LANClient Control Manager (LCCM). . . . . . . . . . . . . 22System Migration Assistant (SMA). . . . . . . . . . . . . . 23Desktop Management Interface . . . . . . . . . . . . . . . 23Using security features . . . . . . . . . . . . . . . . . . 23Anti-intrusion features. . . . . . . . . . . . . . . . . . 23Component protection . . . . . . . . . . . . . . . . . . 23Asset ID capability . . . . . . . . . . . . . . . . . . . 24IBM security solutions . . . . . . . . . . . . . . . . . . 24Data protection . . . . . . . . . . . . . . . . . . . . 25SMART hard disk drive . . . . . . . . . . . . . . . . 25SMART Reaction . . . . . . . . . . . . . . . . . . 25Virus protection . . . . . . . . . . . . . . . . . . . 25Enhanced Security . . . . . . . . . . . . . . . . . . 25Locking the keyboard . . . . . . . . . . . . . . . . . . 25Shutting down . . . . . . . . . . . . . . . . . . . . . 26Taking care of your computer . . . . . . . . . . . . . . . . 26Basics . . . . . . . . . . . . . . . . . . . . . . . 26Cleaning your computer . . . . . . . . . . . . . . . . . 26Computer and keyboard . . . . . . . . . . . . . . . . 27Monitor screen . . . . . . . . . . . . . . . . . . . 27Mouse . . . . . . . . . . . . . . . . . . . . . . 27Moving your computer . . . . . . . . . . . . . . . . . 28Chapter 4. Using the Configuration/Setup Utility program . . . . . . 29Starting and using the Configuration/Setup Utility program . . . . . . 29Viewing and changing settings . . . . . . . . . . . . . . . 30Exiting from the Configuration/Setup Utility program . . . . . . . 31Using System Security . . . . . . . . . . . . . . . . . . . 31Using Enhanced Security . . . . . . . . . . . . . . . . . 31Using Security Profiles by Device . . . . . . . . . . . . . . 32Setting Remote Administration . . . . . . . . . . . . . . . 33Using passwords . . . . . . . . . . . . . . . . . . . 34Using a power-on password . . . . . . . . . . . . . . . 34Setting, changing, and deleting a power-on password . . . . . . 35Using an administrator password . . . . . . . . . . . . . 36Setting, deleting, or changing an administrator password . . . . . 36Erasing a lost or forgotten password (clearing CMOS) . . . . . . 37Using Adapter ROM security . . . . . . . . . . . . . . . 37Using the IBM Embedded Security Chip. . . . . . . . . . . . 37Enabling the Pentium III processor serial number feature . . . . . . . 38Other settings in the Configuration/Setup Utility program . . . . . . 38Changing keyboard speed . . . . . . . . . . . . . . . . 38Changing the primary startup sequence . . . . . . . . . . . 38Enabling the Error Startup Sequence . . . . . . . . . . . . 39Power-management features . . . . . . . . . . . . . . . . 39ACPI BIOS IRQ . . . . . . . . . . . . . . . . . . . 39ACPI Standby Mode . . . . . . . . . . . . . . . . . 40xii User Guide