Preface
About This User's Guide
This user's guide is written for system integrators, IT professionals, and knowledge-
able end users who wish to add additional data security levels to their systems to
protect highly sensitive applications. It provides detailed information on configuring,
provisioning, and using the trusted platform module (TPM).
User's Guide Organization
Chapter 1
provides an overview of the trusted platform module (TPM), including
its features and uses.
Chapter 2
provides detailed instructions on installing, provisioning, and using the
TPM.
Conventions Used in This User's Guide
Pay special attention to the following symbols for proper TPM configuration.
Warning:
Important information given to avoid TPM configuration errors.
Note:
Additional information given to ensure correct TPM configuration
setup.
iii
Preface