HP Trusted Platform Module installation guidelines

CAUTION: Always observe the guidelines in this document. Failure to follow these guidelines can cause hardware damage or halt data access.
When installing or replacing a TPM, observe the following guidelines:
  • Do not remove an installed TPM. Once installed, the TPM becomes a permanent part of the system board.

  • When installing or replacing hardware, Hewlett Packard Enterprise service providers cannot enable the TPM or the encryption technology. For security reasons, only the customer can enable these features.

  • When returning a system board for service replacement, do not remove the TPM from the system board. When requested, HPE Service provides a TPM with the spare system board.

  • Any attempt to remove an installed TPM from the system board breaks or disfigures the TPM security rivet. Upon locating a broken or disfigured rivet on an installed TPM, administrators should consider the system compromised and take appropriate measures to ensure the integrity of the system data.

  • When using BitLocker, always retain the recovery key/password. The recovery key/password is required to enter Recovery Mode after BitLocker detects a possible compromise of system integrity.

  • HPE is not liable for blocked data access caused by improper TPM use. For operating instructions, see the encryption technology feature documentation provided by the operating system.