After clearing CMOS memory, you must reconfigure the computer. After
reassembling the computer, use the Configuration/Setup Utility program to
reset the date and time, reset any passwords, and reconfigure the computer.
Using Security Profile by Device
Security Profile by Device enables you to control the level of security for the
following:
IDE controller (for example, hard disk drives) - when the feature is set
to Disable, all devices connected to the IDE controller are disabled and
will not appear in the system configuration.
Diskette Drive Access - when the feature is set to Disable, the diskette
drive cannot be accessed.
Diskette Write Protect - when the feature is set to Enable, all diskettes
are treated as if write-protected.
Setting Security Profile by Device also enables you to control which devices
require a password before they start up. There are three classes of these
devices:
Removable media, such as diskette drives and CD-ROM drives
Hard disk drives
Network devices
You can set these devices to request a user password, an administrator
password, or not to require a password. This way, if you have a power-on
or administrator password set for your system, you can configure your
computer to prompt you for a password only when certain devices are
accessed at startup. For example, if you set Hard Disk Devices to require a
User password, each time you attempt to start up from the hard disk, you
will be prompted to type the password before the startup proceeds.
Some operating systems require you to type a password before the
operating system will load. Security Profile by Device does not change the
way the operating system works. If an operating system password is
required, you must still type it when prompted, regardless of the Security
Profile by Device settings.
To set Security Profile by Device:
1. Start the Configuration/Setup Utility program (see “Starting and using
the Configuration/Setup Utility program” on page 39).
2. From the Configuration/Setup Utility program menu, select System
Security
and press Enter.
3. Select Security Profile by Device and press Enter.
Chapter 4. Configuration/Setup Utility program
47
Содержание PC 300GL Type 6563
Страница 1: ...PC 300PL User Guide Type 6565 PC 300GL User Guide Types 6563 6564 6574...
Страница 2: ......
Страница 3: ...PC 300PL User Guide Type 6565 PC 300GL User Guide Types 6563 6564 6574 IBM...
Страница 10: ...viii PC 300PL and PC 300GL User Guide...
Страница 18: ...xvi PC 300PL and PC 300GL User Guide...
Страница 20: ...Desktop model Tower model 2 PC 300PL and PC 300GL User Guide...
Страница 24: ...PC DOS 2000 SCO OpenServer 5 0 5 6 PC 300PL and PC 300GL User Guide...
Страница 38: ...20 PC 300PL and PC 300GL User Guide...
Страница 78: ...60 PC 300PL and PC 300GL User Guide...
Страница 90: ...4 Rotate the power supply toward the opened side slightly 72 PC 300PL and PC 300GL User Guide...
Страница 114: ...Desktop Tower 96 PC 300PL and PC 300GL User Guide...
Страница 189: ......
Страница 190: ...IBM Part Number 10K2713 Printed in U S A September 1999 1 K2713...