Hardware options installation 28
•
Do not remove an installed TPM. Once installed, the TPM becomes a permanent part of the system
board.
•
When installing or replacing hardware, HP service providers cannot enable the TPM or the encryption
technology. For security reasons, only the customer can enable these features.
•
When returning a system board for service replacement, do not remove the TPM from the system board.
When requested, HP Service provides a TPM with the spare system board.
•
Any attempt to remove an installed TPM from the system board breaks or disfigures the TPM security
rivet. Upon locating a broken or disfigured rivet on an installed TPM, administrators should consider the
system compromised and take appropriate measures to ensure the integrity of the system data.
•
When using BitLocker, always retain the recovery key/password. The recovery key/password is
required to enter Recovery Mode after BitLocker detects a possible compromise of system integrity.
•
HP is not liable for blocked data access caused by improper TPM use. For operating instructions, see the
encryption technology feature documentation provided by the operating system.
Installing the Trusted Platform Module board
WARNING:
To reduce the risk of personal injury, electric shock, or damage to the equipment,
remove the power cord to remove power from the server. The front panel Power On/Standby
button does not completely shut off system power. Portions of the power supply and some internal
circuitry remain active until AC power is removed.
WARNING:
To reduce the risk of personal injury from hot surfaces, allow the drives and the
internal system components to cool before touching them.
1.
Power down the server (on page
6
).
2.
Place the server on a flat, level work surface.
3.
Open the panel door (on page
6
).
4.
Locate the TPM connector, making sure you do not remove it from the system.
CAUTION:
Any attempt to remove an installed TPM from the system board breaks or disfigures
the TPM security rivet. Upon locating a broken or disfigured rivet on an installed TPM,
administrators should consider the system compromised and take appropriate measures to ensure
the integrity of the system data.
Summary of Contents for ProLiant MicroServer
Page 86: ...Support and other resources 86 ...