Lenovo NetVista X40 Quick Reference for NetVista 2179 and 6643 systems (Dutch) - Page 40

Component protection, Data protection, Virus protection, Shutting down your operating system

Page 40 highlights

Important: Record the ″key code″ number along with the manufacturer address and phone number in the space provided in "Appendix C. Computer records" on page 115. Because locksmiths are not authorized to duplicate the cover lock keys, you must order replacement keys from the key manufacturer. When ordering replacement keys, you will need the key code number. You can also set a chassis-intrusion detector inside your computer to alert the system administrator each time the computer cover is removed. For more information about setting the chassis-intrusion alert, see "Chapter 4. Configuring your computer" on page 27. Component protection Your computer has components with serial numbers that can be registered with a third-party security company. (You can also register the entire system.) By registering computer components, you can improve the chances of identifying the components if they are ever stolen and recovered. For more information about component registration, see the IBM support page at http://www.ibm.com/pc/us/desktop/assetid/ on the World Wide Web. Data protection You can lose data from the hard disk drive for a variety of reasons. Security violations, viruses, or hard disk drive failures can all contribute to data loss. To help protect against the loss of valuable information, IBM has incorporated a data-saving feature in your computer. Virus protection Your computer has built-in virus protection that can be enabled through the Configuration/Setup Utility program. This built-in protection only checks for viruses in the boot record. Also, Norton AntiVirus for IBM is available on the IBM Software Selections CD. For more information on how to use the Software Selections CD, see "Appendix A. Using the Software Selections CD" on page 109. Shutting down your operating system When you are ready to shut down your operating system, follow these instructions to prevent the loss of unsaved data or damage to your software programs. For more information about shutting down your operating system, refer the operating system documentation that comes with your computer. Complete the following steps to shut down your operating system. 1. Save any files you are working on. 2. Close all open applications. 3. Click the Windows Start button. 4. Click Shut Down. 5. Click Shut Down; then, click OK to confirm the request. 24 IBM® IntelliStation® E Pro: User's Guide IntelliStation E Pro Types 6836, 6846

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156

Important:
Record the
key code
number along with the manufacturer address and phone
number in the space provided in
Appendix C. Computer records
on page 115.
Because locksmiths are not authorized to duplicate the cover lock keys, you must
order replacement keys from the key manufacturer. When ordering replacement
keys, you will need the key code number.
You can also set a chassis-intrusion detector inside your computer to alert the
system administrator each time the computer cover is removed. For more
information about setting the chassis-intrusion alert, see
Chapter 4. Configuring
your computer
on page 27.
Component protection
Your computer has components with serial numbers that can be registered with a
third-party security company. (You can also register the entire system.) By
registering computer components, you can improve the chances of identifying the
components if they are ever stolen and recovered. For more information about
component registration, see the IBM support page at
Data protection
You can lose data from the hard disk drive for a variety of reasons. Security
violations, viruses, or hard disk drive failures can all contribute to data loss. To
help protect against the loss of valuable information, IBM has incorporated a
data-saving feature in your computer.
Virus protection
Your computer has built-in virus protection that can be enabled through the
Configuration/Setup Utility program. This built-in protection only checks for
viruses in the boot record. Also, Norton AntiVirus for IBM is available on the IBM
Software Selections
CD. For more information on how to use the
Software Selections
CD, see
Appendix A. Using the Software Selections CD
on page 109.
Shutting down your operating system
When you are ready to shut down your operating system, follow these instructions
to prevent the loss of unsaved data or damage to your software programs. For
more information about shutting down your operating system, refer the operating
system documentation that comes with your computer.
Complete the following steps to shut down your operating system.
1.
Save any files you are working on.
2.
Close all open applications.
3.
Click the Windows
Start
button.
4.
Click
Shut Down
.
5.
Click
Shut Down
; then, click
OK
to confirm the request.
24
IBM
®
IntelliStation
®
E Pro: User
s Guide IntelliStation E Pro Types 6836, 6846