Anti-intrusion features
IBM anti-intrusion features help protect against the theft of computer components,
such as the microprocessor, system memory modules, or hard disk drives.
A cover lock is built into your computer to prevent the cover from being removed.
Two identical keys for the cover lock are also supplied. A tag attached to the keys
has the key serial number and the address of the key manufacturer.
Important: Keep the key-code number, manufacturer address, and phone number
You can set the chassis-intrusion detector switch inside the computer to alert the
network system administrator each time the computer cover is removed. For more
information about setting the chassis-intrusion alert, see "Configuration" on page 17.
Component protection
Each component in your computer has a serial number that you can register with a
security company. You can register the components individually or you can register
the entire computer. By registering computer components, you can improve the
chances of identifying the components if they are ever stolen and recovered. For
more information about component registration, go to
http://www.ibm.com/pc/support/ on the World Wide Web.
Data protection
You can lose data from the hard disk for a variety of reasons. Security violations,
viruses, or hard disk drive failures can all contribute to data loss. To help protect
against the loss of valuable information, IBM has incorporated the following
data-saving features in your computer.
v SMART hard disk drive
v Virus protection
Locking the keyboard
You can lock the keyboard so that others are unable to use it. If a user password is
set using the Configuration/Setup Utility program, the keyboard is locked when you
turn on the computer. You must type the password before the keyboard will unlock.
See "Setting Security Passwords" in Access IBM or "Using passwords" on page 19.
Some operating systems have a keyboard and mouse lock-up feature. See the
documentation that comes with your operating system for more information.
in a safe place. Because locksmiths are not authorized to duplicate
cover-lock keys, you must order replacement keys from the key
manufacturer. You will need the key code when ordering replacement
keys.
Your computer comes with a self-monitoring and reporting technology (SMART)
hard disk drive that is enabled to report potential hard disk failures. If an error is
detected, a Desktop Management Interface (DMI) compliant warning message is
sent to the monitor screen and, if the computer is part of a network, to an
administrator console. When an error is detected, the data on the hard disk can
be backed up and the drive replaced.
Your computer has built-in virus protection that can be enabled through the IBM
Configuration/Setup Utility program. This built-in protection checks for viruses in
the boot record only. Also, Norton AntiVirus for IBM is available on the hard disk.
13
General information