Chapter 5. Security
This chapter provides information about how to protect your computer from theft and unauthorized use.
Security features
The following security features are available on your computer:
• Computrace Agent software embedded in firmware
The Computrace Agent software is an IT asset management and computer theft recovery solution.
The software detects if changes have been made on the computer, such as hardware, software, or
the computer call-in location.
Note:
You might have to purchase a subscription to activate the Computrace Agent software.
• Cover presence switch (also called intrusion switch)
The cover presence switch prevents your computer from logging in to the operating system when the
computer cover is not properly installed or closed. To enable the cover presence switch connector
on the system board, do the following:
1. Start the Setup Utility program. See “Starting the Setup Utility program” on page 63.
2. Set the administrator password. See “Setting, changing, and deleting a password” on page 64.
3. From the
Security
submenu, select
Chassis Intrusion Detection
➙
Enabled
. The cover presence
switch connector on the system board is enabled.
When you turn on the computer, if the cover presence switch detects that your computer cover is not
correctly installed or closed, an error message will be displayed. To bypass the error message and
log in to the operating system, do the following:
1. Properly install or close your computer cover. See “Completing the parts replacement” on page 151.
2. Press F1 to enter the Setup Utility program. Then press F10 to save and exit the Setup Utility
program. The error message will not be displayed again.
• Ability to enable and disable devices and USB connectors
For more information, see “Enabling or disabling a device” on page 65.
• Integrated fingerprint reader (available on some models)
Fingerprint authentication can replace passwords and enable simple and secure user access. For more
information, see “Using the fingerprint reader” on page 46.
• Trusted Platform Module (TPM)
Trusted Platform Module is a secure cryptoprocessor that can store cryptographic keys that protect
information stored in your computer.
Locking the computer cover
Locking the computer cover helps prevent unauthorized people from gaining access to the inside of your
computer. Your computer comes with a padlock loop so that the computer cover cannot be removed
when a padlock is installed.
© Copyright Lenovo 2014
59
Summary of Contents for ThinkCentre M79
Page 1: ...ThinkCentre M79 Hardware Maintenance Manual Machine Types 10CT 10CU 10CV and 10CW ...
Page 6: ...iv ThinkCentre M79 Hardware Maintenance Manual ...
Page 8: ...vi ThinkCentre M79 Hardware Maintenance Manual ...
Page 16: ... 18 kg 37 lb 32 kg 70 5 lb 55 kg 121 2 lb 8 ThinkCentre M79 Hardware Maintenance Manual ...
Page 19: ...1 2 Chapter 1 Read this first Important safety information 11 ...
Page 20: ...1 2 12 ThinkCentre M79 Hardware Maintenance Manual ...
Page 21: ...Chapter 1 Read this first Important safety information 13 ...
Page 27: ...Chapter 1 Read this first Important safety information 19 ...
Page 31: ...Chapter 1 Read this first Important safety information 23 ...
Page 40: ...Figure 4 Component locations 32 ThinkCentre M79 Hardware Maintenance Manual ...
Page 68: ...Figure 8 Installing a padlock 60 ThinkCentre M79 Hardware Maintenance Manual ...
Page 80: ...72 ThinkCentre M79 Hardware Maintenance Manual ...
Page 98: ...90 ThinkCentre M79 Hardware Maintenance Manual ...
Page 112: ...104 ThinkCentre M79 Hardware Maintenance Manual ...
Page 168: ...160 ThinkCentre M79 Hardware Maintenance Manual ...
Page 172: ...164 ThinkCentre M79 Hardware Maintenance Manual ...
Page 175: ...Appendix D China Energy Label Copyright Lenovo 2014 167 ...
Page 176: ...168 ThinkCentre M79 Hardware Maintenance Manual ...
Page 178: ...170 ThinkCentre M79 Hardware Maintenance Manual ...
Page 184: ...176 ThinkCentre M79 Hardware Maintenance Manual ...
Page 185: ......
Page 186: ......