Advertisement

Table of Contents
loading

Table of Contents