Chapter 4. Security

This chapter provides information about how to protect your computer from theft and unauthorized use.

Security features

The following security features are available on your computer:

Computrace Agent software embedded in firmware

The Computrace Agent software is an IT asset management and computer theft recovery solution. The software detects if changes have been made on the computer, such as hardware, software, or the computer call-in location.

Note: You might have to purchase a subscription to activate the Computrace Agent software.

Cover presence switch (also called intrusion switch)

The cover presence switch prevents your computer from logging in to the operating system when the computer cover is not properly installed or closed. To enable the cover presence switch connector on the system board, to the following:

1.Start the Setup Utility program. See “Starting the Setup Utility program” on page 75.

2.Set the Administrator Password. See “Setting, changing, and deleting a password” on page 76.

3.From the Security submenu, select Chassis Intrusion Detection Enabled. The cover presence switch connector on the system board is enabled.

When the cover presence switch detects that your computer cover is not properly installed or closed when you turn on the computer, an error message will be displayed. To bypass the error message and log in to the operating system, do the following:

1.Properly install or close your computer cover. See “Completing the parts replacement” on page 65.

2.Press F1 to enter the Setup Utility program. Then press F10 to save and exit the Setup Utility program. The error message will not be displayed again.

Ability to enable and disable devices and USB connectors

For more information, see “Enabling or disabling a device” on page 77.

Integrated fingerprint reader (available on some models)

Depending on the models of your computer, the keyboard may have an integrated fingerprint reader. By enrolling your fingerprint and associating it with a Power-on Password, a Hard Disk Password, or both passwords beforehand, you can start the computer, log on to the system, and enter the Setup Utility program by swiping your finger over the reader, without typing a password. Thus fingerprint authentication can replace passwords and enable simple and secure user access.

Startup sequence control

For more information, see “Selecting or changing the startup device sequence” on page 78.

Startup without keyboard or mouse

Your computer is able to log in to the operating system without keyboard or mouse connected.

Trusted Platform Module (TPM)

Trusted Platform Module is a secure cryptoprocessor that can store cryptographic keys that protect information stored in your computer.

© Copyright Lenovo 2011

25

Page 37
Image 37
Lenovo 5032, 4167, 385, 4164, 5070, 5049, 7518, 5035, 5025, 267 manual Security features

4164, 385, 267, 4167, 5070 specifications

Lenovo has established itself as a leader in the technology sector, consistently delivering innovative products that cater to various user needs. Among its vast offerings, the models 5032, 7518, 5049, 5035, and 5025 are noteworthy for their unique features, advanced technologies, and robust performance.

The Lenovo 5032 is known for its versatility and reliability. It boasts a powerful processor that handles multitasking with ease, making it ideal for both office use and gaming. With a high-resolution display, users can enjoy vibrant visuals, which is perfect for graphic-intensive tasks. Its lightweight design and long battery life enhance portability, allowing users to work or play on the go without frequent recharging.

The 7518 model stands out with its cutting-edge security features. Equipped with a fingerprint scanner and advanced encryption technologies, it ensures that users' data remains protected against unauthorized access. The device also includes a stunning display and exceptional audio output, catering to media consumption and conference calls. Its robust build quality makes it suitable for both home and professional environments.

The Lenovo 5049 focuses on user comfort and connectivity. Featuring a full-size keyboard with ergonomic design, it offers a pleasant typing experience for prolonged use. The model is also equipped with multiple USB ports and connectivity options, allowing users to connect various peripherals seamlessly. Additionally, integrated Wi-Fi 6 support ensures faster internet speeds and improved online experiences.

With the 5035 model, Lenovo emphasizes entertainment and gaming performance. Packed with a dedicated graphics card, it offers excellent graphical performance and is suitable for casual gaming as well as media creation. The high refresh rate display on this model enhances gameplay and visual fidelity, providing users with an immersive experience. Its enhanced thermal management system keeps the device cool during intensive use, ensuring sustained performance.

Lastly, the 5025 model is designed for budget-conscious consumers who do not want to compromise on essential features. It offers reliable performance for everyday tasks, such as browsing, document editing, and streaming. Its compact form factor is ideal for users with limited desk space, while its energy-efficient components ensure longer battery life, making it an excellent choice for students and professionals alike.

In summary, Lenovo's 5032, 7518, 5049, 5035, and 5025 models each bring distinct advantages tailored to different user needs, making them formidable choices in today's technology landscape. Their emphasis on performance, security, and user experience underscores Lenovo's commitment to quality and innovation.