beautypg.com

Installing the trusted platform module board – HP ProLiant BL685c G7 Server-Blade User Manual

Page 42

background image

Hardware options installation 42

Do not remove an installed TPM. Once installed, the TPM becomes a permanent part of the system
board.

When installing or replacing hardware, HP service providers cannot enable the TPM or the
encryption technology. For security reasons, only the customer can enable these features.

When returning a system board for service replacement, do not remove the TPM from the system
board. When requested, HP Service provides a TPM with the spare system board.

Any attempt to remove an installed TPM from the system board breaks or disfigures the TPM security
rivet. Upon locating a broken or disfigured rivet on an installed TPM, administrators should consider
the system compromised and take appropriate measures to ensure the integrity of the system data.

When using BitLocker™, always retain the recovery key/password. The recovery key/password is
required to enter Recovery Mode after BitLocker™ detects a possible compromise of system integrity.

HP is not liable for blocked data access caused by improper TPM use. For operating instructions, see
the encryption technology feature documentation provided by the operating system.

Installing the Trusted Platform Module board

WARNING:

To reduce the risk of personal injury from hot surfaces, allow the drives and the

internal system components to cool before touching them.

IMPORTANT:

To avoid damage to the server blade, support the riser board when installing

the TPM board and rivet.

1.

Power down the server blade (on page

14

).

2.

Remove the server blade (on page

15

).

3.

Place the server blade on a flat, level work surface.

4.

Remove the access panel (on page

16

).

CAUTION:

Any attempt to remove an installed TPM from the system board breaks or

disfigures the TPM security rivet. Upon locating a broken or disfigured rivet on an installed
TPM, administrators should consider the system compromised and take appropriate measures
to ensure the integrity of the system data.