Preventing Unauthorized Access Inside The Computer; Physically Securing The Computer; Getting Help; Figure 1-2. Keylock - Dell PowerEdge 4200 Series User Manual

Dell poweredge 4200 servers: user guide
Hide thumbs Also See for PowerEdge 4200 Series:
Table of Contents
your system. When connecting external devices to your
computer, follow these guidelines:
Check the documentation that accompanied the
device for specific installation and configuration
instructions.
For example, most devices must be connected to a
particular I/O port or connector to operate properly.
Also, external devices such as a mouse or printer
usually require you to load software files called
device drivers into memory before they will work.
These software drivers help the computer recognize
and direct the operation of an external device.
Always attach external devices while your computer
is turned off. Then turn on the computer before
turning on any external devices, unless the documen-
tation for the device specifies otherwise. (If the
computer does not seem to recognize the device, try
turning on the device before turning on the computer
to see if this resolves the problem.)
For information about enabling, disabling, or configuring
I/O ports and connectors, see Chapter 4, "Using the Sys-
tem Setup Program," or Chapter 5, "Using the EISA
Configuration Utility." For detailed descriptions and
illustrations of each port and connector on the I/O panel,
see Appendix B, "I/O Ports and Connectors."
P
reventing Unauthorized Access
Inside the Computer
To prevent unauthorized access to the inside of the com-
puter, you can lock the left and right computer covers and
hard-disk drives using the keylocks (see Figure 1-2) and
the key provided with the system.

Figure 1-2. Keylock

1-4
Dell PowerEdge 4200 Systems User's Guide
If you are running the Dell HIP server management soft-
ware, you can also monitor the intrusion detection alarm.
When enabled, this alarm notifies the software when the
left side panel is removed from the system. For more
information on the intrusion detection alarm, see your
Dell HIP server management documentation.
P
hysically Securing the
Computer
The security cable slot lets you attach a commercially
available antitheft device to the computer. Antitheft
devices for personal computers usually include a segment
of metal-stranded cable with an attached locking device
and associated key. To prevent unauthorized removal of
your computer, loop the cable around an immovable
object, insert the locking device into the security cable
slot on the back of the computer, and lock the device with
its associated key. (See Figure 2-1 in the Installation and
Troubleshooting Guide for the location of the security
cable slot). Complete instructions for installing this kind
of antitheft device are usually included with the device.
NOTE: Antitheft devices are of differing designs. Before
purchasing such a device, make sure it will work with the
security cable slot on your computer.
G
etting Help
If at any time you don't understand a procedure described
in this guide, or if your system does not perform as
expected, Dell provides a number of tools to help you.
For more information on these help tools, see Chapter 11,
"Getting Help," in the Installation and Troubleshooting
Guide.
Table of Contents
loading

Table of Contents