Failsafe Boot Block; Recovering The Computer From Boot Block Recovery Mode; Workstation Security - HP Z1 Maintenance And Service Manual

Workstation
Hide thumbs Also See for Z1:
Table of Contents

Advertisement

FailSafe Boot Block

The FailSafe Boot Block enables BIOS recovery in the unlikely event of a ROM flash failure. For
example, if a power failure occurs during a ROM upgrade, the Boot Block uses a flash-protected
section of the ROM to verify a valid system ROM flash when power is restored to the computer.
If the system ROM is valid, the computer starts normally.
If the system ROM fails the validation check, the FailSafe Boot Block provides enough support to start
the computer from a BIOS image CD created from a SoftPaq. The BIOS image CD programs the
system ROM with a valid image.
When Boot Block detects an invalid system ROM, the computer power LED blinks red eight times and
the computer beeps eight times; then the computer pauses for two seconds. On some models, a Boot
Block recovery mode message appears.
In preparation for system recovery, use the BIOS CD media file in the SoftPaq to create a BIOS
image CD or USB key.

Recovering the computer from Boot Block Recovery mode

To recover the computer after it enters Boot Block recovery mode:
1.
Remove any media such as USB keys or disks in the optical disk drives.
2.
Insert a BIOS image CD into the DVD drive. You can also use USB media such as an HP
DriveKey.
3.
Power off, then power on the computer.
If no BIOS image CD or USB media is found, you are prompted to insert one and restart the
computer.
If a setup password has been established, the Caps Lock light illuminates and you are prompted
for the password.
4.
Enter the setup password.
If the computer starts from the boot media and successfully reprograms the ROM, three
keyboard lights illuminate and a rising-tone series of beeps signals successful recovery.
5.
Remove the boot media and power off the computer.
6.
Restart the computer.

Workstation security

This section provides information about providing system security through asset tracking, password
security, hard disk drive locking, and chassis locks.
Desktop management
27

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents