IBM 68666AU User Guide - Page 47

Desktop Management Interface, Using security features, Anti-intrusion features

Page 47 highlights

Desktop Management Interface Desktop Management Interface (DMI) is a method for gathering information about the hardware and software in your computer. In a network environment, network administrators can use DMI to remotely monitor and control your computer. For more information about DMI, see Understanding Your Computer (provided on the IBM Software Selections CD that comes with your computer). Using security features To deter unauthorized use of your computer, you can use anti-intrusion features and other security features that are provided with your computer. Anti-intrusion features IBM anti-intrusion features help protect against the theft of computer components, such as the microprocessor, system memory modules, or drives. A cover lock is built into your computer to prevent the cover from being removed. Two identical keys for the cover lock are also supplied. A tag attached to the keys has the key serial number and the address of the key manufacturer. Important Record the "key code" number along with the manufacturer address and phone number in the space provided in Appendix C, "Computer records" on page 143. Because locksmiths are not authorized to duplicate the cover lock keys, you must order replacement keys from the key manufacturer. When ordering replacement keys, you will need the key code number. You can set a chassis-intrusion detector inside your computer to alert the system administrator each time the computer cover is removed. This detector is enabled after you set an administrator password in the Configuration/Setup Utility program. After the password is set, and after the computer cover is removed, a POST error message (176) displays on the computer screen the next time the computer is turned on. You must type the correct administrator password to start up the computer. For information on setting passwords, see Chapter 4, "Using the Configuration/Setup Utility program" on page 39. Chapter 3. Operating and caring for your computer 31

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190

Desktop Management Interface
Desktop Management Interface (DMI) is a method for gathering information
about the hardware and software in your computer.
In a network
environment, network administrators can use DMI to remotely monitor and
control your computer.
For more information about DMI, see
Understanding
Your Computer
(provided on the IBM
Software Selections CD
that comes with
your computer).
Using security features
To deter unauthorized use of your computer, you can use anti-intrusion
features and other security features that are provided with your computer.
Anti-intrusion features
IBM anti-intrusion features help protect against the theft of computer
components, such as the microprocessor, system memory modules, or
drives.
A cover lock is built into your computer to prevent the cover from being
removed.
Two identical keys for the cover lock are also supplied.
A tag
attached to the keys has the key serial number and the address of the key
manufacturer.
Important
Record the "key code" number along with the manufacturer address and
phone number in the space provided in Appendix
C, “Computer
records” on page
143.
Because locksmiths are not authorized to
duplicate the cover lock keys, you must order replacement keys from
the key manufacturer.
When ordering replacement keys, you will need
the key code number.
You can set a chassis-intrusion detector inside your computer to alert the
system administrator each time the computer cover is removed.
This
detector is enabled after you set an administrator password in the
Configuration/Setup Utility program.
After the password is set, and after
the computer cover is removed, a POST error message (176) displays on the
computer screen the next time the computer is turned on.
You must type
the correct administrator password to start up the computer.
For
information on setting passwords, see Chapter
4, “Using the
Configuration/Setup Utility program” on page
39.
Chapter
3.
Operating and caring for your computer
31