Chapter 4. Security

This chapter provides information about how to protect your computer from theft and unauthorized use.

Security features

The following security features are available on your computer:

Computrace Agent software embedded in firmware

The Computrace Agent software is an IT asset management and computer theft recovery solution. The software detects if changes have been made on the computer, such as hardware, software, or the computer call-in location.

Note: You might have to purchase a subscription to activate the Computrace Agent software.

Cover presence switch (also called intrusion switch)

The cover presence switch prevents your computer from logging in to the operating system when the computer cover is not properly installed or closed. To enable the cover presence switch connector on the system board, to the following:

1.Start the Setup Utility program. See “Starting the Setup Utility program” on page 73.

2.Set the Administrator Password. See “Setting, changing, and deleting a password” on page 74.

3.From the Security submenu, select Chassis Intrusion Detection Enabled. The cover presence switch connector on the system board is enabled.

When the cover presence switch detects that your computer cover is not properly installed or closed when you turn on the computer, an error message will be displayed. To bypass the error message and log in to the operating system, do the following:

1.Properly install or close your computer cover. See “Completing the parts replacement” on page 63.

2.Press F1 to enter the Setup Utility program. Then press F10 to save and exit the Setup Utility program. The error message will not be displayed again.

Ability to enable and disable devices and USB connectors

For more information, see “Enabling or disabling a device” on page 75.

Integrated fingerprint reader (available on some models)

Depending on the models of your computer, the keyboard may have an integrated fingerprint reader. By enrolling your fingerprint and associating it with a Power-on Password, a Hard Disk Password, or both passwords beforehand, you can start the computer, log on to the system, and enter the Setup Utility program by swiping your finger over the reader, without typing a password. Thus fingerprint authentication can replace passwords and enable simple and secure user access.

Startup sequence control

For more information, see “Selecting or changing the startup device sequence” on page 76.

Startup without keyboard or mouse

Your computer is able to log in to the operating system without keyboard or mouse connected.

Trusted Platform Module (TPM)

Trusted Platform Module is a secure cryptoprocessor that can store cryptographic keys that protect information stored in your computer.

© Copyright Lenovo 2011

25

Page 37
Image 37
Lenovo 4169, 7517, 5069, 5048, 5034, 5030, 5037, 4166, 268, 1730 manual Security features

5048, 5069, 7517, 1730, 4166 specifications

Lenovo has consistently been a frontrunner in the technology landscape, particularly in the realm of laptops and personal computers. Among its diverse product lineup, models such as the Lenovo 5034, 4169, 268, 5030, and 5037 stand out for their robust features and innovative technologies.

The Lenovo 5034 is designed for business professionals and students alike. This model is powered by the latest Intel processors, offering swift performance for multitasking. It features a durable design, making it ideal for on-the-go use. One of its notable characteristics is its long-lasting battery life, allowing users to work for extended periods without needing to recharge. Its full HD display offers vibrant visuals, enhancing productivity during presentations or media consumption.

Next, the Lenovo 4169 targets budget-conscious consumers without compromising on performance. Equipped with an efficient AMD processor, it handles everyday tasks seamlessly. The laptop's lightweight design coupled with an ergonomic keyboard ensures comfort during prolonged use. Additionally, the 4169 incorporates ample storage options, providing users with space for documents, media, and applications.

The Lenovo 268 model is tailored for gamers, featuring discrete NVIDIA graphics that bring games to life with stunning detail. This model is also known for its high refresh rate display, which provides smooth visuals during fast-paced gaming sessions. The cooling technology integrated into the 268 ensures that the laptop remains cool even under heavy load, enhancing overall performance.

The Lenovo 5030, on the other hand, targets creative professionals with its powerful hardware. It comes equipped with a high-end Intel Core i7 processor and sufficient RAM to handle graphic design and video editing software effectively. The 5030's UHD display offers excellent color accuracy, an essential feature for photographers and designers. Moreover, its extensive connectivity options allow users to connect multiple peripherals effortlessly.

Lastly, the Lenovo 5037 reinforces the brand's commitment to sustainability and eco-friendliness. Using recycled materials in its construction, this model aims to reduce environmental impact. It also features energy-efficient components to improve battery longevity and overall energy consumption. The device is built with user security in mind, incorporating biometric authentication technologies to safeguard sensitive information.

In summary, the Lenovo 5034, 4169, 268, 5030, and 5037 each deliver unique features and technological advancements, catering to a wide range of users, from business professionals to gamers and creatives. Lenovo’s emphasis on performance, durability, and sustainability makes these models worthy contenders in the competitive laptop market.