Chapter 5. Using the IBM Setup Utility
The IBM Setup Utility program is stored in the electrically erasable programmable
read-only memory (EEPROM) of the computer. The IBM Setup Utility program is
used to view and change the configuration settings of the computer, regardless of
which operating system you are using. However, the operating-system settings
might override any similar settings in the IBM Setup Utility program.
Starting the IBM Setup Utility program
To start the IBM Setup Utility program, do the following:
1. Shut down the operating system and turn off the computer.
2. Turn on the computer and look for the following prompt on the logo screen:
(To interrupt normal startup, press Enter)
Press Enter when you see the prompt.
3. When the Access IBM Predesktop Area displays, double click Start setup
utility.
Note: If an administrator password has been set, the IBM Setup Utility
program menu is not display until you type your password.
The
IBM Setup Utility might start automatically when POST detects that hardware
has been removed or new hardware has been installed in the computer.
Viewing and changing settings
The IBM Setup Utility program menu lists items that identify system configuration
topics.
When working with the IBM Setup Utility program menu, you must use the
keyboard. The keys used to perform various tasks are displayed at the bottom of
each screen.
Exiting from the IBM Setup Utility program
When you finish viewing or changing settings, press Esc to return to the IBM
Setup Utility program menu (you might have to press Esc several times). If you
want to save the new settings, select Save Settings or Save and exit the Setup
Utility. Otherwise, your changes will not be saved.
Using passwords
You can use passwords to provide security for the computer and data. There are
two kinds of passwords: a user password and an administrator password. You do
not have to set a password of either type to use the computer. However, if you
decide to set either one, read the following sections.
User password
The user password feature deters unauthorized persons from gaining access to the
computer.
© Copyright IBM Corp. 2005 19