To enable or disable the Configuration Change Detection feature, do the following:
1. Start the Setup Utility program. See “Starting the Setup Utility program” on page 41.
2. Select
Security
➙
Configuration Change Detection
and press Enter.
3. Select the desired setting and press Enter.
4. Exit the Setup Utility program. See “Exiting the Setup Utility program” on page 45.
To bypass the error message and log in to the operating system, do one of the following:
• Press the F2 key.
Note:
For some keyboards, you might need to press Fn+F2 to bypass the error message.
• Start and then exit the Setup Utility program. See “Starting the Setup Utility program” on page 41 and
“Exiting the Setup Utility program” on page 45.
Using the cover presence switch
The cover presence switch prevents your computer from logging in to the operating system when the
computer cover is not properly installed or closed.
To enable the cover-presence-switch connector on the system board, do the following:
1. Start the Setup Utility program. See “Starting the Setup Utility program” on page 41.
2. Select
Security
➙
Chassis Intrusion Detection
and press Enter.
3. Select
Enabled
and press Enter.
4. Exit the Setup Utility program. See “Exiting the Setup Utility program” on page 45.
When the cover-presence-switch connector on the system board is enabled, if the cover presence switch
detects that the computer cover is not correctly installed or closed, an error message will be displayed when
you turn on the computer. To bypass the error message and log in to the operating system, do the following:
1. Properly install or close your computer cover. See Chapter 7 “Installing or replacing hardware” on
page 59.
2. Start and then exit the Setup Utility program. See “Starting the Setup Utility program” on page 41 and
“Exiting the Setup Utility program” on page 45.
Using BIOS passwords
By using the Setup Utility program, you can set passwords to prevent unauthorized access to your computer
and data.
You do not have to set any passwords to use your computer. However, using passwords improves computer
security. If you decide to set any passwords, read the following topics.
Setup Utility program password types
The following types of passwords are available:
• Power-on password
When a power-on password is set, you are prompted to enter a valid password each time the computer is
turned on. The computer cannot be used until the valid password is entered.
• Administrator password
Setting an administrator password deters unauthorized users from changing configuration settings. If you
are responsible for maintaining the configuration settings of several computers, you might want to set
an administrator password.
Chapter 5
.
Advanced configuration
43
Summary of Contents for ThinkCentre M700z
Page 1: ...ThinkCentre M700z and M800z User Guide Machine Types 10ET 10EU 10EV 10EW 10EY and 10F1 ...
Page 10: ...viii ThinkCentre M700z and M800z User Guide ...
Page 44: ...34 ThinkCentre M700z and M800z User Guide ...
Page 46: ...Figure 16 Kensington style cable lock for M700z 36 ThinkCentre M700z and M800z User Guide ...
Page 50: ...40 ThinkCentre M700z and M800z User Guide ...
Page 94: ...84 ThinkCentre M700z and M800z User Guide ...
Page 98: ...88 ThinkCentre M700z and M800z User Guide ...
Page 106: ...96 ThinkCentre M700z and M800z User Guide ...
Page 109: ...Appendix D China Energy Label Copyright Lenovo 2015 99 ...
Page 110: ...100 ThinkCentre M700z and M800z User Guide ...
Page 112: ...102 ThinkCentre M700z and M800z User Guide ...
Page 115: ......
Page 116: ......