HP EliteDesk 800 G8 TamperLock User Guide - Page 5

Overview

Page 5 highlights

1 Overview HP TamperLock protects against an attacker opening the case of your PC and modifying the hardware in a malicious manner. HP TamperLock includes sensors to detect whether the case was opened and policy controls to configure what action to take if it occurs. HP TamperLock policies include the optional abilities of blocking system boot at the BIOS level until valid BIOS administrator credentials are entered, clearing the HP Trusted Platform Module (TPM) to delete all user keys (for example, BitLocker keys that render the data stored on the local drive accessible only via a remotely stored BitLocker recovery key), and the ability to turn off the system immediately when the cover is removed. Cover opening events and history are stored in platform hardware and can be queried by a remote administrator. HP TamperLock policies are protected from being changed by protected storage rooted in the HP Endpoint Security Controller hardware. Protected storage provides physical attack protection for BIOS and firmware data and settings stored in flash memory related to HP TamperLock settings. This capability is always present on systems that support HP TamperLock and cannot be disabled. 1

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10

1
Overview
HP TamperLock protects against an attacker opening the case of your PC and modifying the hardware in a
malicious manner. HP TamperLock includes sensors to detect whether the case was opened and policy
controls to configure what action to take if it occurs.
HP TamperLock policies include the optional abilities of blocking system boot at the BIOS level until valid BIOS
administrator credentials are entered, clearing the HP Trusted Platform Module (TPM) to delete all user keys
(for example, BitLocker keys that render the data stored on the local drive accessible only via a remotely
stored BitLocker recovery key), and the ability to turn off the system immediately when the cover is removed.
Cover opening events and history are stored in platform hardware and can be queried by a remote
administrator.
HP TamperLock policies are protected from being changed by protected storage rooted in the HP Endpoint
Security Controller hardware. Protected storage provides physical attack protection for BIOS and firmware
data and settings stored in flash memory related to HP TamperLock settings. This capability is always present
on systems that support HP TamperLock and cannot be disabled.
1