Lenovo ThinkPad T40p IBM System Information Center Administrator's Guide - Page 48

Security, Settings

Page 48 highlights

- Status: Status of the asset (issued/active or pending transfer). v User Demographics Form: - Address: User's address. - Country: Country where user lives. - Department: Department where user is located. - E-mail: E-mail of the user. - Employee ID: Employee ID of the user. - Location: Location of the user. - Mobile phone number: Mobile phone number of the user. - Name: Name of the user. - Nickname: Nickname of the user. - Office phone number: Office phone number for the user. - Password: Password for the user. - Postal Code: Postal code for the user. - Title: Title of the user. - Town: Town where the user lives. - User ID: User ID of the user. Security Settings With these settings you can use the System Information Center program to verify security settings on all client computers. You can check to see if specific Microsoft settings are used on client computers: v Verify that all File Shares on client computers are password-protected: The System Information Center program will check and verify that all files shares on a client computer are password-protected each time the asset is revised. v Verify that all Windows screen savers are password-protected: The System Information Center program will check and verify that the Windows screen saver password is set on all client computers each time the asset is revised. v Verify that all Windows accounts are password-protected: The System Information Center program will check and verify that the Windows account password is set on all client computers each time the asset is revised. v Windows accounts require passwords: The System Information Center program will check and verify that the Windows account password is set on all client computers each time the asset is revised. v Verify that the required antivirus application is installed on all client computers: The System Information Center program will check and verify that the antivirus application that you define is installed on all client computers each time the asset is revised. Note: The program can check for one or more antivirus applications. v Verify that the required firewall application is installed on all client computers: The System Information Center program will check and verify that the firewall application that you define is installed on all client computers each time the asset is revised. Note: The program can check for one or more firewall applications. 40

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108

Status:
Status
of
the
asset
(issued/active
or
pending
transfer).
v
User
Demographics
Form:
Address:
User’s
address.
Country:
Country
where
user
lives.
Department:
Department
where
user
is
located.
E-mail:
E-mail
of
the
user.
Employee
ID:
Employee
ID
of
the
user.
Location:
Location
of
the
user.
Mobile
phone
number:
Mobile
phone
number
of
the
user.
Name:
Name
of
the
user.
Nickname:
Nickname
of
the
user.
Office
phone
number:
Office
phone
number
for
the
user.
Password:
Password
for
the
user.
Postal
Code:
Postal
code
for
the
user.
Title:
Title
of
the
user.
Town:
Town
where
the
user
lives.
User
ID:
User
ID
of
the
user.
Security
Settings
With
these
settings
you
can
use
the
System
Information
Center
program
to
verify
security
settings
on
all
client
computers.
You
can
check
to
see
if
specific
Microsoft
settings
are
used
on
client
computers:
v
Verify
that
all
File
Shares
on
client
computers
are
password-protected:
The
System
Information
Center
program
will
check
and
verify
that
all
files
shares
on
a
client
computer
are
password-protected
each
time
the
asset
is
revised.
v
Verify
that
all
Windows
screen
savers
are
password-protected:
The
System
Information
Center
program
will
check
and
verify
that
the
Windows
screen
saver
password
is
set
on
all
client
computers
each
time
the
asset
is
revised.
v
Verify
that
all
Windows
accounts
are
password-protected:
The
System
Information
Center
program
will
check
and
verify
that
the
Windows
account
password
is
set
on
all
client
computers
each
time
the
asset
is
revised.
v
Windows
accounts
require
passwords:
The
System
Information
Center
program
will
check
and
verify
that
the
Windows
account
password
is
set
on
all
client
computers
each
time
the
asset
is
revised.
v
Verify
that
the
required
antivirus
application
is
installed
on
all
client
computers:
The
System
Information
Center
program
will
check
and
verify
that
the
antivirus
application
that
you
define
is
installed
on
all
client
computers
each
time
the
asset
is
revised.
Note:
The
program
can
check
for
one
or
more
antivirus
applications.
v
Verify
that
the
required
firewall
application
is
installed
on
all
client
computers:
The
System
Information
Center
program
will
check
and
verify
that
the
firewall
application
that
you
define
is
installed
on
all
client
computers
each
time
the
asset
is
revised.
Note:
The
program
can
check
for
one
or
more
firewall
applications.
40