Lenovo ThinkCentre M82 (English) User Guide - Page 39

Security, Security features

Page 39 highlights

Chapter 4. Security This chapter provides information about how to protect your computer from theft and unauthorized use. Security features The following security features are available on your computer: • Computrace Agent software embedded in firmware The Computrace Agent software is an IT asset management and computer theft recovery solution. The software detects if changes have been made on the computer, such as hardware, software, or the computer call-in location. Note: You might have to purchase a subscription to activate the Computrace Agent software. • Cover presence switch (also called intrusion switch) The cover presence switch prevents your computer from logging in to the operating system when the computer cover is not properly installed or closed. To enable the cover presence switch connector on the system board, to the following: 1. Start the Setup Utility program. See "Starting the Setup Utility program" on page 97. 2. Set the Administrator Password. See "Setting, changing, and deleting a password" on page 98. 3. From the Security submenu, select Chassis Intrusion Detection ➙ Enabled. The cover presence switch connector on the system board is enabled. When the cover presence switch detects that your computer cover is not properly installed or closed when you turn on the computer, an error message will be displayed. To bypass the error message and log in to the operating system, do the following: 1. Properly install or close your computer cover. See "Completing the parts replacement" on page 87. 2. Press F1 to enter the Setup Utility program. Then press F10 to save and exit the Setup Utility program. The error message will not be displayed again. • Ability to enable and disable devices and USB connectors For more information, see "Enabling or disabling a device" on page 99. • Integrated fingerprint reader (available on some models) Depending on the models of your computer, the keyboard may have an integrated fingerprint reader. By enrolling your fingerprint and associating it with a Power-on Password, a Hard Disk Password, or both passwords beforehand, you can start the computer, log on to the system, and enter the Setup Utility program by swiping your finger over the reader, without typing a password. Thus fingerprint authentication can replace passwords and enable simple and secure user access. • Startup sequence control For more information, see "Selecting or changing the startup device sequence" on page 100. • Startup without keyboard or mouse Your computer is able to log in to the operating system without keyboard or mouse connected. • Trusted Platform Module (TPM) Trusted Platform Module is a secure cryptoprocessor that can store cryptographic keys that protect information stored in your computer. © Copyright Lenovo 2012 27

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170

Chapter 4.
Security
This chapter provides information about how to protect your computer from theft and unauthorized use.
Security features
The following security features are available on your computer:
Computrace Agent software embedded in firmware
The Computrace Agent software is an IT asset management and computer theft recovery solution.
The software detects if changes have been made on the computer, such as hardware, software, or
the computer call-in location.
Note:
You might have to purchase a subscription to activate the Computrace Agent software.
Cover presence switch (also called intrusion switch)
The cover presence switch prevents your computer from logging in to the operating system when the
computer cover is not properly installed or closed. To enable the cover presence switch connector
on the system board, to the following:
1. Start the Setup Utility program. See “Starting the Setup Utility program” on page 97.
2. Set the Administrator Password. See “Setting, changing, and deleting a password” on page 98.
3. From the
Security
submenu, select
Chassis Intrusion Detection
Enabled
. The cover presence
switch connector on the system board is enabled.
When the cover presence switch detects that your computer cover is not properly installed or closed
when you turn on the computer, an error message will be displayed. To bypass the error message and
log in to the operating system, do the following:
1. Properly install or close your computer cover. See “Completing the parts replacement” on page 87.
2. Press F1 to enter the Setup Utility program. Then press F10 to save and exit the Setup Utility
program. The error message will not be displayed again.
Ability to enable and disable devices and USB connectors
For more information, see “Enabling or disabling a device” on page 99.
Integrated fingerprint reader (available on some models)
Depending on the models of your computer, the keyboard may have an integrated fingerprint reader.
By enrolling your fingerprint and associating it with a Power-on Password, a Hard Disk Password, or
both passwords beforehand, you can start the computer, log on to the system, and enter the Setup
Utility program by swiping your finger over the reader, without typing a password. Thus fingerprint
authentication can replace passwords and enable simple and secure user access.
Startup sequence control
For more information, see “Selecting or changing the startup device sequence” on page 100.
Startup without keyboard or mouse
Your computer is able to log in to the operating system without keyboard or mouse connected.
Trusted Platform Module (TPM)
Trusted Platform Module is a secure cryptoprocessor that can store cryptographic keys that protect
information stored in your computer.
© Copyright Lenovo 2012
27