IBM 6862 User Guide - Page 70

Using security features, Software Selections, Ready-to-Con Utility Program, About Your Software

Page 70 highlights

scanning of the Asset ID does not require the computer cover to be removed or even require the computer being removed from the box it is shipped in. This type of wireless tracking enables quicker system deployment and improved asset control. Remote administration The system programs (POST/BIOS) of your computer can be updated remotely across a network. A setting in the Configuration/Setup Utility program allows you to enable the computer for remote administration. See "Setting remote administration" on page 76. IBM System Management Tools IBM System Management Tools are provided either on the Software Selections that comes with your computer or on your hard disk and on the IBM Ready-to-Configure Utility Program CD. Some software might be available on the World Wide Web. The IBM System Management Tools package includes the following components: Desktop Management Interface (DMI) Service Provider 2.0 Desktop Management (DM) BIOS 2.0 Instrumentation IBM PC System Monitor Instrumentation IBM Alert on LAN IBM SMART Reaction Client Intel® LANDesk® Client Manager 3.1 Note: IBM Alert on LAN requires hardware support. This support is provided with PC 300PL computer models only. For detailed information on the IBM System Management Tools package and how to install it, refer to the Overview section on the Software Selections or your Ready-to-Configure CD. If your computer comes with IBM-preinstalled software, information on IBM System Management Tools and instructions for installation are also provided in the About Your Software booklet that comes with your computer. Using security features The security features provided by IBM are part of the on-going effort to help protect the personal computer from theft or inappropriate access, and to maintain the integrity of important data stored on the computer. IBM provides many security features for the personal computer. Some of the features are hardware-related, such as a cover lock or support for a security U-bolt; others are specific to the software provided with the computer such as administrator or power-on passwords. 52 Using Your Personal Computer

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208

scanning of the Asset ID does not require the computer cover to be removed or
even require the computer being removed from the box it is shipped in.
This type
of wireless tracking enables quicker system deployment and improved asset control.
Remote administration
The system programs (POST/BIOS) of your computer can be updated remotely
across a network.
A setting in the Configuration/Setup Utility program allows you
to enable the computer for remote administration.
See “Setting remote
administration” on page
76.
IBM System Management Tools
IBM System Management Tools are provided either on the
Software Selections
that
comes with your computer or on your hard disk and on the IBM
Ready-to-Configure
Utility Program
CD.
Some software might be available on the World Wide Web.
The IBM System Management Tools package includes the following components:
±
Desktop Management Interface (DMI) Service Provider 2.0
±
Desktop Management (DM) BIOS 2.0 Instrumentation
±
IBM PC System Monitor Instrumentation
±
IBM Alert on LAN
±
IBM SMART Reaction Client
±
Intel
LANDesk
Client Manager 3.1
Note:
IBM Alert on LAN requires hardware support.
This support is provided
with PC 300PL computer models only.
For detailed information on the IBM System Management Tools package and how to
install it, refer to the Overview section on the
Software Selections
or your
Ready-to-Configure CD
.
If your computer comes with IBM-preinstalled software,
information on IBM System Management Tools and instructions for installation are
also provided in the
About Your Software
booklet that comes with your computer.
Using security features
The security features provided by IBM are part of the on-going effort to help protect
the personal computer from theft or inappropriate access, and to maintain the
integrity of important data stored on the computer.
IBM provides many security features for the personal computer.
Some of the
features are hardware-related, such as a cover lock or support for a security U-bolt;
others are specific to the software provided with the computer such as administrator
or power-on passwords.
52
Using Your Personal Computer