TPM installation requires the use of drive encryption technology, such as the Microsoft Windows BitLocker
Encryption feature. BitLocker is a data protection feature available in Microsoft Windows Server 2008 R2 SP1
and later operating systems. It helps protect user data and ensure that a server running Windows Server has
not been tampered with while the system was offline. For more information on BitLocker, see the
.
This server supports TPM 1.2 and TPM 2.0. However, once the TPM version 1.2 is installed on the system
board, it can no longer be upgraded to the TPM version 2.0.
Trusted Platform Module (TPM) — China Import Restrictions
HPE Special Reminder:
Before enabling TPM functionality on this system, you must ensure that your
intended use of TPM complies with relevant local laws, regulations and policies, and approvals or licenses
must be obtained if applicable.
For any compliance issues arising from your operation/usage of the TPM which violates the above mentioned
requirement, you shall bear all the liabilities wholly and solely. HPE will not be responsible for any related
liabilities.
HP Trusted Platform Module installation guidelines
CAUTION:
Always observe the guidelines in this document. Failure to follow these guidelines can cause hardware
damage or halt data access.
When installing or replacing a TPM, observe the following guidelines:
• Do not remove an installed TPM. Once installed, the TPM becomes a permanent part of the system board.
• When installing or replacing hardware, Hewlett Packard Enterprise service providers cannot enable the
TPM or the encryption technology. For security reasons, only the customer can enable these features.
• When returning a system board for service replacement, do not remove the TPM from the system board.
When requested, HPE Service provides a TPM with the spare system board.
• Any attempt to remove an installed TPM from the system board breaks or disfigures the TPM security
rivet. Upon locating a broken or disfigured rivet on an installed TPM, administrators should consider the
system compromised and take appropriate measures to ensure the integrity of the system data.
• When using BitLocker, always retain the recovery key/password. The recovery key/password is required to
enter Recovery Mode after BitLocker detects a possible compromise of system integrity.
• HPE is not liable for blocked data access caused by improper TPM use. For operating instructions, see the
encryption technology feature documentation provided by the operating system.
Installing the Trusted Platform Module
Procedure
1. Installing the Trusted Platform Module board
.
2. Retaining the recovery key/password
.
3. Enabling the Trusted Platform Module
.
Trusted Platform Module (TPM) — China Import Restrictions
49
Summary of Contents for ProLiant Thin Micro TM200
Page 13: ...Component identification 13...
Page 34: ...1 2 2 34 Operations...