32 33
Using Your LIFEBOOK
&RQ¿JXULQJWKHSDOPYHLQVHQVRU
Whether your device has a palm vein sensor depends on the device
FRQ¿JXUDWLRQ\RXKDYHRUGHUHG
The palm vein sensor can record the image of the pattern of the veins of the hand. This image
is evaluated by additional software and can be used instead of a password.
Ź 7REHDEOHWRXVHWKHSDOPYHLQVHQVRU
you must install the software.
1
Using the Security Lock
Fujitsu recommends the use of a combination lock.
Your device comes with a Security Lock mechanism for the Kensington Lock Cable. You can use
the Kensington Lock Cable, a sturdy steel cable, to help protect your notebook from theft. The
Kensington Lock Cable is available as an accessory.
K
Ź )LWWKH.HQVLQJWRQ/RFN&DEOHWRWKH
mechanism on your notebook.
6HFXULW\ IXQFWLRQV
6HFXULW\ IXQFWLRQV
6HFXULW\IXQFWLRQV
<RXU QRWHERRN KDV VHYHUDO VHFXULW\ IHDWXUHV WKDW \RX FDQ XVH WR VHFXUH \RXU
V\VWHP IURP XQDXWKRULVHG DFFHVV
7KLV FKDSWHU H[SODLQV KRZ WR XVH HDFK IXQFWLRQ DQG ZKDW WKH EHQH¿WV DUH
3OHDVH UHPHPEHU WKDW LQ VRPH FDVHV IRU H[DPSOH IRUJHWWLQJ \RXU SDVVZRUG
\RX PD\ EH ORFNHG RXW DQG XQDEOH WR DFFHVV \RXU GDWD 7KHUHIRUH
SOHDVH QRWH WKH IROORZLQJ LQIRUPDWLRQ
0DNH UHJXODU EDFNXSV WR H[WHUQDO GDWD FDUULHUV VXFK DV H[WHUQDO KDUG
GULYHV &'V '9'V RU %OXUD\ 'LVFV
6RPH VHFXULW\ IXQFWLR
QV QHHG \RX WR FKRRVH SDVVZRUGV 0DNH D QRWH
RI WKH SDVVZRUGV DQG NH
HS WKHP LQ D VDIH SODFH
,I \RX IRUJHW \RXU SDVVZRUGV \RX ZLOO QHHG WR FRQWDFW WKH RXU 6HUYLFH
'HVN 'HOHWLRQ RU UHVHWWLQJ RI SDVVZRUGV LV QRW FRYHUHG E\ \RXU ZDUUDQW\
DQG D FKDUJH ZLOO EH PDGH IRU DVVLVWDQFH
,I \RX FKDQJH WKH Password Severity VHWWLQJ IURP Strong WR Stringent LQ WKH Security
%,26 6HWXS 8WLOLW\ PHQX WKH )XMLWVX 6HUYLFH 'HVN FDQ QR ORQJHU UHVHW WKH SDVVZRUG
,Q WKLV FDVH WKH V\VWHP FDQ UHPDLQ SHUPDQHQWO\ XQXVDEOH
7KHUHIRUH )XMLWVX UHFRPPHQGV WR JHQHUDOO\ VHW XS D VXSHUYLVRU SDVVZRUG
ZLWK WKH VHWWLQJ Password Severity Strong
&RQ¿JXULQJ WKH ¿QJHUSULQW VHQVRU
)LQJHUSULQWVHQV RU)LQJHUSULQWVHQV RU
:KHWKHU RU QRW \RXU GHYLFH KDV D ¿QJHUSULQW VHQVRU GHSHQGV RQ WKH
GHYLFH FRQ¿JXUDWLRQ \RX KDYH RUGHUHG
7KH ¿QJHUSULQW VHQVRU FDQ UHFRUG DQ LPDJH RI D ¿QJHUSULQW :LWK DGGLWLRQDO ¿QJHUSULQW
VRIWZDUH WKLV LPDJH FDQ EH SURFHVVHG DQG XVHG LQVWHDG RI D SDVVZRUG
1
Ź <RX PXVW LQVWDOO WKH ¿QJHUSULQW VRIWZDUH
LQ RUGHU WR EH DEOH WR XVH WKH
¿QJHUSULQW VHQVRU
7KH FXUUHQW Workplace Protect VRIWZDUH IRU KDQG YHLQ DQG ¿QJHUSULQW
VHQVRU LV DYDLODEOH RQ WKH ,QWHUQHW DW
KWWSZZZIXMLWVXFRPIWVVROXWLRQVEXVLQHVVWHFKQRORJ\VHFXULW\VHFXUHLQGH[KWPO
)XMLWVX
SECURITY FUNCTIONS
&RQ¿JXULQJWKH¿QJHUSULQWVHQVRU
Whether or not your device has a fingerprint sensor depends on the device
FRQ¿JXUDWLRQ\RXKDYHRUGHUHG
7KH¿QJHUSULQWVHQVRUFDQUHFRUGDQLPDJHRID¿QJHUSULQW:LWKDGGLWLRQDO¿QJHUSULQW
software, this image can be processed and used instead of a password.
1
Ź<RX PXVWLQVWDOOWKH ILQJHUSULQWVRIWZDUH
in order to be able to use the fingerprint
sensor (1).