Enabling trusted platform module (tpm), Deleting an owner tag, Asset tag options – Dell Precision M20 User Manual
Page 64: Enabling the tpm feature

Deleting an Owner Tag
1.
Boot the computer using the bootable media you created in "
2.
Type asset /o /d and press
3.
When the computer prompts you to delete the owner tag, type y.
Asset Tag Options
To use one of the asset tag options (see the following table):
1.
Boot the computer using the bootable media you created in "
2.
Type asset and a space followed by the option, and then press
Enabling Trusted Platform Module (TPM)
TPM is a hardware-based security feature that can be used to create and manage computer-generated encryption keys. When combined with security
software, TPM enhances existing network and computer security by enabling features such as file protection capabilities and protected e-mail. The TPM feature
is enabled through a TPM system setup option.
Enabling the TPM Feature
1.
Turn on your computer.
2.
Install the TPM Software.
The TPM software is factory-installed in the C:\Dell\TPM directory. It may also be downloaded from support.dell.com.
3.
Run the setup.exe file. Follow the on-screen instructions to install the Broadcom Secure Foundation software.
If you are using TPM on your computer for the first time, proceed to
.
4.
To enable the TPM software:
a.
Restart the computer and press
b.
Open the Security menu in system setup.
c.
Select the TPM Security menu option and press
d.
Set the TPM security option to On.
e.
Press
f.
If prompted, select Save/Exit.
5.
Activate the TPM setup program:
a.
Boot your computer to the Microsoft® Windows® operating system.
b.
Click Start® Programs® Broadcom Security Platforms Tools. Then, click the icon for the Security Platform Initialization Wizard.
NOTE:
For security, you cannot set, change, or delete the owner tag if the primary or administrator passwords are set.
Asset Tag Option
Description
/d
Deletes the asset tag
/o owner tag
Specifies a new owner tag
/o /d
Deletes the owner tag
/?
Displays the Asset Tag utility help screen
NOTE:
The TPM feature supports encryption only if the operating system supports TPM. For more information, see the software documentation.
NOTICE:
If you use TPM, you must follow the backup procedures in the documentation that came with the software to secure your TPM data and
encryption keys. In the event of these backups being incomplete, lost, or damaged, Dell will be unable to assist in the recovery of encrypted data.