Appendix B Statement Of Volatility - HP ProDesk 400 G2 Small Form Factor Maintenance And Service Manual

Table of Contents

Advertisement

B
Statement of Volatility
HP confirms that Intel-based business desktop HP ProDesk 400 G2 Small Form Factor systems contain DDR3
volatile memory (memory amount depends on the customer configuration). In addition, the motherboard in
the condition originally shipped without subsequent modification or the addition or installation of any
applications, features, or functionality, contains the following nonvolatile memory: Real Time Clock battery
backed-up configuration memory (256 Bytes), DIMM Serial Presence Detect (SPD) configuration data (256
Bytes per module, 128 Bytes programmable), Serial Peripheral Interface (SPI) ROM for System BIOS (16M
Bytes) and Super I/O's: masked keyboard ROM (overall 2K Bytes).
HP ProDesk 400 G2 Small Form Factor models include a Trusted Platform Module (TPM) that contains 16K
Bytes of non-volatile memory for user data. The volatile memory will not hold any user data once power has
been removed for 30 seconds or longer.
The following procedure shows the steps that should be taken to restore the Non-Volatile memory found in
the Intel-based HP ProDesk 400 G2 Small Form Factor systems.
1.
Download the latest BIOS (system ROM) from the HP website.
2.
Follow the instructions to flash the BIOS that are found on the website.
Flashing the BIOS will reset it back to factory settings.
3.
Turn on the system, and while system is powering on, and after the HP splash screen, press the
to enter BIOS setup screen.
4.
Select Security > System Security from the main menu. If the Embedded Security Device Support
option is set to "Disable", skip to step 7.
5.
To erase all security keys from the TPM:
Under Embedded Security Device in the System Security menu, configure Reset to Factory Settings to
Reset.
NOTE:
not be. Data stored in these indices should not contain security sensitive information. If an application
locks down and secures the non-volatile indices, these indices cannot be cleared.
6.
Press
F10
7.
To clear the secure boot key database:
a.
Enter the F10 setup utility.
b.
Go to the Security menu.
c.
Select Secure Boot Configuration.
d.
In the Key Management section, select clear Secure boot keys.
e.
Use space key to select clear.
f.
Press the
g.
From the main menu select File > Save Changes and Exit.
8.
If the Ownership Tag or Asset Tag is set, manually clear it under Security > System Ids.
9.
Select File > Save Changes and Exit.
Although the TPM security keys will be cleared, data in the non-volatile memory indices may
to accept changes.
F10
key to accept changes.
F10
key
133

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents