Overview 1-11
Security Features
The system has hardware, software, and mechanical security features that offer protection
against unauthorized access to the system and data. The following security features are
available.
Password Security
The BIOS Setup Utility includes a feature that allows a user to set either a user or supervisor
password, or both.
The user password controls booting of the system and controls access to the Setup Utility and
the keyboard. User access to the BIOS Setup Utility is limited when a supervisor password is
set. The supervisor password allows full access to the system and the BIOS.
See Section 2, “System Configuratio n, ” for further information on setti n g and using passwords.
Windows Network Security Features
The Windows Network Security feature i s available through the Windows ope rating system.
Check the Windows documentation for details.
Keyboard/mouse Anti-theft Bracket
The keyboard/mouse anti-theft bracket secures the keyboard and mouse cables to the system,
making it difficult to remove the keyboard and mouse from the system.
Locking Tab
The system has a locking tab on the rear of the system. The tab fits through a mating slot in the
rear edge of the chassis cover. Securing a padlock (not supplied) in the locking tab prevents
removal of the system cover and access to the interior of the system.
Chassis Intrusion Notification
Whenever the system cover is removed, a hidden switch (if installed) sends a signal to the
LANDesk Client Manager (LDCM). LDCM logs the incident and then reports it on screen the
next time the system is rebooted.
Hard Drive Password Protection
The system supports password protection for the hard drive. Hard drive password protection
restricts access to the drive if the drive is removed and installed in another system. The system
does not prompt for hard drive passwords while the drive remains in the current system.
The passwords are written to the system BIOS and to the hard drive to ensure that the password
protection travels with the drive if it is moved to another system. See Section 2, “System
Configuration,” for additional information on using hard drive security.