Chapter 4. Security

This chapter provides information about how to protect your computer from theft and unauthorized use.

Security features

The following security features are available on your computer:

Computrace Agent software embedded in firmware

The Computrace Agent software is an IT asset management and computer theft recovery solution. The software detects if changes have been made on the computer, such as hardware, software, or the computer call-in location.

Note: You might have to purchase a subscription to activate the Computrace Agent software.

Cover presence switch (also called intrusion switch)

The cover presence switch prevents your computer from logging in to the operating system when the computer cover is not properly installed or closed. To enable the cover presence switch connector on the system board, to the following:

1.Start the Setup Utility program. See “Starting the Setup Utility program” on page 71.

2.Set the Administrator Password. See “Setting, changing, and deleting a password” on page 72.

3.From the Security submenu, select Chassis Intrusion Detection Enabled. The cover presence switch connector on the system board is enabled.

When the cover presence switch detects that your computer cover is not properly installed or closed when you turn on the computer, an error message will be displayed. To bypass the error message and log in to the operating system, do the following:

1.Properly install or close your computer cover. See “Completing the parts replacement” on page 61.

2.Press F1 to enter the Setup Utility program. Then press F10 to save and exit the Setup Utility program. The error message will not be displayed again.

Ability to enable and disable devices and USB connectors

For more information, see “Enabling or disabling a device” on page 73.

Integrated fingerprint reader (available on some models)

Depending on the models of your computer, the keyboard may have an integrated fingerprint reader. By enrolling your fingerprint and associating it with a Power-on Password, a Hard Disk Password, or both passwords beforehand, you can start the computer, log on to the system, and enter the Setup Utility program by swiping your finger over the reader, without typing a password. Thus fingerprint authentication can replace passwords and enable simple and secure user access.

Startup sequence control

For more information, see “Selecting or changing the startup device sequence” on page 74.

Startup without keyboard or mouse

Your computer is able to log in to the operating system without keyboard or mouse connected.

Trusted Platform Module (TPM)

Trusted Platform Module is a secure cryptoprocessor that can store cryptographic keys that protect information stored in your computer.

© Copyright Lenovo 2012

27

Page 39
Image 39
Lenovo 2553, 2551, 2552, 2555, 2554 manual Security features

2552, 2555, 2553, 2554, 2551 specifications

Lenovo has a renowned history of delivering reliable and innovative technology solutions, with its 2550 series comprising the models 2551, 2552, 2553, 2554, and 2555 standing as significant entrants in the competitive PC landscape. These models cater to a diverse range of user needs, from everyday tasks to more specialized applications, reflecting Lenovo’s commitment to providing versatile computing options.

The Lenovo 2551 is designed with an emphasis on performance and efficiency. This model features an Intel processor that boasts robust processing power, making it ideal for multitasking and demanding applications. It is equipped with a high-resolution display, offering sharp and vivid visuals that enhance the user experience, whether for work or leisure.

Moving on to the Lenovo 2552, this version highlights a sleek and modern design, emphasizing portability without sacrificing performance. It includes advanced connectivity options, ensuring users stay connected with ease. The 2552 also integrates Lenovo’s latest thermal technology, which helps maintain optimal performance by keeping the system cool during intensive use.

The Lenovo 2553 emphasizes security and durability. This model incorporates Lenovo’s Advanced Security features, such as biometric verification and robust encryption, safeguarding user data against unauthorized access. Moreover, its rugged build quality ensures it can withstand the rigors of daily use, making it suitable for both office environments and on-the-go professionals.

The Lenovo 2554 further elevates the series with enhanced graphics capabilities, making it a choice model for creative professionals who require superior visual performance. This version supports a variety of high-end graphical tasks, aligning with the growing demand for graphic-intensive applications in design and multimedia fields.

Finally, the Lenovo 2555 rounds out the series with a strong focus on sustainability and energy efficiency. It incorporates eco-friendly materials and is designed to consume less power, contributing to reduced environmental impact. This model not only meets performance expectations but also aligns with Lenovo’s vision for sustainable innovation.

In summary, the Lenovo 2551, 2552, 2553, 2554, and 2555 each bring unique features and technologies that cater to various user needs. From robust performance and security to enhanced graphics and sustainability, this series embodies Lenovo’s commitment to providing cutting-edge solutions that enable users to thrive in a tech-driven world.