Chapter 4. Security

This chapter provides information about how to protect your computer from theft and unauthorized use.

Security features

The following security features are available on your computer:

Computrace Agent software embedded in firmware

The Computrace Agent software is an IT asset management and computer theft recovery solution. The software detects if changes have been made on the computer, such as hardware, software, or the computer call-in location.

Note: You might have to purchase a subscription to activate the Computrace Agent software.

Cover presence switch (also called intrusion switch)

The cover presence switch prevents your computer from logging in to the operating system when the computer cover is not properly installed or closed. To enable the cover presence switch connector on the system board, to the following:

1.Start the Setup Utility program. See “Starting the Setup Utility program” on page 81.

2.Set the Administrator Password. See “Setting, changing, and deleting a password” on page 82.

3.From the Security submenu, select Chassis Intrusion Detection Enabled. The cover presence switch connector on the system board is enabled.

When the cover presence switch detects that your computer cover is not properly installed or closed when you turn on the computer, an error message will be displayed. To bypass the error message and log in to the operating system, do the following:

1.Properly install or close your computer cover. See “Completing the parts replacement” on page 70.

2.Press F1 to enter the Setup Utility program. Then press F10 to save and exit the Setup Utility program. The error message will not be displayed again.

Ability to enable and disable devices and USB connectors

For more information, see “Enabling or disabling a device” on page 83.

Integrated fingerprint reader (available on some models)

Depending on the models of your computer, the keyboard may have an integrated fingerprint reader. By enrolling your fingerprint and associating it with a Power-on Password, a Hard Disk Password, or both passwords beforehand, you can start the computer, log on to the system, and enter the Setup Utility program by swiping your finger over the reader, without typing a password. Thus fingerprint authentication can replace passwords and enable simple and secure user access.

Startup sequence control

For more information, see “Selecting or changing the startup device sequence” on page 84.

Startup without keyboard or mouse

Your computer is able to log in to the operating system without keyboard or mouse connected.

Trusted Platform Module (TPM)

Trusted Platform Module is a secure cryptoprocessor that can store cryptographic keys that protect information stored in your computer.

© Copyright Lenovo 2012

25

Page 37
Image 37
Lenovo 3596, 3668, 967, 900, 3676, 3654, 3629, 3578, 3594, 3598, 3664, 3660, 1271 manual Security features

1271, 3664, 3629, 3660, 3654 specifications

Lenovo has established a strong presence in the computing market with a diverse lineup of laptops and desktops, catering to various user needs. Among these, the Lenovo 3676, 3578, 3598, 3594, and 3668 models stand out due to their commendable features and specifications.

The Lenovo 3676 is known for its robust performance capabilities, delivering optimal efficiency through high-performance processors. It typically features AMD Ryzen or Intel Core processors, ensuring smooth multitasking and responsiveness. Users can expect a generous amount of RAM, enhancing the device’s capability to handle demanding applications seamlessly. Its storage options often include SSDs, which significantly improve load times and overall system responsiveness.

The 3578 model is tailored for everyday computing tasks, making it ideal for students and professionals alike. This model usually features a sleek design while providing access to modern connectivity options like USB-C, HDMI, and multiple USB ports. Its display often offers vibrant colors and adequate resolution, making it suitable for both work and multimedia consumption.

Next in line, the Lenovo 3598 stands out with its emphasis on gaming and multimedia. It features dedicated graphics options that elevate gaming experiences and video editing tasks. The thermal management system in the 3598 is designed to maintain optimal performance during intensive usage, which is a significant advantage for gamers and content creators.

The 3594 model offers a balance of price and performance. It is designed for users who seek functionality without compromising on quality. The laptop's ergonomic design, combined with a comfortable keyboard and touchpad, enhances the overall user experience. Furthermore, battery life is often extended in this model, allowing for uninterrupted productivity throughout the day.

Lastly, the Lenovo 3668 appeals to those looking for a versatile family device. With features that support multimedia consumption, light gaming, and casual productivity tasks, it is an ideal choice for households. Its expansive storage options, coupled with a user-friendly interface, make it accessible for users of all ages.

In summary, the Lenovo 3676, 3578, 3598, 3594, and 3668 models each offer unique features tailored to different segments of the market. Whether for gaming, everyday use, or family activities, Lenovo continues to innovate and provide tailored solutions that appeal to a broad audience. With their impressive specifications and robust performance, these models reinforce Lenovo's reputation as a reliable brand in the computing landscape.