![Lenovo 11CS000MCA User Manual Download Page 28](http://html.mh-extra.com/html/lenovo/11cs000mca/11cs000mca_user-manual_200642028.webp)
2. Click
Windows Defender Firewall
, and then follow the on-screen instructions.
Use computrace Agent software embedded in firmware (for selected
models)
The Computrace Agent software is an IT asset management and computer theft recovery solution. The
software detects if changes have been made on the computer, such as hardware, software, or the computer
call-in location. You might have to purchase a subscription to activate the Computrace Agent software.
Use BIOS security solutions
This section provides BIOS solutions to secure your computer and information.
Erase all storage drive data
It is recommended that you erase all storage drive data before recycling a storage drive or the computer.
To erase all storage drive data:
1. Set a hard disk password for the storage drive you will recycle. See “Use passwords” on page 20.
2. Restart the computer. When the logo screen is displayed, press F1 or Fn+F1.
3. Select
Security
➙
Hard Disk Password
➙
Security Erase HDD Data
and press Enter.
4. Select the storage drive you will recycle and press Enter.
5. A message is displayed, prompting you to confirm the operation. Select
Yes
and press Enter. The
erasing process begins.
Note:
During the erasing process, the power button and the keyboard are disabled.
6. After the erasing process is completed, a message is displayed, prompting you to reset the system.
Select
Continue
.
Note:
Depending on the storage drive capacity, the erasing process will take half an hour to three hours.
7. After the resetting process is completed, one of the following will happen:
• If the data on the system storage drive is erased, you will be prompted that no operating system is
available.
• If the data on the non-system storage drive is erased, the computer restarts automatically.
Use the cover presence switch
The cover presence switch prevents the computer from logging in to the operating system when the
computer cover is not properly installed or closed.
To enable the cover presence switch connector on the system board:
1. Restart the computer. When the logo screen is displayed, press F1 or Fn+F1.
2. Select
Security
➙
Cover Tamper Detected
and press Enter.
3. Select
Enabled
and press Enter.
4. Press F10 or Fn+F10 to save the changes and exit.
When the cover presence switch connector on the system board is enabled, if the cover presence switch
detects that the computer cover is not correctly installed or closed, an error message will be displayed when
you turn on the computer. To bypass the error message and log in to the operating system:
1. Properly install or close the computer cover.
22
M70t and M80t User Guide
Summary of Contents for 11CS000MCA
Page 1: ...M70t and M80t User Guide ...
Page 6: ...iv M70t and M80t User Guide ...
Page 20: ...14 M70t and M80t User Guide ...
Page 24: ...18 M70t and M80t User Guide ...
Page 30: ...24 M70t and M80t User Guide ...
Page 36: ...30 M70t and M80t User Guide ...
Page 48: ...42 M70t and M80t User Guide ...
Page 76: ...70 M70t and M80t User Guide ...
Page 96: ...90 M70t and M80t User Guide ...
Page 108: ...102 M70t and M80t User Guide ...
Page 111: ......
Page 112: ......