Hardware options installation 68
TPM installation requires the use of drive encryption technology, such as the Microsoft Windows BitLocker
Drive Encryption feature. For more information on BitLocker, see the Microsoft website
(
http://www.microsoft.com
).
CAUTION:
Always observe the guidelines in this document. Failure to follow these guidelines
can cause hardware damage or halt data access.
When installing or replacing a TPM, observe the following guidelines:
•
Do not remove an installed TPM. Once installed, the TPM becomes a permanent part of the system
board.
•
When installing or replacing hardware, HP service providers cannot enable the TPM or the encryption
technology. For security reasons, only the customer can enable these features.
•
When returning a system board for service replacement, do not remove the TPM from the system board.
When requested, HP Service provides a TPM with the spare system board.
•
Any attempt to remove an installed TPM from the system board breaks or disfigures the TPM security
rivet. Upon locating a broken or disfigured rivet on an installed TPM, administrators should consider the
system compromised and take appropriate measures to ensure the integrity of the system data.
•
When using BitLocker, always retain the recovery key/password. The recovery key/password is
required to enter Recovery Mode after BitLocker detects a possible compromise of system integrity.
•
HP is not liable for blocked data access caused by improper TPM use. For operating instructions, see the
encryption technology feature documentation provided by the operating system.
Retaining the recovery key/password
The recovery key/password is generated during BitLocker™ setup, and can be saved and printed after
BitLocker™ is enabled. When using BitLocker™, always retain the recovery key/password. The recovery
key/password is required to enter Recovery Mode after BitLocker™ detects a possible compromise of system
integrity.
To help ensure maximum security, observe the following guidelines when retaining the recovery
key/password:
•
Always store the recovery key/password in multiple locations.
•
Always store copies of the recovery key/password away from the server.
•
Do not save the recovery key/password on the encrypted hard drive.
Installing the Trusted Platform Module board
WARNING:
To reduce the risk of personal injury, electric shock, or damage to the equipment,
remove the power cord to remove power from the server. The front panel Power On/Standby
button does not completely shut off system power. Portions of the power supply and some internal
circuitry remain active until AC power is removed.
WARNING:
To reduce the risk of personal injury from hot surfaces, allow the drives and the
internal system components to cool before touching them.
1.
Power down the server (on page
25
).
2.
Remove the access panel (on page
26
).
Summary of Contents for ProLiant DL585 G7
Page 18: ...Component identification 18 Secondary processor memory board Device numbers ...
Page 23: ...Component identification 23 Fan locations Power supply backplane components ...
Page 71: ...Cabling 71 Cabling DVD ROM drive cabling ...
Page 92: ...Troubleshooting 92 ...
Page 108: ...Regulatory compliance notices 108 Taiwan notices ...
Page 117: ...Support and other resources 117 ...
Page 118: ...Support and other resources 118 ...