IBM 6648 User Guide - Page 37

Desktop Management Interface, Using security features, Anti-intrusion features, Component protection

Page 37 highlights

For more information or to download this software go to http://www.ibm.com/pc/us/software/sysmgmt/products/sma on the World Wide Web. Desktop Management Interface Desktop Management Interface (DMI) is a method for gathering information about the hardware and software in your computer. In a network environment, network administrators can use DMI to remotely monitor and control your computer. For more information about DMI, see About Your Software (accessible through Access IBM on computers with preinstalled software). Using security features To deter unauthorized use of your computer, you can use anti-intrusion features and other security features that are provided with your computer. Anti-intrusion features IBM anti-intrusion features help protect against the theft of computer components, such as the microprocessor, system memory modules, or drives. A cover lock is built into some models to prevent the cover from being removed. Two identical keys for the cover lock are also supplied. A tag attached to the keys has the key serial number and the address of the key manufacturer. Some models have a chassis-intrusion detector inside. You can set the chassis-intrusion detector to alert the system administrator each time the computer cover is removed. This detector is enabled after you set an administrator password in the Configuration/Setup Utility program. If a password is set and the cover is removed, a POST error message (176) displays on the computer screen the next time the computer is turned on. You must type the correct administrator password to start up the computer. For information on setting the passwords, see "Using passwords" on page 34. Component protection Your computer has serialized components that can be registered with a third-party security company. (You can also register the entire system.) By registering computer components, you can improve the chances of identifying the components if they are ever stolen and recovered. For more information about component registration, see the IBM support page at http://www.ibm.com/pc/us/desktop/assetid/ on the World Wide Web. Chapter 3. Operating and caring for your computer 23

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150

For more information or to download this software go to
Wide Web.
Desktop Management Interface
Desktop Management Interface (DMI) is a method for gathering information
about the hardware and software in your computer. In a network environment,
network administrators can use DMI to remotely monitor and control your
computer. For more information about DMI, see
About Your Software
(accessible
through Access IBM on computers with preinstalled software).
Using security features
To deter unauthorized use of your computer, you can use anti-intrusion
features and other security features that are provided with your computer.
Anti-intrusion features
IBM anti-intrusion features help protect against the theft of computer
components, such as the microprocessor, system memory modules, or drives.
A cover lock is built into some models to prevent the cover from being
removed. Two identical keys for the cover lock are also supplied. A tag
attached to the keys has the key serial number and the address of the key
manufacturer.
Some models have a chassis-intrusion detector inside. You can set the
chassis-intrusion detector to alert the system administrator each time the
computer cover is removed. This detector is enabled after you set an
administrator password in the Configuration/Setup Utility program. If a
password is set and the cover is removed, a POST error message (176) displays
on the computer screen the next time the computer is turned on. You must
type the correct administrator password to start up the computer. For
information on setting the passwords, see “Using passwords” on page 34.
Component protection
Your computer has serialized components that can be registered with a
third-party security company. (You can also register the entire system.) By
registering computer components, you can improve the chances of identifying
the components if they are ever stolen and recovered. For more information
about component registration, see the IBM support page at
Chapter 3. Operating and caring for your computer
23