IBM 6648 User Guide - Page 12

Using the Configuration/Setup Utility program, Installing options - memory

Page 12 highlights

System Migration Assistant (SMA 22 Desktop Management Interface 23 Using security features 23 Anti-intrusion features 23 Component protection 23 Asset ID capability 24 IBM security solutions 24 Data protection 24 Locking the keyboard 25 Shutting down 26 Taking care of your computer 26 Basics 26 Cleaning your computer 26 Moving your computer 28 Chapter 4. Using the Configuration/Setup Utility program 29 Starting and using the Configuration/Setup Utility program 29 Viewing and changing settings 30 Exiting from the Configuration/Setup Utility program 31 Using System Security 31 Using Enhanced Security 31 Using Security Profiles by Device 33 Setting Remote Administration 34 Using passwords 34 Using Adapter ROM security 37 Using the IBM Embedded Security Chip 37 Enabling the Pentium III processor serial number feature 38 Other settings in the Configuration/Setup Utility program 38 Changing keyboard speed 38 Power-management features 39 Chapter 5. Installing options 43 Handling static-sensitive devices 43 Available options 44 Tools required 44 Removing the cover 45 Locating components-small form factor desktop model 46 Locating components-desktop model 47 Installing options on the system board and riser card (some models) . . . 47 Accessing the system board 47 Identifying parts on the system board 48 Installing memory 50 Installing adapters 52 Installing internal drives 57 Drive specifications - small form factor desktop model 58 Drive specifications - desktop model 59 Power and signal cables for internal drives 60 x User Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150

System Migration Assistant (SMA)
.
.
.
.
.
.
.
.
.
.
.
.
.
.
22
Desktop Management Interface
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
23
Using security features
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
23
Anti-intrusion features
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
23
Component protection
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
23
Asset ID capability
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
24
IBM security solutions
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
24
Data protection
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
24
Locking the keyboard
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
25
Shutting down
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
26
Taking care of your computer
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
26
Basics
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
26
Cleaning your computer
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
26
Moving your computer
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
28
Chapter 4. Using the Configuration/Setup Utility program
.
.
.
.
.
.
29
Starting and using the Configuration/Setup Utility program
.
.
.
.
.
.
29
Viewing and changing settings
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
30
Exiting from the Configuration/Setup Utility program
.
.
.
.
.
.
.
31
Using System Security
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
31
Using Enhanced Security
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
31
Using Security Profiles by Device
.
.
.
.
.
.
.
.
.
.
.
.
.
.
33
Setting Remote Administration
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
34
Using passwords
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
34
Using Adapter ROM security
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
37
Using the IBM Embedded Security Chip
.
.
.
.
.
.
.
.
.
.
.
.
37
Enabling the Pentium III processor serial number feature
.
.
.
.
.
.
.
38
Other settings in the Configuration/Setup Utility program
.
.
.
.
.
.
38
Changing keyboard speed
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
38
Power-management features
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
39
Chapter 5. Installing options
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
43
Handling static-sensitive devices
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
43
Available options
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
44
Tools required
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
44
Removing the cover
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
45
Locating components—small form factor desktop model
.
.
.
.
.
.
.
46
Locating components—desktop model
.
.
.
.
.
.
.
.
.
.
.
.
.
47
Installing options on the system board and riser card (some models)
.
.
. 47
Accessing the system board
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
47
Identifying parts on the system board
.
.
.
.
.
.
.
.
.
.
.
.
48
Installing memory
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
50
Installing adapters
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
52
Installing internal drives
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
57
Drive specifications — small form factor desktop model
.
.
.
.
.
.
58
Drive specifications — desktop model
.
.
.
.
.
.
.
.
.
.
.
.
59
Power and signal cables for internal drives
.
.
.
.
.
.
.
.
.
.
.
60
x
User Guide