Lenovo ThinkPad T41p IBM System Information Center Administrator's Guide - Page 19

password-protected

Page 19 highlights

- Create new passwords as expired so that users must change after first logon: Mark this check box to require users to establish their own password after receiving the computer-generated password. - Expire passwords after XX days: Mark this check box and then type the maximum number of days a password is accepted. (Default is 186 days, or approximately six months.) v Under Password Creation Rules, mark the check box for Enable password rule checking if the creation of passwords must follow certain rules; then respond to the following options: - Passwords must contain: Mark a check box for the type of characters (non-numeric, numeric, or non-alphanumeric) a password must contain. (Default is non-numeric and numeric.) - Minimum length: Type the minimum length of the password. (Default is 6.) - Maximum length: Type the maximum length of the password. (Default is 15.) - Maximum number of matching sequential characters: Type the maximum number of sequential password characters that can match. (Default is 2.) - Maximum number of sequential characters reused from previous password: Type the maximum number of sequential password characters that can be reused in a new password. (Default is 3.) 10. Click Next. The Form Settings window opens. 11. The Form Settings window displays fields you can select as ″required″ in order for an asset or user to be successfully added to the database. These are fields that users must complete during the asset registration process before adding an asset or uploading an asset scan. Default settings are provided. You can restore defaults by clicking the Defaults button. v The Asset Demographics Form includes information specific to the asset. Mark the check box for all fields required at the time the asset is registered. v The User Demographics Form includes information specific to the user. Mark the check box for all fields required at the time the asset is registered. 12. Click Next. The Security Settings window opens. 13. In the Security Settings window, you can choose to have the following options enabled. These options are helpful if you want to use the security report that lists all assets that are in violation of security policies. v Verify that all File Shares on client computers are password-protected: Mark this check box if you want the System Information Center program to check and verify that all file shares on client computers are password-protected each time the asset is revised. v Verify that all Windows screen savers are password-protected: Mark this check box if you want the System Information Center program to check and verify that the Windows screen saver password is set on all client computers each time the asset is revised. v Verify that all Windows accounts are password-protected: Mark this check box if you want the System Information Center program to check and verify that the Windows account password is set on all client computers each time the asset is revised. v Windows accounts require passwords: Mark this check box if you want the System Information Center program to check and verify that the Windows Chapter 2. Installing the System Information Center program on a server 11

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108

Create
new
passwords
as
expired
so
that
users
must
change
after
first
logon
:
Mark
this
check
box
to
require
users
to
establish
their
own
password
after
receiving
the
computer-generated
password.
Expire
passwords
after
XX
days
:
Mark
this
check
box
and
then
type
the
maximum
number
of
days
a
password
is
accepted.
(Default
is
186
days,
or
approximately
six
months.)
v
Under
Password
Creation
Rules,
mark
the
check
box
for
Enable
password
rule
checking
if
the
creation
of
passwords
must
follow
certain
rules;
then
respond
to
the
following
options:
Passwords
must
contain
:
Mark
a
check
box
for
the
type
of
characters
(non-numeric,
numeric,
or
non-alphanumeric)
a
password
must
contain.
(Default
is
non-numeric
and
numeric.)
Minimum
length
:
Type
the
minimum
length
of
the
password.
(Default
is
6.)
Maximum
length
:
Type
the
maximum
length
of
the
password.
(Default
is
15.)
Maximum
number
of
matching
sequential
characters
:
Type
the
maximum
number
of
sequential
password
characters
that
can
match.
(Default
is
2.)
Maximum
number
of
sequential
characters
reused
from
previous
password
:
Type
the
maximum
number
of
sequential
password
characters
that
can
be
reused
in
a
new
password.
(Default
is
3.)
10.
Click
Next
.
The
Form
Settings
window
opens.
11.
The
Form
Settings
window
displays
fields
you
can
select
as
required
in
order
for
an
asset
or
user
to
be
successfully
added
to
the
database.
These
are
fields
that
users
must
complete
during
the
asset
registration
process
before
adding
an
asset
or
uploading
an
asset
scan.
Default
settings
are
provided.
You
can
restore
defaults
by
clicking
the
Defaults
button.
v
The
Asset
Demographics
Form
includes
information
specific
to
the
asset.
Mark
the
check
box
for
all
fields
required
at
the
time
the
asset
is
registered.
v
The
User
Demographics
Form
includes
information
specific
to
the
user.
Mark
the
check
box
for
all
fields
required
at
the
time
the
asset
is
registered.
12.
Click
Next
.
The
Security
Settings
window
opens.
13.
In
the
Security
Settings
window,
you
can
choose
to
have
the
following
options
enabled.
These
options
are
helpful
if
you
want
to
use
the
security
report
that
lists
all
assets
that
are
in
violation
of
security
policies.
v
Verify
that
all
File
Shares
on
client
computers
are
password-protected
:
Mark
this
check
box
if
you
want
the
System
Information
Center
program
to
check
and
verify
that
all
file
shares
on
client
computers
are
password-protected
each
time
the
asset
is
revised.
v
Verify
that
all
Windows
screen
savers
are
password-protected
:
Mark
this
check
box
if
you
want
the
System
Information
Center
program
to
check
and
verify
that
the
Windows
screen
saver
password
is
set
on
all
client
computers
each
time
the
asset
is
revised.
v
Verify
that
all
Windows
accounts
are
password-protected
:
Mark
this
check
box
if
you
want
the
System
Information
Center
program
to
check
and
verify
that
the
Windows
account
password
is
set
on
all
client
computers
each
time
the
asset
is
revised.
v
Windows
accounts
require
passwords
:
Mark
this
check
box
if
you
want
the
System
Information
Center
program
to
check
and
verify
that
the
Windows
Chapter
2.
Installing
the
System
Information
Center
program
on
a
server
11