Hardware options installation 32
HP Trusted Platform Module option
Trusted Platform Module (TPM) Notice
HP Special Reminder:
Before enabling Trusted Platform Module (TPM) functionality on this system, you
must ensure that your intended use of TPM complies with relevant local laws, regulations and policies,
and approvals or licenses must be obtained if applicable.
For any compliance issues arising from your operation/usage of TPM which violates the above mentioned
requirement, you shall bear all the liabilities wholly and solely. HP will not be responsible for any related
liabilities.
For more information about product features, specifications, options, configurations, and compatibility,
see the product QuickSpecs on the Hewlett Packard Enterprise website (
Use these instructions to install and enable a TPM on a supported server. This procedure includes three
sections:
1.
Installing the Trusted Platform Module board (on page
2.
Retaining the recovery key/password (on page
3.
Enabling the Trusted Platform Module (on page
Enabling the TPM requires accessing BIOS/Platform Configuration (RBSU) in UEFI System Utilities
HP Trusted Platform Module installation guidelines
CAUTION:
Always observe the guidelines in this document. Failure to follow these
guidelines can cause hardware damage or halt data access.
When installing or replacing a TPM, observe the following guidelines:
•
Do not remove an installed TPM. Once installed, the TPM becomes a permanent part of the system
board.
•
When installing or replacing hardware, Hewlett Packard Enterprise service providers cannot enable
the TPM or the encryption technology. For security reasons, only the customer can enable these
features.
•
When returning a system board for service replacement, do not remove the TPM from the system
board. When requested, Hewlett Packard Enterprise Service provides a TPM with the spare system
board.
•
Any attempt to remove an installed TPM from the system board breaks or disfigures the TPM
security rivet. Upon locating a broken or disfigured rivet on an installed TPM, administrators should
consider the system compromised and take appropriate measures to ensure the integrity of the
system data.
•
When using BitLocker, always retain the recovery key/password. The recovery key/password is
required to enter Recovery Mode after BitLocker detects a possible compromise of system integrity.
Содержание 828689-002
Страница 37: ...Cabling 37 Front panel LED board assembly cabling ...
Страница 64: ...Support and other resources 64 ...
Страница 65: ...Support and other resources 65 ...