BIOS Security

There are several features available in modern BIOS that can be configured to help prevent malicious attacks on a PC. These include Boot Sector Virus Protection, BIOS Password, and BIOS Boot Sequence.

Note: To enter the BIOS setup screen restart the PC and watch for a message that tells you which key to press. e.g. Press [key] to enter setup. You'll need to press the indicated key while the message is still visible.

Boot Sector Virus Protection

When this feature is enabled it prevents anything from being written to the boot sector. This protects the boot sector from malware and virus infections. However, if you are installing an operating system, or upgrading the operating system, this feature should be disabled until the installation is complete. Also, if the boot sector does get damaged, having this feature enabled will prevent diagnostic and repair utilities from functioning.

BIOS Password

A password can be enabled in the BIOS that prevents unauthorized people from changing the BIOS settings. You can configure the BIOS to ask for that password every time the system boots. On a desktop PC it is fairly easy to reset the BIOS password, just open the case and there's a jumper near the BIOS battery on the motherboard that can be moved to remove the password. However, a laptop PC is more difficult to take apart and put back together, making the BIOS password a good way of protecting your laptop from unauthorized use.

BIOS Boot Sequence

If an unauthorized person can boot from a removable drive, such as a floppy disk, CD, CVD, or USB device, they can use repair and recovery utilities to reconfigure and gain access to the system. So, in addition to configuring the passwords described above, you should configure the BIOS boot sequence to boot from the hard disk first.

Be aware that if you configure all the BIOS security features mentioned here you will not only protect the system from malicious attacks, but if you lose a password or need to use recovery utilities yourself, you may be unable to gain access to the system.

Learn more at

More Windows Administration Information:
• Six Steps to Get and Keep Your Computer Running at Full Speed
• Computer Architecture, Main Memory, and the CISSP Exam
• Encryption, Designed to Protect Data, is Internet Criminal's Best Tool
• Fundamentals of Windows Security
• Root Kit - The Hackers Backdoor to Your Computer
• No Software on the Market Removes All Spyware
• How Many Spyware Items Are Slowing Down Your Computer?
• Five Things You Can Do To Improve Your Company's Security
• The Seven Most Common Methods of Cyber Attacks
• Smart Card