Chapter 4. Security

This chapter provides information about how to protect your computer from theft and unauthorized use.

Security features

The following security features are available on your computer:

Computrace Agent software embedded in firmware

The Computrace Agent software is an IT asset management and computer theft recovery solution. The software detects if changes have been made on the computer, such as hardware, software, or the computer call-in location.

Note: You might have to purchase a subscription to activate the Computrace Agent software.

Cover presence switch (also called intrusion switch)

The cover presence switch prevents your computer from logging in to the operating system when the computer cover is not properly installed or closed. To enable the cover presence switch connector on the system board, to the following:

1.Start the Setup Utility program. See “Starting the Setup Utility program” on page 77.

2.Set the Administrator Password. See “Setting, changing, and deleting a password” on page 78.

3.From the Security submenu, select Chassis Intrusion Detection Enabled. The cover presence switch connector on the system board is enabled.

When the cover presence switch detects that your computer cover is not properly installed or closed when you turn on the computer, an error message will be displayed. To bypass the error message and log in to the operating system, do the following:

1.Properly install or close your computer cover. See “Completing the parts replacement” on page 67.

2.Press F1 to enter the Setup Utility program. Then press F10 to save and exit the Setup Utility program. The error message will not be displayed again.

Ability to enable and disable devices and USB connectors

For more information, see “Enabling or disabling a device” on page 79.

Integrated fingerprint reader (available on some models)

Depending on the models of your computer, the keyboard may have an integrated fingerprint reader. By enrolling your fingerprint and associating it with a Power-on Password, a Hard Disk Password, or both passwords beforehand, you can start the computer, log on to the system, and enter the Setup Utility program by swiping your finger over the reader, without typing a password. Thus fingerprint authentication can replace passwords and enable simple and secure user access.

Startup sequence control

For more information, see “Selecting or changing the startup device sequence” on page 80.

Startup without keyboard or mouse

Your computer is able to log in to the operating system without keyboard or mouse connected.

Trusted Platform Module (TPM)

Trusted Platform Module is a secure cryptoprocessor that can store cryptographic keys that protect information stored in your computer.

© Copyright Lenovo 2012

27

Page 39
Image 39
Lenovo 3593, 3675, 896, 3665, 3662, 3655, 3634, 3597, 3617, 3595, 3498, 2116, 1112, 0958B2U manual Security features

3595, 3662, 896, 3675, 3665 specifications

The Lenovo 3498, 958, 3634, 1112, and 3655 series are a testament to the brand's commitment to delivering high-quality computing solutions tailored to diverse user needs. Each model in this series brings a unique set of features and technologies that cater to professionals, students, and casual users alike.

Starting with the Lenovo 3498, this model is designed for efficiency and performance. It is equipped with a powerful processor that ensures smooth multitasking, facilitating productivity in demanding applications. The 3498 also boasts a vibrant display that enhances the visual experience, making it ideal for tasks such as graphic design and media consumption. With ergonomic design features such as a comfortable keyboard and a responsive touchpad, users can expect a seamless operating experience.

Next, the Lenovo 958 model stands out for its portable yet robust design. It features advanced battery technology, which allows for extended usage time without frequent recharges, making it perfect for users who are constantly on the go. The 958 is also equipped with a high-definition camera and advanced audio technology, providing clear video conferencing capabilities, which is essential for remote work and virtual meetings.

The Lenovo 3634 model enhances user interaction with a touch-sensitive display, allowing for intuitive navigation and control. This feature is particularly beneficial for creative professionals who require precision and flexibility in their work. Coupled with strong hardware specifications, the 3634 ensures that users can run demanding software seamlessly.

The 1112 model brings added versatility with its 2-in-1 design, allowing users to switch effortlessly between laptop and tablet modes. This dual functionality is ideal for users who appreciate the flexibility of both formats, whether they are sketching ideas or drafting documents. The 1112 also incorporates Lenovo’s latest connectivity options, including fast Wi-Fi and Bluetooth, ensuring that users can stay connected at all times.

Lastly, the Lenovo 3655 focuses on delivering superior graphics performance, making it an excellent choice for gaming enthusiasts and creative professionals alike. The integration of advanced GPU technology enhances rendering speeds and visual quality, thus catering to users who rely on high-performance graphics.

In summary, the Lenovo 3498, 958, 3634, 1112, and 3655 models showcase Lenovo's dedication to innovation and quality. Each model caters to specific user requirements, ensuring that there's a suitable option for varied computing needs. Whether for work, entertainment, or creative pursuits, Lenovo continues to lead the way in providing versatile and powerful computing solutions.