1. Installing Internal Optional Devices
Express5800/R120h-2M (2nd-Gen) User’s Guide
58
Chapter 2 Preparations
1.7
TPM Kit N8115-35
Overview
Install the TPM (Trusted Platform Module) Kit unit according to the instructions in this section to enable it.
There are two steps to follow.
1. Installation of TPM Kit
2. Enabling TPM
3. Retaining the recovery key/password.
When using drive encryption technologies, such as Microsoft Windows BitLocker Drive Encryption feature, you
must enable TPM. For more information, see the Microsoft Web site.
Note
If the TPM is removed from the original server and powered up on a different server,
data stored in the TPM including keys will be erased.Be careful not to press the
POWER Switch.
TPM 2.0 Guidelines
Important Always observe the guidelines in this document. Failure to follow these
guidelines can cause hardware damage or halt data access.
When installing or replacing a TPM, observe the following guidelines:
Do not remove an installed TPM. Once installed, the TPM is bound to the system board. If an OS is
configured to use the TPM and it is removed, the OS may go into recovery mode, data loss can occur, or
both.
When installing or replacing hardware, our service providers cannot enable the TPM or the encryption
technology. For security reasons, only the customer can enable these features.
When returning a system board for service replacement, do not remove the TPM from Motherboard.
When requested, our service provides a TPM with the spare Motherboard.
Any attempt to remove the cover of an installed TPM from Motherboard can damage the TPM cover, the
TPM, and Motherboard.
If the TPM is removed from the original server and powered up on a different server, data stored in the
TPM including keys will be erased.
When using BitLocker, always retain the recovery key/password. The recovery key/password is required to
complete Recovery Mode after BitLocker detects a possible compromise of system integrity or system
configuration.
Our company is not liable for blocked data access caused by improper TPM use. For operating instructions,
see the TPM documentation or the encryption technology feature documentation provided by the operating
system.