Chapter 4. Security

This chapter provides information about how to protect your computer from theft and unauthorized use.

Security features

The following security features are available on your computer:

Computrace Agent software embedded in firmware

The Computrace Agent software is an IT asset management and computer theft recovery solution. The software detects if changes have been made on the computer, such as hardware, software, or the computer call-in location.

Note: You might have to purchase a subscription to activate the Computrace Agent software.

Cover presence switch (also called intrusion switch)

The cover presence switch prevents your computer from logging in to the operating system when the computer cover is not properly installed or closed. To enable the cover presence switch connector on the system board, to the following:

1.Start the Setup Utility program. See “Starting the Setup Utility program” on page 81.

2.Set the Administrator Password. See “Setting, changing, and deleting a password” on page 82.

3.From the Security submenu, select Chassis Intrusion Detection Enabled. The cover presence switch connector on the system board is enabled.

When the cover presence switch detects that your computer cover is not properly installed or closed when you turn on the computer, an error message will be displayed. To bypass the error message and log in to the operating system, do the following:

1.Properly install or close your computer cover. See “Completing the parts replacement” on page 71.

2.Press F1 to enter the Setup Utility program. Then press F10 to save and exit the Setup Utility program. The error message will not be displayed again.

Ability to enable and disable devices and USB connectors

For more information, see “Enabling or disabling a device” on page 83.

Integrated fingerprint reader (available on some models)

Depending on the models of your computer, the keyboard may have an integrated fingerprint reader. By enrolling your fingerprint and associating it with a Power-on Password, a Hard Disk Password, or both passwords beforehand, you can start the computer, log on to the system, and enter the Setup Utility program by swiping your finger over the reader, without typing a password. Thus fingerprint authentication can replace passwords and enable simple and secure user access.

Startup sequence control

For more information, see “Selecting or changing the startup device sequence” on page 84.

Startup without keyboard or mouse

Your computer is able to log in to the operating system without keyboard or mouse connected.

Trusted Platform Module (TPM)

Trusted Platform Module is a secure cryptoprocessor that can store cryptographic keys that protect information stored in your computer.

© Copyright Lenovo 2012

27

Page 39
Image 39
Lenovo 3693, 3695, 3688, 3690, 3691 manual Security features

3691, 3690, 3695, 3688, 3693 specifications

Lenovo, a prominent player in the global computing market, has introduced a series of innovative products, including models such as the Lenovo 3693, 3688, 3695, 3690, and 3691. These models showcase advanced features and technologies that cater to diverse user needs, from everyday tasks to more demanding applications.

The Lenovo 3693 is known for its robust performance and sleek design. It features a powerful processor that enables multitasking with ease. The high-resolution display provides vibrant visuals, making it an ideal choice for both work and entertainment. Additionally, it includes various connectivity options, including USB-C and Thunderbolt, facilitating high-speed data transfers and efficient connection to peripherals.

Model 3688 stands out for its energy efficiency and portability. With a lightweight chassis, it is designed for users on the go. This model incorporates Lenovo's Smart Power technology, which optimizes battery usage, extending the laptop's runtime. The 3688 also offers a comfortable keyboard and precision touchpad, making it a great option for users who require a reliable device for typing and navigation.

The Lenovo 3695 is tailored for gaming enthusiasts, equipped with a dedicated graphics card that delivers stunning visuals and smooth gameplay. It features advanced cooling technology to ensure optimal performance during extended gaming sessions. The customizable RGB keyboard adds a personalized touch, allowing gamers to enhance their experience with vibrant lighting effects.

Lenovo 3690 focuses on business professionals, providing enhanced security features such as a fingerprint reader and privacy shutter for the webcam. The robust build quality ensures durability, while the high-performance specs support resource-intensive applications. Moreover, Lenovo’s proprietary software solutions enhance productivity, allowing users to manage their tasks efficiently.

Finally, the Lenovo 3691 offers an excellent blend of performance and affordability, making it suitable for students and budget-conscious users. It comes with a reliable processor and ample storage space, perfect for handling everyday applications like web browsing, document creation, and media consumption.

In summary, Lenovo’s series of models 3693, 3688, 3695, 3690, and 3691 cater to a wide range of users, combining advanced features, modern design, and cutting-edge technologies. Whether for gaming, business, or casual use, these models ensure a seamless computing experience tailored to individual needs.