|
Other manuals for this model:
manual abstract
By selecting Enabled you can protect your computer against attacks by such viruses and worms. If after choosing Enabled you find that a program does not run correctly, select Disabled and reset the setting. Chapter 7. Advanced configuration 91 Table 5. Security menu items (continued) Menu item Submenu item Value Comments Virtualization Intel Virtualization Technology • Disabled • Enabled If you select Enabled, a Virtual Machine Monitor (VMM) can utilize the additional hardware capabilities provided by Intel Virtualization Technology. Intel VT-d Feature • Disabled • Enabled Intel VT-d stands for Intel Virtualization Technology for Directed I/O. When enabled, a VMM can utilize the platform infrastructure for I/O virtualization. I/O Port Access Ethernet LAN • Disabled • Enabled If you select Enabled, you can use the Ethernet LAN device. Wireless LAN • Disabled • Enabled If you select Enabled, you can use the Wireless LAN connection. Wireless WAN • Disabled • Enabled If you select Enabled, you can use the wireless WAN device. Bluetooth • Disabled • Enabled If you select Enabled, you can use Bluetooth devices. USB Port • Disabled • Enabled If you select Enabled, you can use the USB connectors. Memory Card Slot • Disabled • Enabled If you select Enabled, you can use the memory card slots. Smart Card Slot • Disabled • Enabled If you select Enabled, you can use the smart card slot. Integrated Camera • Disabled • Enabled If you select Enabled, you can use the integrated camera. Microphone • Disabled • Enabled If you select Enabled, you can use the microphones (internal, external, or line-in). Fingerprint Reader • Disabled • Enabled If you select Enabled, you can use the fingerprint reader. NFC Device • Disabled • Enabled If you select Enabled, you can use the NFC device. Internal Device Access Bottom Cover Tamper Detection • Disabled • Enabled Enable or disable the tamper detection. If tamper is detected, Supervisor Password is required to boot the system. Bottom Cover Tamper Detection will not take effect unless Supervisor Password is enabled. 92 User Guide Table 5. Security menu items (continued) Menu item Submenu item Value Comments Anti-Theft Intel AT Module Activation • Disabled • Enabled • Permanently Disabled Enable or disable the UEFI BIOS interface to activate the Intel AT module, which is an optional anti-theft service from Intel. Note: If you set the Intel AT module activation to Permanently Disabled, you will be unable to enable this setting again. Intel AT Suspend • Enter This option is displayed only when the anti-theft function is activated. The Intel anti-theft suspend screen will be displayed at next boot to enter the suspend mode. Computrace Module Activation • Disabled • Enabled • Permanently Disabled Enable or disable the UEFI BIOS interface to activate the computrace module. Computrace is an optional monitoring service from Absolute Software. Note: If you set the computrace module activation to Permanently Disabled, you will be unable to enable this setting again. Secure Boot Secure Boot • Disabled • Enabled Enable or disable the UEFI Secure Boot feature. Select Enable to prevent unauthorized operating systems from running at boot time. Select Disabled to allow any operating systems to run at boot time. Platform Mode • Setup Mode • User Mode Specify the system operating mode. Secure Boot Mode • Standard Mode • Custom Mode Specify the Secure Boot mode. Reset to Setup Mode This option is used to clear the current platform key and put the system into Setup Mode. You can install your own platform key and customize the Secure Boot signature databases in Setup Mode. Secure Boot mode will be set to Custom Mode. Restore Factory Keys This option is used to restore all keys and certificates in Secure Boot databases to factory defaults. Any customized Secure Boot settings will be erased, and the default platform key will be re-established along with the original signature databases including certificate for Windows 8 operating system. Startup menu To change the startup settings of your computer, select the Startup tab from the ThinkPad Setup menu. Attention: • After you change the startup sequence, ensure that you select a correct device during a copy, a save, or a format operation. Otherwise your data might be erased or overwritten. Chapter 7. Advanced configuration 93 • If you are using the BitLocker drive encryption, do not change the startup sequence. BitLocker drive encryption locks the computer from starting once detects the change of startup sequence. To change the startup sequence temporarily so that the computer starts from a desired drive, do the following: 1. Turn off the computer. 2. Turn on the computer. When the ThinkPad logo is displayed, press the F12 key. 3. Select the device that you want the computer to start from. Note: The Boot menu will be displayed if the computer cannot start from any devices or the operating system cannot be found. The following table lists the Startup menu items. ...
Other models in this manual:Notebooks and Netbooks - ThinkPad X240s (20AK) (2.46 mb)