HP (Hewlett-Packard) 666158-B21 Server User Manual


 
Hardware options installation 39
Do not remove an installed TPM. Once installed, the TPM becomes a permanent part of the system
board.
When installing or replacing hardware, HP service providers cannot enable the TPM or the encryption
technology. For security reasons, only the customer can enable these features.
When returning a system board for service replacement, do not remove the TPM from the system board.
When requested, HP Service provides a TPM with the spare system board.
Any attempt to remove an installed TPM from the system board breaks or disfigures the TPM security
rivet. Upon locating a broken or disfigured rivet on an installed TPM, administrators should consider the
system compromised and take appropriate measures to ensure the integrity of the system data.
When using BitLocker, always retain the recovery key/password. The recovery key/password is
required to enter Recovery Mode after BitLocker detects a possible compromise of system integrity.
HP is not liable for blocked data access caused by improper TPM use. For operating instructions, see the
encryption technology feature documentation provided by the operating system.
Installing the Trusted Platform Module board
WARNING: To reduce the risk of personal injury from hot surfaces, allow the drives and the
internal system components to cool before touching them.
1. Power down the server blade (on page 11).
2. Remove the server blade (on page 12).
3. Place the server blade on a flat, level work surface.
4. Remove the access panel (on page 13).
5. Remove the DIMM baffle (on page 13).
6. Remove the SAS controller (on page 15).
7. Remove the front panel/drive cage assembly ("Remove the front panel/hard drive cage assembly" on
page 13).
8. Locate the TPM connector ("System board components" on page 8).
CAUTION: Any attempt to remove an installed TPM from the system board breaks or disfigures
the TPM security rivet. Upon locating a broken or disfigured rivet on an installed TPM,
administrators should consider the system compromised and take appropriate measures to ensure
the integrity of the system data.