Chapter 4. Security

This chapter provides information about how to protect your computer from theft and unauthorized use.

Security features

The following security features are available on your computer:

Computrace Agent software embedded in firmware

The Computrace Agent software is an IT asset management and computer theft recovery solution. The software detects if changes have been made on the computer, such as hardware, software, or the computer call-in location.

Note: You might have to purchase a subscription to activate the Computrace Agent software.

Cover presence switch (also called intrusion switch)

The cover presence switch prevents your computer from logging in to the operating system when the computer cover is not properly installed or closed. To enable the cover presence switch connector on the system board, to the following:

1.Start the Setup Utility program. See “Starting the Setup Utility program” on page 89.

2.Set the Administrator Password. See “Setting, changing, and deleting a password” on page 90.

3.From the Security submenu, select Chassis Intrusion Detection Enabled. The cover presence switch connector on the system board is enabled.

When the cover presence switch detects that your computer cover is not properly installed or closed when you turn on the computer, an error message will be displayed. To bypass the error message and log in to the operating system, do the following:

1.Properly install or close your computer cover. See “Completing the parts replacement” on page 79.

2.Press F1 to enter the Setup Utility program. Then press F10 to save and exit the Setup Utility program. The error message will not be displayed again.

Ability to enable and disable devices and USB connectors

For more information, see “Enabling or disabling a device” on page 91.

Integrated fingerprint reader (available on some models)

Depending on the models of your computer, the keyboard may have an integrated fingerprint reader. By enrolling your fingerprint and associating it with a Power-on Password, a Hard Disk Password, or both passwords beforehand, you can start the computer, log on to the system, and enter the Setup Utility program by swiping your finger over the reader, without typing a password. Thus fingerprint authentication can replace passwords and enable simple and secure user access.

Startup sequence control

For more information, see “Selecting or changing the startup device sequence” on page 92.

Startup without keyboard or mouse

Your computer is able to log in to the operating system without keyboard or mouse connected.

Trusted Platform Module (TPM)

Trusted Platform Module is a secure cryptoprocessor that can store cryptographic keys that protect information stored in your computer.

© Copyright Lenovo 2012

27

Page 39
Image 39
Lenovo 1765, 2112, 2111, 2110, 2011, 1663, 1565, 1662, 1562, 1766 manual Security features

1765, 1766, 1562, 1662, 1565 specifications

Lenovo has long been recognized as a leader in the technology space, producing a variety of reliable laptops and computing devices. Among their offerings, the Lenovo models 2110, 2111, 1565, 1662, and 1562 stand out for their unique features, technologies, and characteristics that cater to a range of users, from professionals to students.

The Lenovo 2110 is designed with portability in mind. Weighing just under 4 pounds, it provides an Intel Core processor that allows for seamless multitasking. The 15.6-inch HD display ensures vibrant visuals, making it ideal for presentations and streaming. One of its notable features is the long-lasting battery life, capable of supporting up to 10 hours of usage, allowing users to work or play without constant recharging.

The Lenovo 2111 builds on the foundation of the 2110 with enhanced graphics performance. This model is equipped with a dedicated NVIDIA GeForce graphics card, which significantly improves the performance of graphic-intensive applications and gaming. The 2111 also supports a wider range of RAM options, enabling users to configure it to suit their memory needs, thus improving overall efficiency and responsiveness.

The Lenovo 1565 is tailored for business professionals. It features a robust design with a spill-resistant keyboard, ensuring durability in various environments. The 1565 is also equipped with advanced security features, including a fingerprint reader, which adds an additional layer of protection for sensitive business data. This model's integrated webcam and high-quality microphone facilitate clear video conferencing, enhancing communication for remote work scenarios.

The Lenovo 1662 comes with a unique 2-in-1 capability, functioning both as a laptop and a tablet. Its touchscreen display allows for easy navigation and interaction, making it suitable for creative professionals who utilize styluses for design work. The flexibility of the 1662 is complemented by its powerful Intel processor, giving users the performance needed for demanding applications.

Lastly, the Lenovo 1562 model is designed for education and everyday use. Its focus on affordability does not compromise performance, featuring a reliable AMD processor and sufficient RAM for tasks like web browsing, document editing, and online learning. The 1562's lightweight design and durable construction make it an excellent choice for students and individuals on the go.

Together, these Lenovo models present a diverse lineup catering to various user needs. From powerful gaming capabilities to business-class features and educational tools, Lenovo continues to innovate with its laptops, ensuring they stay relevant in an ever-evolving technology landscape.