Chapter 4. Security

This chapter provides information about how to protect your computer from theft and unauthorized use.

Security features

The following security features are available on your computer:

Computrace Agent software embedded in firmware

The Computrace Agent software is an IT asset management and computer theft recovery solution. The software detects if changes have been made on the computer, such as hardware, software, or the computer call-in location.

Note: You might have to purchase a subscription to activate the Computrace Agent software.

Cover presence switch (also called intrusion switch) (only available on some models)

The cover presence switch prevents your computer from logging in to the operating system when the computer cover is not properly installed or closed. To enable the cover presence switch connector on the system board, to the following:

1.Start the Setup Utility program. See “Starting the Setup Utility program” on page 67.

2.Set the Administrator Password. See “Setting, changing, and deleting a password” on page 68.

3.From the Security submenu, select Chassis Intrusion Detection Enabled. The cover presence switch connector on the system board is enabled.

When the cover presence switch detects that your computer cover is not properly installed or closed when you turn on the computer, an error message will be displayed. To bypass the error message and log in to the operating system, do the following:

1.Properly install or close your computer cover. See “Completing the parts replacement” on page 56.

2.Press F1 to enter the Setup Utility program. Then press F10 to save and exit the Setup Utility program. The error message will not be displayed again.

Ability to enable and disable devices and USB connectors

For more information, see “Enabling or disabling a device” on page 69.

Startup sequence control

For more information, see “Selecting or changing the startup device sequence” on page 70.

Startup without keyboard or mouse

Your computer is able to log in to the operating system without keyboard or mouse connected.

Trusted Platform Module (TPM)

Trusted Platform Module is a secure cryptoprocessor that can store cryptographic keys that protect information stored in your computer.

Locking the computer cover

Locking the computer cover helps prevent unauthorized people from gaining access to the inside of your

computer. A keylock 1 comes with this product built into the computer cover. The keys 2 for the cover are attached to the rear of the machine. For security, store the keys in a secure place when you are not using them.

© Copyright Lenovo 2012

23

Page 35
Image 35
Lenovo 4229, 4223, 4228 manual Security features, Locking the computer cover

4229, 4223, 4228 specifications

Lenovo has long been recognized for its commitment to producing high-quality computing solutions, and the ThinkPad line is no exception. Among its various models, the Lenovo ThinkPad series 4228, 4223, and 4229 stand out for their robust features and reliable performance, making them ideal choices for business and professional use.

The Lenovo ThinkPad 4228 series is engineered with a focus on durability and performance. One of its key features is the powerful Intel Core processor range, which ensures that users can manage demanding applications and multitask efficiently. Alongside this, the device typically comes equipped with ample RAM, providing speed and responsiveness that enhances productivity.

Moving to the ThinkPad 4223, it streamlines user experience with advanced connectivity options. The inclusion of multiple USB ports, HDMI, and Ethernet capabilities allows for seamless integration with various devices and networks. The 4223 model often houses a backlit keyboard, enabling users to work effortlessly in low-light environments. This model puts a strong emphasis on portability, making it a reliable companion for professionals on the move.

The ThinkPad 4229 takes connectivity a step further by offering options like Wi-Fi 6 and Bluetooth, ensuring fast and stable connections whether in the office or on the go. This model is often equipped with a higher resolution display, contributing to a better viewing experience for video conferencing and presentations. Its extended battery life is a notable feature, allowing users to remain productive without the constant need for recharging.

All three models in the 422x series boast Lenovo’s robust security features, including fingerprint readers and TPM (Trusted Platform Module), which safeguard sensitive data against unauthorized access. Furthermore, the reputation of Lenovo ThinkPads for their exceptional keyboard layout ensures that users can type comfortably over extended periods, reducing strain and increasing efficiency.

In summary, the Lenovo ThinkPad 4228, 4223, and 4229 models represent a blend of power, durability, and user-friendly design. With their focus on connectivity, performance, and security, these laptops cater perfectly to the needs of professionals and businesses, confirming Lenovo's status as a leading manufacturer in the world of computing technology. Whether you need a rugged workhorse for heavy tasks or a portable device for meetings, the ThinkPad series provides versatile solutions to meet any requirement.