Lenovo PC 300PL User guide for IBM PC300PL (type 6584, 6594) systems - Page 45

Component protection, Asset ID capability

Page 45 highlights

Important Record the key code number and the manufacturer address and phone number in the space provided in Appendix B, "Computer records" on page 147. Because locksmiths are not authorized to duplicate the cover lock keys, you must order replacement keys from the key manufacturer. When ordering replacement keys, you will need the key code number. You can set a chassis-intrusion detector inside your computer to alert the system administrator each time the computer cover is removed. This detector is enabled after you set an administrator password in the Configuration/Setup Utility program. After the password is set, and after the computer cover is removed, a POST error message (176) displays on the computer screen the next time the computer is plugged in and turned on. You must enter the correct administrator password in order to start up the computer. For information on setting passwords, see Chapter 4, "Using the Configuration/Setup Utility program" on page 37. If your computer uses Alert on LAN, and you are connected to a network that uses Intel LANDesk® Desktop Manager or Intel LANDesk Client Manager, a message that the computer cover has been removed is also sent to the network administrator console. For more information, see "Alert on LAN" on page 29 and contact your network administrator. Component protection Your computer has serialized components that can be registered with a third-party security company. (You can also register the entire system.) By registering computer components, you can improve the chances of identifying the components if they are ever stolen and recovered. For more information about component registration, see the IBM support page at http://www.pc.ibm.com/us/desktop/ on the World Wide Web. Asset ID capability IBM provides the basis for Asset ID™ support3 in your computer. Asset ID provides the capability to access information about your computer that is stored in an EEPROM module on the system board, using a radio-frequency-enabled portable scanner. 3 Asset ID enables your personal computer to be scanned by various radio frequency-emitting devices supplied by independent companies. Asset ID is intended for use only with radio frequency equipment that meets ANSI/IEEE C95.1 1991 RF Radiation Limits. Chapter 3. Operating and caring for your computer 31

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194

Important
Record the key code number and the manufacturer address and phone
number in the space provided in Appendix
B, “Computer records” on
page
147.
Because locksmiths are not authorized to duplicate the cover
lock keys, you must order replacement keys from the key manufacturer.
When ordering replacement keys, you will need the key code number.
You can set a chassis-intrusion detector inside your computer to alert the
system administrator each time the computer cover is removed.
This
detector is enabled after you set an administrator password in the
Configuration/Setup Utility program.
After the password is set, and after
the computer cover is removed, a POST error message (176) displays on the
computer screen the next time the computer is plugged in and turned on.
You must enter the correct administrator password in order to start up the
computer.
For information on setting passwords, see Chapter
4, “Using the
Configuration/Setup Utility program” on page
37.
If your computer uses Alert on LAN, and you are connected to a network
that uses Intel LANDesk
Desktop Manager or Intel LANDesk Client
Manager, a message that the computer cover has been removed is also sent
to the network administrator console.
For more information, see “Alert on
LAN” on page
29 and contact your network administrator.
Component protection
Your computer has serialized components that can be registered with a
third-party security company.
(You can also register the entire system.)
By
registering computer components, you can improve the chances of
identifying the components if they are ever stolen and recovered.
For more
information about component registration, see the IBM support page at
http://www.pc.ibm.com/us/desktop/ on the World Wide Web.
Asset ID capability
IBM provides the basis for Asset ID
support
3
in your computer.
Asset ID
provides the capability to access information about your computer that is
stored in an EEPROM module on the system board, using a
radio-frequency-enabled portable scanner.
3
Asset ID enables your personal computer to be scanned by various radio
frequency-emitting devices supplied by independent companies.
Asset ID is intended
for use only with radio frequency equipment that meets ANSI/IEEE C95.1 1991 RF
Radiation Limits.
Chapter
3.
Operating and caring for your computer
31