To use Windows firewalls:
1. Go to
Control Panel
and view by large icons or small icons.
2. Click
Windows Defender Firewall
, and then follow the on-screen instructions.
Use Computrace Agent software embedded in firmware (for selected
models)
The Computrace Agent software is an IT asset management and computer theft recovery solution. The
software detects if changes have been made on the computer, such as hardware, software, or the computer
call-in location. You might have to purchase a subscription to activate the Computrace Agent software.
Use BIOS security solutions
This section provides BIOS solutions to secure your computer and information.
Erase all storage drive data
It is recommended that you erase all storage drive data before recycling a storage drive or the computer.
To erase all storage drive data:
1. Set a hard disk password for the storage drive you will recycle. See “Use passwords” on page 19.
2. Restart the computer. When the logo screen is displayed, press F1 or Fn+F1.
3. Select
Security
➙
Hard Disk Password
➙
Security Erase HDD Data
and press Enter.
4. Select the storage drive you will recycle and press Enter.
5. A message is displayed, prompting you to confirm the operation. Select
Yes
and press Enter. The
erasing process begins.
Note:
During the erasing process, the power button and the keyboard are disabled.
6. After the erasing process is completed, a message is displayed, prompting you to reset the system.
Select
Continue
.
Note:
Depending on the storage drive capacity, the erasing process will take half an hour to three hours.
7. After the resetting process is completed, one of the following will happen:
• If the data on the system storage drive is erased, you will be prompted that no operating system is
available.
• If the data on the non-system storage drive is erased, the computer restarts automatically.
Use the cover presence switch
The cover presence switch prevents the computer from logging in to the operating system when the
computer cover is not properly installed or closed.
To enable the cover presence switch connector on the system board:
1. Restart the computer. When the logo screen is displayed, press F1 or Fn+F1.
2. Select
Security
➙
Cover Tamper Detected
and press Enter.
3. Select
Enabled
and press Enter.
4. Press F10 or Fn+F10 to save the changes and exit.
If the cover presence switch is enabled and the computer cover is not correctly installed or closed, an error
message will be displayed when you turn on the computer. To bypass the error message and log in to the
operating system:
Secure your computer and information
21
Содержание V50a-22IMB
Страница 1: ...Lenovo V50a 22IMB Lenovo V50a 24IMB User Guide ...
Страница 6: ...iv Lenovo V50a 22IMB Lenovo V50a 24IMB User Guide ...
Страница 12: ...6 Lenovo V50a 22IMB Lenovo V50a 24IMB User Guide ...
Страница 24: ...18 Lenovo V50a 22IMB Lenovo V50a 24IMB User Guide ...
Страница 58: ...52 Lenovo V50a 22IMB Lenovo V50a 24IMB User Guide ...
Страница 80: ...Mainland China RoHS 74 Lenovo V50a 22IMB Lenovo V50a 24IMB User Guide ...
Страница 86: ...80 Lenovo V50a 22IMB Lenovo V50a 24IMB User Guide ...
Страница 89: ......
Страница 90: ......