About This User's Guide
This user's guide is written for system integrators, IT professionals, and knowl-
edgeable end users who wish to add additional data security mechanisms to their
systems to protect highly sensitive applications. It provides detailed information on
configuring, provisioning, and using the Trusted Platform Module (TPM).
User's Guide Organization
Chapter 1 provides an overview of the TPM, including its features and uses.
Chapter 2 provides detailed instructions on installing, provisioning, and using the
TPM.
Conventions Used in This User's Guide
Pay special attention to the following symbols for proper TPM configuration.
Warning: Important information given to avoid TPM configuration errors.
Note: Additional information given to ensure correct and proper TPM
configuration setup.
Preface
iii
Preface