1. Go to
Control Panel
and view by large icons or small icons.
2. Click
Windows Defender Firewall
, and then follow the on-screen instructions.
Use computrace Agent software embedded in firmware (for selected
models)
The Computrace Agent software is an IT asset management and computer theft recovery solution. The
software detects if changes have been made on the computer, such as hardware, software, or the computer
call-in location. You might have to purchase a subscription to activate the Computrace Agent software.
Use BIOS security solutions
This section provides BIOS solutions to secure your computer and information.
Erase all storage drive data
It is recommended that you erase all storage drive data before recycling a storage drive or the computer.
To erase all storage drive data:
1. Set a hard disk password for the storage drive you will recycle. See “Use passwords” on page 18.
2. Restart the computer. When the logo screen is displayed, press F1 or Fn+F1.
3. Select
Security
➙
Hard Disk Password
➙
Security Erase HDD Data
and press Enter.
4. Select the storage drive you will recycle and press Enter.
5. A message is displayed, prompting you to confirm the operation. Select
Yes
and press Enter. The
erasing process begins.
Note:
During the erasing process, the power button and the keyboard are disabled.
6. After the erasing process is completed, a message is displayed, prompting you to reset the system.
Select
Continue
.
Note:
Depending on the storage drive capacity, the erasing process will take half an hour to three hours.
7. After the resetting process is completed, one of the following will happen:
• If the data on the system storage drive is erased, you will be prompted that no operating system is
available.
• If the data on the non-system storage drive is erased, the computer restarts automatically.
Use the cover presence switch
The cover presence switch prevents the computer from logging in to the operating system when the
computer cover is not properly installed or closed.
To enable the cover presence switch connector on the system board:
1. Restart the computer. When the logo screen is displayed, press F1 or Fn+F1.
2. Select
Security
➙
Cover Tamper Detected
and press Enter.
3. Select
Enabled
and press Enter.
4. Press F10 or Fn+F10 to save the changes and exit.
When the cover presence switch connector on the system board is enabled, if the cover presence switch
detects that the computer cover is not correctly installed or closed, an error message will be displayed when
you turn on the computer. To bypass the error message and log in to the operating system:
20
M90t User Guide
Summary of Contents for ThinkCentre M90t
Page 1: ...M90t User Guide ...
Page 6: ...iv M90t User Guide ...
Page 18: ...12 M90t User Guide ...
Page 22: ...16 M90t User Guide ...
Page 28: ...22 M90t User Guide ...
Page 46: ...40 M90t User Guide ...
Page 86: ...80 M90t User Guide ...
Page 90: ...84 M90t User Guide ...
Page 110: ...104 M90t User Guide ...
Page 122: ...116 M90t User Guide ...
Page 125: ......
Page 126: ......