Table 4. Security menu items (continued)
Menu item
Submenu item
Value
Comments
Memory Protection
Execution
Prevention
• Disabled
•
Enabled
Some computer viruses and worms cause
memory buffers to overflow. By selecting
Enabled
you can protect your computer against
attacks by such viruses and worms. If after
choosing
Enabled
you find that a program does
not run correctly, select
Disabled
and reset the
setting.
Intel Virtualization
Technology
•
Disabled
• Enabled
If you select
Enabled
, a Virtual Machine Monitor
(VMM) can utilize the additional hardware
capabilities provided by Intel Virtualization
Technology.
Virtualization
Intel VT-d Feature
•
Disabled
• Enabled
Intel VT-d stands for Intel Virtualization
Technology for Directed I/O. When enabled, a
VMM can utilize the platform infrastructure for
I/O virtualization.
Ethernet LAN
• Disabled
•
Enabled
If you select
Enabled
, you can use the Ethernet
LAN device.
Wireless LAN
• Disabled
•
Enabled
If you select
Enabled
, you can use the Wireless
LAN connection.
Wireless WAN
• Disabled
•
Enabled
If you select
Enabled
, you can use the wireless
WAN device.
Bluetooth
• Disabled
•
Enabled
If you select
Enabled
, you can use Bluetooth
devices.
USB Port
• Disabled
•
Enabled
If you select
Enabled
, you can use the USB
connectors.
Memory Card Slot
• Disabled
•
Enabled
If you select
Enabled
, you can use the memory
card slots.
Smart Card Slot
• Disabled
•
Enabled
If you select
Enabled
, you can use the smart
card slots.
Integrated Camera
• Disabled
•
Enabled
If you select
Enabled
, you can use the integrated
camera.
Microphone
• Disabled
•
Enabled
If you select
Enabled
, you can use the
microphones (internal, external, or line-in).
Fingerprint Reader
• Disabled
•
Enabled
If you select
Enabled
, you can use the
fingerprint reader.
NFC
• Disabled
•
Enabled
If you select
Enabled
, you can use the NFC.
I/O Port Access
WiGig
• Disabled
•
Enabled
If you select
Enabled
, you can use the WiGig.
Internal Device
Access
Bottom Cover
Tamper Detection
•
Disabled
• Enabled
Enable or disable the tamper detection. If
tamper is detected, Supervisor Password is
required to boot the system. Bottom Cover
Tamper Detection will not take effect unless
Supervisor Password is enabled.
81
Summary of Contents for ThinkPad Yoga 260
Page 1: ...ThinkPad Yoga 260 User Guide ...
Page 6: ...iv ThinkPad Yoga 260 User Guide ...
Page 16: ...xiv ThinkPad Yoga 260 User Guide ...
Page 32: ...16 ThinkPad Yoga 260 User Guide ...
Page 64: ...48 ThinkPad Yoga 260 User Guide ...
Page 84: ...68 ThinkPad Yoga 260 User Guide ...
Page 108: ...92 ThinkPad Yoga 260 User Guide ...
Page 126: ...110 ThinkPad Yoga 260 User Guide ...
Page 134: ...118 ThinkPad Yoga 260 User Guide ...
Page 152: ...136 ThinkPad Yoga 260 User Guide ...
Page 156: ...140 ThinkPad Yoga 260 User Guide ...
Page 166: ...150 ThinkPad Yoga 260 User Guide ...
Page 168: ...China RoHS 152 ThinkPad Yoga 260 User Guide ...
Page 173: ......
Page 174: ......