Desktop Management Interface; Using Security Features; Anti-Intrusion Features; Component Protection - IBM IntelliStation M Pro User Manual

Ibm intellistation e pro computer
Hide thumbs Also See for IntelliStation M Pro:
Table of Contents

Advertisement

Desktop Management Interface

DMI is a method for gathering information about the hardware and software in
your computer. In a network environment, network administrators can use DMI to
remotely monitor and control your computer.

Using security features

To deter unauthorized use of your computer, your computer has several
anti-intrusion and other security features.

Anti-intrusion features

IBM anti-intrusion features help protect against the theft of computer components,
such as the microprocessor, system memory modules, or disk drives.
A cover lock is built into your computer to prevent the cover from being removed.
Two identical keys for the cover lock are also supplied. A tag attached to the keys
has the key serial number and the address of the key manufacturer.
If enabled, the chassis-intrusion detector switch inside the computer alerts the
network system administrator each time the computer cover is removed. This
detector is enabled after you set a supervisor password in the BIOS Setup Utility
program. When this feature is enabled and the cover is removed, a 176 POST error
message displays on the computer screen the next time the computer is turned on.
You must type the correct supervisor password to start up the computer. For
information on setting passwords, see Setting Security Passwords in Access IBM.
If your computer uses the Alert on LAN feature, and your network administrator
uses Intel LANDesk
administrator console is notified that the computer cover has been removed. For
more information, see "Alert on LAN" on page 20 and contact your network
administrator.

Component protection

Your computer has individual component serial numbers that can be registered
with a third-party security company. You can also register the entire system. By
registering computer components, you can improve the chances of identifying the
components if they are ever stolen and recovered. For more information about
component registration, see the IBM support page at
http://www.ibm.com/pc/us/desktop/assetid/ on the World Wide Web.

Data protection

You can lose data from the hard disk for a variety of reasons. Security violations,
viruses, or hard disk drive failures can all contribute to data loss. To help protect
against the loss of valuable information, IBM has incorporated the following
data-saving features in your computer.
Important
Record the key-code number along with the manufacturer address and phone
number in the space provided in "Appendix C. Computer Records". You will
need the key code when ordering replacement keys. You must order
replacement keys from the key manufacturer because locksmiths are not
authorized to duplicate cover-lock keys.
®
Desktop Manager or IBM LANClient Manager, the network
Chapter 3. Operating Your Computer
21

Advertisement

Table of Contents
loading

This manual is also suitable for:

Intellistation m pro type 6849

Table of Contents