Dell Precision M20 Dell€Precision€Mobile€Worksta - Page 64

Enabling Trusted Platform Module TPM

Page 64 highlights

Deleting an Owner Tag NOTE: For security, you cannot set, change, or delete the owner tag if the primary or administrator passwords are set. 1. Boot the computer using the bootable media you created in "Assigning an Asset Tag." 2. Type asset /o /d and press . 3. When the computer prompts you to delete the owner tag, type y. Asset Tag Options To use one of the asset tag options (see the following table): 1. Boot the computer using the bootable media you created in "Assigning an Asset Tag." 2. Type asset and a space followed by the option, and then press . Asset Tag Option /d /o owner tag /o /d /? Description Deletes the asset tag Specifies a new owner tag Deletes the owner tag Displays the Asset Tag utility help screen Enabling Trusted Platform Module (TPM) NOTE: The TPM feature supports encryption only if the operating system supports TPM. For more information, see the software documentation. TPM is a hardware-based security feature that can be used to create and manage computer-generated encryption keys. When combined with security software, TPM enhances existing network and computer security by enabling features such as file protection capabilities and protected e-mail. The TPM feature is enabled through a TPM system setup option. NOTICE: If you use TPM, you must follow the backup procedures in the documentation that came with the software to secure your TPM data and encryption keys. In the event of these backups being incomplete, lost, or damaged, Dell will be unable to assist in the recovery of encrypted data. Enabling the TPM Feature 1. Turn on your computer. 2. Install the TPM Software. The TPM software is factory-installed in the C:\Dell\TPM directory. It may also be downloaded from support.dell.com. 3. Run the setup.exe file. Follow the on-screen instructions to install the Broadcom Secure Foundation software. If you are using TPM on your computer for the first time, proceed to step 4, otherwise, continue with step 5. 4. To enable the TPM software: a. Restart the computer and press during the Power On Self Test to enter the system setup program. b. Open the Security menu in system setup. c. Select the TPM Security menu option and press . d. Set the TPM security option to On. e. Press to exit the setup program. f. If prompted, select Save/Exit. 5. Activate the TPM setup program: a. Boot your computer to the Microsoft® Windows® operating system. b. Click Start® Programs® Broadcom Security Platforms Tools. Then, click the icon for the Security Platform Initialization Wizard.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115

Deleting an Owner Tag
1.
Boot the computer using the bootable media you created in "
Assigning an Asset Tag
."
2.
Type
asset /o /d
and press <Enter>.
3.
When the computer prompts you to delete the owner tag, type
y
.
Asset Tag Options
To use one of the asset tag options (see the following table):
1.
Boot the computer using the bootable media you created in "
Assigning an Asset Tag
."
2.
Type
asset
and a space followed by the option, and then press <Enter>.
Enabling Trusted Platform Module (TPM)
TPM is a hardware-based security feature that can be used to create and manage computer-generated encryption keys. When combined with security
software, TPM enhances existing network and computer security by enabling features such as file protection capabilities and protected e-mail. The TPM feature
is enabled through a TPM system setup option.
Enabling the TPM Feature
1.
Turn on your computer.
2.
Install the TPM Software.
The TPM software is factory-installed in the
C:\Dell\TPM
directory. It may also be downloaded from
support.dell.com
.
3.
Run the
setup.exe
file. Follow the on-screen instructions to install the Broadcom Secure Foundation software.
If you are using TPM on your computer for the first time, proceed to
step 4
, otherwise, continue with
step 5
.
4.
To enable the TPM software:
a.
Restart the computer and press <F2> during the Power On Self Test to enter the system setup program.
b.
Open the
Security
menu in system setup.
c.
Select the
TPM Security
menu option and press <Enter>.
d.
Set the TPM security option to
On
.
e.
Press <Esc> to exit the setup program.
f.
If prompted, select
Save/Exit
.
5.
Activate the TPM setup program:
a.
Boot your computer to the Microsoft
®
Windows
®
operating system.
b.
Click
Start
®
Programs
®
Broadcom Security Platforms Tools
. Then, click the icon for the
Security Platform Initialization Wizard
.
NOTE:
For security, you cannot set, change, or delete the owner tag if the primary or administrator passwords are set.
Asset Tag Option
Description
/d
Deletes the asset tag
/o
owner tag
Specifies a new owner tag
/o /d
Deletes the owner tag
/?
Displays the Asset Tag utility help screen
NOTE:
The TPM feature supports encryption only if the operating system supports TPM. For more information, see the software documentation.
NOTICE:
If you use TPM, you must follow the backup procedures in the documentation that came with the software to secure your TPM data and
encryption keys. In the event of these backups being incomplete, lost, or damaged, Dell will be unable to assist in the recovery of encrypted data.