Trusted Platform Module - Dell XC430 Owner's Manual

Web-scale hyperconverged appliance
Hide thumbs Also See for XC430:
Table of Contents

Advertisement

Entering the system Service Tag using System Setup
If you know the system Service Tag, use the System Setup menu to enter the Service Tag.
1.
Turn on the system.
2.
Press F2 to go to the System Setup.
3.
Click Service Tag Settings.
4.
Type the Service Tag.
NOTE: You can type the only when the Service Tag field is empty. Ensure that you enter the
correct Service Tag. Once the Service Tag is entered, it cannot be updated or changed.
5.
Click Ok.
6.
Import your new or existing iDRAC Enterprise license.
For more information, see Integrated Dell Remote Access Controller User's Guide, at Dell.com/
idracmanuals.
Restoring the Service Tag using Easy Restore
Use the Easy Restore feature if you do not know the Service Tag of your system. The Easy Restore feature
allows you to restore your system's Service Tag, license, UEFI configuration, and the system configuration
data after replacing the system board. All data is backed up in a backup flash device automatically. If BIOS
detects a new system board and the Service Tag in the backup flash device, BIOS prompts the user to
restore the backup information.
1.
Turn on the system.
If BIOS detects a new system board, and if the Service Tag is present in the backup flash device, BIOS
displays the Service Tag, the status of the license, and the UEFI Diagnostics version.
2.
Do one of the following:
To restore the Service Tag, license, and diagnostics information, press Y.
To navigate to the Lifecycle Controller based restore options, press N.
To restore data from a previously created Hardware Server Profile, press F10.
After the restore process is complete, BIOS prompts to restore the system configuration data.
3.
Do one of the following:
Press Y to restore the system configuration data.
Press N to use the default configuration settings.
After the restore process is complete, the system restarts.

Trusted Platform Module

The Trusted Platform Module (TPM) is used to generate/store keys, protect/authenticate passwords, and
create/store digital certificates. TPM can also be used to enable the BitLocker hard drive encryption
feature in Windows Server.
CAUTION: Do not attempt to remove the Trusted Platform Module (TPM) from the system board.
After the TPM is installed, it is cryptographically bound to that specific system board. Any attempt
to remove an installed TPM breaks the cryptographic binding, and it cannot be re-installed or
installed on another system board.
91

Advertisement

Table of Contents
loading

Table of Contents