Using ThinkCentre Customization

Using ThinkCentre Customization

ThinkCentre Customization is designed exclusively for ThinkCentre devices running Windows and requires a Basic license. It offers powerful features that allow Admins to remotely access devices and perform specific operations that require BIOS interface access. TCC offers the ability to set Strong Password, Power Efficiency and Firmware Lock, and to use One Key Disposal. Since these features involve the BIOS, a device restart is often required. 

Here are two ways to access TCC.
  1. Navigate to Policy Management > ThinkCentre Customization.
  2. Navigate to Device Management > Devices > Device List > (Select a TC device) > Device Tray > Strong Password > click the ThinkCentre Customization link. 
Notes
For security reasons, Firmware Lock and One Key Disposal require the entry of a Supervisor Password. This is done on the Device Tray. Please refer to article Viewing Device Information - Windows Operating System, section ThinkCentre Customization Tab.

Strong Password 

Configuration

You can enable or disable any of these options using the toggle button. The new settings will be reflected in the device tray.

Strong Password offers an enhanced password security policy on the device. It allows you to set the following options. 
  1. Mixed Characters
  2. Special Characters
  3. Minimum Length: this option provides a drop-down list to set the minimum number of characters required for the password, ranging from 8 to 12 characters. If this option is turned off, the password can have fewer characters.

Devices

In this tab you can select the devices to which you will apply the policy set in the Configuration section. Use the toggle button to enable or disable the Strong Password settings for each individual device. Alternatively, use the toggle button at the top of the device list to enable or disable the settings for all devices.

Groups

You can enable or disable the Strong Password policy for devices at each group level. Alternatively, use the toggle button at the top of the groups list to enable or disable the settings for all device groups.

Power Efficiency

This feature allows you to set device(s) to either Performance Mode or Ultra Low Power Mode. Performance Mode utilizes the device's maximum system power, while Ultra Low Power Mode saves power. This procedure is done in the back end at the device agent level.

You can choose to apply Performance Mode or Ultra Low Power Mode to all devices, or you can go to the Devices section and select the devices to which you will apply one of these options.

To modify the option for individual devices:
  1. Search for the device.
  2. Click the corresponding pencil icon in the last column.
  3. In the dialog box, select an option.
  4. Click Save.

Firmware Lock

This feature is provided by third-party software through a partnership with Lenovo. When enabled, it prompts the device with an option to allow control by the third-party software. For example, if the user loses their device, they can access a website to lock the device remotely.

If this feature is disabled, the third-party software cannot lock the device's firmware.

At this time, Lenovo Device Manager does not directly control the locking functionality. It only manages the setting that enables or disables the third-party software's ability to perform this function.

You can enable or disable this option on each individual device using the toggle button. Alternatively, use the toggle button at the top of the device list to enable or disable this setting for all devices.
Warning
Please be aware that when you enable this option, the command is sent to the device(s) immediately.
*Note: there may be an additional license fee from the 3rd party software.

One Key Disposal

The purpose of One Key Disposal (OKD) is to enable the wiping of all data and software from a device with just one click. This process will then automatically decommission the device and immediately remove it from LDM.

Devices

To start the process, select the device(s) from the list and confirm. This operation is performed at the BIOS level and follows these steps:  

1. After selecting the device(s), the Admin sends the request to the device(s).
2. Upon the next restart, the BIOS detects the outstanding request.
3. Following this, the system enters the BIOS.
4. The BIOS displays a pop-up box notifying the user that the Admin has requested data disposal and asks the user for confirmation. The user has the option to decline; if he accepts, the request is sent to the device.

The OKD Request section shows the status of the requests for each device with the date and time.

Notes
This operation can only be applied to Online devices, and the BIOS version of the device needs to be recent to support these features.


    • Related Articles

    • Using Power Management

      This feature provides programming of multiple power management operations with multiple schedules into one easy to use tool. It Admins can schedule for an organization, a group of devices or individual devices. Only eligible Windows PCs and Smart ...
    • Viewing Device Information – Windows Operating System

      Once a Windows device is added to LDM, admins can view the device information and perform basic actions through the Device Tray. You can navigate to the Device Tray by following this path: Device Management > Device List > (Select the device) > ...
    • Viewing Power Management Report

      This feature tracks the status of Power Management Programs to easily track successes and failures. The report can be exported to a .csv file. To generate a report, click Reports > Power Management Status. The list of current programs, status, ...
    • Using System Update

      This feature allows Org Admins, IT Admins and MSP Admins to centrally manage Windows BIOS, drivers and firmware updates on any Lenovo Windows devices. Updates are checked when new devices are claimed and licensed and on-demand from the System Update ...
    • Three Trends Shaping the Future of Endpoint Management

      Endpoint management is at a turning point Endpoint management has never been more critical for businesses both large and small. The average enterprise now manages about 135,000 devices, and nearly half are at risk because of either an outdated OS or ...