IBM 6862 User Guide - Page 72

Component protection, Manager or Intel

Page 72 highlights

A cover lock is built into the chassis of some computers to prevent the cover from being removed. Two identical keys for the cover lock are also supplied. A tag attached to the keys has the key serial number and the address of the key manufacturer. Important Record the serial number and the manufacturer address in the space provided in Appendix A, "Computer records" on page 151, and store the tag in a safe place. Because locksmiths are not authorized to duplicate the cover-lock keys, you must order replacement keys from the key manufacturer. When ordering replacement keys, you will need the key serial number. A chassis-intrusion detector inside your computer can be set to alert the system administrator each time the computer cover is removed. This detector is enabled after you set an administrator password in the Configuration/Setup Utility program. After the password is set, and after the computer cover is removed, a POST error message (176) displays on the computer screen the next time the computer is plugged in and powered on. You must enter the correct administrator password in order to start up the computer. For information on setting passwords, see Chapter 5, "Using the Configuration/Setup Utility program" on page 61. If you have installed IBM System Management Tools from the software provided with your computer, a DMI-compliant message will also display on the computer screen, after the operating system is loaded. (For more information on IBM System Management Tools, see the Overview section on the Ready-to-Configure Utility Program CD, or refer to About Your Software.) Also, if your computer uses Alert on LAN, and you are connected to a network that uses Intel LANDesk® Desktop Manager or Intel® LANDesk Client Manager, a message is also sent to the network administrator console notifying that the computer cover has been removed. For more information, see "Alert on LAN support" on page 49 and contact your network administrator. Component protection Your computer has serialized components that can be registered with a third-party security company. (You can also register the entire system.) By registering computer components, you can improve the chances of identifying the components if they are ever stolen and recovered. For more information about component registration, see: http://www.retainagroup.com 54 Using Your Personal Computer

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208

A cover lock is built into the chassis of some computers to prevent the cover from
being removed.
Two identical keys for the cover lock are also supplied.
A tag
attached to the keys has the key serial number and the address of the key
manufacturer.
Important
Record the serial number and the manufacturer address in the space provided in
Appendix
A, “Computer records” on page
151, and store the tag in a safe place.
Because locksmiths are not authorized to duplicate the cover-lock keys, you
must order replacement keys from the key manufacturer.
When ordering
replacement keys, you will need the key serial number.
A chassis-intrusion detector inside your computer can be set to alert the system
administrator each time the computer cover is removed.
This detector is enabled
after you set an administrator password in the Configuration/Setup Utility
program.
After the password is set, and after the computer cover is removed, a
POST error message (176) displays on the computer screen the next time the
computer is plugged in and powered on.
You must enter the correct administrator
password in order to start up the computer.
For information on setting passwords,
see Chapter
5, “Using the Configuration/Setup Utility program” on page
61.
If you have installed IBM System Management Tools from the software provided
with your computer, a DMI-compliant message will also display on the computer
screen, after the operating system is loaded.
(For more information on IBM System
Management Tools, see the Overview section on the
Ready-to-Configure Utility
Program
CD, or refer to
About Your Software
.)
Also, if your computer uses Alert on
LAN, and you are connected to a network that uses Intel LANDesk
Desktop
Manager or Intel
LANDesk Client Manager, a message is also sent to the network
administrator console notifying that the computer cover has been removed.
For
more information, see “Alert on LAN support” on page
49 and contact your
network administrator.
Component protection
Your computer has serialized components that can be registered with a third-party
security company.
(You can also register the entire system.)
By registering
computer components, you can improve the chances of identifying the components
if they are ever stolen and recovered.
For more information about component
registration, see:
54
Using Your Personal Computer