Chapter 4. Security

This chapter provides information about how to protect your computer from theft and unauthorized use.

Security features

The following security features are available on your computer:

Computrace Agent software embedded in firmware

The Computrace Agent software is an IT asset management and computer theft recovery solution. The software detects if changes have been made on the computer, such as hardware, software, or the computer call-in location.

Note: You might have to purchase a subscription to activate the Computrace Agent software.

Cover presence switch (also called intrusion switch)

The cover presence switch prevents your computer from logging in to the operating system when the computer cover is not properly installed or closed. To enable the cover presence switch connector on the system board, to the following:

1.Start the Setup Utility program. See “Starting the Setup Utility program” on page 83.

2.Set the Administrator Password. See “Setting, changing, and deleting a password” on page 84.

3.From the Security submenu, select Chassis Intrusion Detection Enabled. The cover presence switch connector on the system board is enabled.

When the cover presence switch detects that your computer cover is not properly installed or closed when you turn on the computer, an error message will be displayed. To bypass the error message and log in to the operating system, do the following:

1.Properly install or close your computer cover. See “Completing the parts replacement” on page 73.

2.Press F1 to enter the Setup Utility program. Then press F10 to save and exit the Setup Utility program. The error message will not be displayed again.

Ability to enable and disable devices and USB connectors

For more information, see “Enabling or disabling a device” on page 85.

Integrated fingerprint reader (available on some models)

Depending on the models of your computer, the keyboard may have an integrated fingerprint reader. By enrolling your fingerprint and associating it with a Power-on Password, a Hard Disk Password, or both passwords beforehand, you can start the computer, log on to the system, and enter the Setup Utility program by swiping your finger over the reader, without typing a password. Thus fingerprint authentication can replace passwords and enable simple and secure user access.

Startup sequence control

For more information, see “Selecting or changing the startup device sequence” on page 86.

Startup without keyboard or mouse

Your computer is able to log in to the operating system without keyboard or mouse connected.

Trusted Platform Module (TPM)

Trusted Platform Module is a secure cryptoprocessor that can store cryptographic keys that protect information stored in your computer.

© Copyright Lenovo 2012

33

Page 45
Image 45
Lenovo 3341, 3281, 3280, 3297, 3305, 3296, 3298, 3292, 3291, 3294, 3293, 3311, 3314, 3309, 3312, 3313, 3342, 3327 Security features

3324, 3342, 3314F2U, 3293, 3280 specifications

The Lenovo 3294, 3314, 3311, 3297, and 3298 series are designed to cater to various user preferences, providing innovative technology and diverse features suitable for different environments, whether for personal use, education, or business.

The Lenovo 3294 model stands out with its compact design, making it perfect for users seeking a portable solution. It typically comes equipped with a robust processor, ensuring efficient performance for everyday tasks like browsing, document editing, and multimedia consumption. A notable feature in this model is its energy-efficient display, providing vibrant visuals and extending battery life, making it an ideal companion for on-the-go professionals.

The Lenovo 3314 introduces enhanced connectivity options, including multiple USB ports and HDMI output, allowing seamless connection to external devices such as projectors and additional monitors. This model emphasizes user ergonomics, often featuring a backlit keyboard and precision touchpad, which enhance the typing experience and improve productivity, especially in low-light conditions.

Meanwhile, the Lenovo 3311 focuses on multimedia capabilities with improved audio systems, providing an immersive experience whether for gaming, watching movies, or listening to music. It also showcases advanced thermal management technology, ensuring that the system remains cool during heavy usage, thus enhancing performance and longevity.

The Lenovo 3297 and 3298 are geared towards enterprise users, featuring enhanced security options such as fingerprint readers and Trusted Platform Module (TPM) for data protection. These models often include robust processors suitable for heavier computational tasks, making them perfect for business applications. Additionally, larger storage options ensure that users have ample space for their files, whether for applications or multimedia content.

All models share certain characteristics, such as reliable build quality and Lenovo's commitment to customer satisfaction. They often come pre-loaded with Lenovo Vantage, a user-friendly application that helps manage system settings, updates, and warranty information effortlessly.

In conclusion, the Lenovo 3294, 3314, 3311, 3297, and 3298 series have been tailored to meet specific user needs, whether it be for performance, portability, or multimedia capabilities. With their innovative features and technologies, these models represent Lenovo's dedication to providing high-quality devices for a diverse range of applications. Whether for casual use, education, or business, there is a suitable option within this versatile lineup.