Chapter 5. Using the IBM Setup UtilityThe IBM Setup Utility program is stored in the electrically erasable programmableread-only memory (EEPROM) of the computer. The IBM Setup Utility program isused to view and change the configuration settings of the computer, regardless ofwhich operating system you are using. However, the operating-system settingsmight override any similar settings in the IBM Setup Utility program.Starting the IBM Setup Utility programTo start the IBM Setup Utility program, do the following:1. Shut down the operating system and turn off the computer.2. Turn on the computer and look for the following prompt on the logo screen:(To interrupt normal startup, press Enter)Press Enter when you see the prompt.3. When the Access IBM Predesktop Area displays, double click Start setuputility.Note: If an administrator password has been set, the IBM Setup Utilityprogram menu is not display until you type your password.The IBM Setup Utility might start automatically when POST detects that hardwarehas been removed or new hardware has been installed in the computer.Viewing and changing settingsThe IBM Setup Utility program menu lists items that identify system configurationtopics.When working with the IBM Setup Utility program menu, you must use thekeyboard. The keys used to perform various tasks are displayed at the bottom ofeach screen.Exiting from the IBM Setup Utility programWhen you finish viewing or changing settings, press Esc to return to the IBMSetup Utility program menu (you might have to press Esc several times). If youwant to save the new settings, select Save Settings or Save and exit the SetupUtility. Otherwise, your changes will not be saved.Using passwordsYou can use passwords to provide security for the computer and data. There aretwo kinds of passwords: a user password and an administrator password. You donot have to set a password of either type to use the computer. However, if youdecide to set either one, read the following sections.User passwordThe user password feature deters unauthorized persons from gaining access to thecomputer.© Copyright IBM Corp. 2005 19