Dell bpcwcsn_5 User's Guide - Page 251

Option Settings, Padlock Ring and Security Cable Slot, Chassis Intrusion, Security, Detected, Reset

Page 251 highlights

This feature, if installed and enabled, detects that the chassis was opened and alerts the user. To change the Chassis Intrusion setting: 1 Enter system setup (see "Entering System Setup" on page 257). 2 Press the down-arrow key to move to the Security option. 3 Press to access the Security option's pop-up menu. 4 Press the down-arrow key to move to the Chassis Intrusion setting. 5 Press to select an option setting. 6 Press again after you update the option setting. 7 Exit and save system setup. Option Settings • On - If the computer cover is opened, the setting changes to Detected, and the following alert message displays during the boot routine at the next computer start-up: Alert! Cover was previously removed. To reset the Detected setting, enter system setup (see "Entering System Setup" on page 257). In the Chassis Intrusion option, press the left- or right-arrow key to select Reset, and then choose On, On-Silent, or Off. • On-Silent (default setting) - If the computer cover is opened, the setting changes to Detected. No alert message appears during the boot sequence at the next computer start-up. • Off - No intrusion monitoring occurs and no messages appear. Padlock Ring and Security Cable Slot Use one of the following methods to secure your computer: • Use a padlock alone or a padlock and looped security cable with the padlock ring. A padlock alone prevents the computer from being opened. A security cable looped around a stationary object is used in conjunction with a padlock to prevent unauthorized movement of the computer. • Attach a commercially available antitheft device to the security cable slot on the back of the computer. NOTE: Before you purchase an antitheft device, make sure that it works with the security cable slot on your computer. Antitheft devices usually include a segment of metal-stranded cable with an attached locking device and key. The documentation that comes with the device contains instructions for installing it. Advanced Features 251

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368

Advanced Features
251
This feature, if installed and enabled, detects that the chassis was opened and alerts the user. To change
the
Chassis Intrusion
setting:
1
Enter system setup (see "Entering System Setup" on page 257).
2
Press the down-arrow key to move to the
Security
option.
3
Press <Enter> to access the
Security
option's pop-up menu.
4
Press the down-arrow key to move to the
Chassis Intrusion
setting.
5
Press <Enter> to select an option setting.
6
Press <Enter> again after you update the option setting.
7
Exit and save system setup.
Option Settings
On
— If the computer cover is opened, the setting changes to
Detected
, and the following alert
message displays during the boot routine at the next computer start-up:
Alert! Cover was previously removed.
To reset the
Detected
setting, enter system setup (see "Entering System Setup" on page 257). In the
Chassis Intrusion
option, press the left- or right-arrow key to select
Reset
, and then choose
On
,
On-Silent
, or
Off
.
On-Silent
(default setting) — If the computer cover is opened, the setting changes to
Detected
. No
alert message appears during the boot sequence at the next computer start-up.
Off
— No intrusion monitoring occurs and no messages appear.
Padlock Ring and Security Cable Slot
Use one of the following methods to secure your computer:
Use a padlock alone or a padlock and looped security cable with the padlock ring.
A padlock alone prevents the computer from being opened.
A security cable looped around a stationary object is used in conjunction with a padlock to prevent
unauthorized movement of the computer.
Attach a commercially available antitheft device to the security cable slot on the back of the computer.
NOTE:
Before you purchase an antitheft device, make sure that it works with the security cable slot on your
computer.
Antitheft devices usually include a segment of metal-stranded cable with an attached locking device
and key. The documentation that comes with the device contains instructions for installing it.