1-4 Dell PowerEdge 4200 Systems User’s Guideyour system. When connecting external devices to yourcomputer, follow these guidelines:• Check the documentation that accompanied thedevice for specific installation and configurationinstructions.For example, most devices must be connected to aparticular I/O port or connector to operate properly.Also, external devices such as a mouse or printerusually require you to load software files calleddevice drivers into memory before they will work.These software drivers help the computer recognizeand direct the operation of an external device.• Always attach external devices while your computeris turned off. Then turn on the computer beforeturning on any external devices, unless the documen-tation for the device specifies otherwise. (If thecomputer does not seem to recognize the device, tryturning on the device before turning on the computerto see if this resolves the problem.)For information about enabling, disabling, or configuringI/O ports and connectors, see Chapter 4, “Using the Sys-tem Setup Program,” or Chapter 5, “Using the EISAConfiguration Utility.” For detailed descriptions andillustrations of each port and connector on the I/O panel,see Appendix B, “I/O Ports and Connectors.”Preventing Unauthorized AccessInside the ComputerTo prevent unauthorized access to the inside of the com-puter, you can lock the left and right computer covers andhard-disk drives using the keylocks (see Figure 1-2) andthe key provided with the system.Figure 1-2. KeylockIf you are running the Dell HIP server management soft-ware, you can also monitor the intrusion detection alarm.When enabled, this alarm notifies the software when theleft side panel is removed from the system. For moreinformation on the intrusion detection alarm, see yourDell HIP server management documentation.Physically Securing theComputerThe security cable slot lets you attach a commerciallyavailable antitheft device to the computer. Antitheftdevices for personal computers usually include a segmentof metal-stranded cable with an attached locking deviceand associated key. To prevent unauthorized removal ofyour computer, loop the cable around an immovableobject, insert the locking device into the security cableslot on the back of the computer, and lock the device withits associated key. (See Figure 2-1 in the Installation andTroubleshooting Guide for the location of the securitycable slot). Complete instructions for installing this kindof antitheft device are usually included with the device.NOTE: Antitheft devices are of differing designs. Beforepurchasing such a device, make sure it will work with thesecurity cable slot on your computer.Getting HelpIf at any time you don’t understand a procedure describedin this guide, or if your system does not perform asexpected, Dell provides a number of tools to help you.For more information on these help tools, see Chapter 11,“Getting Help,” in the Installation and TroubleshootingGuide.