User Manual
Table Of Contents
- HP ProLiant SL210t Gen8 Server User Guide
- Abstract
- Notice
- Contents
- Component identification
- Operations
- Power up the nodes
- Power down the node
- Remove the node from the chassis
- Remove the 1U cable guard
- Install the 1U cable guard
- Remove the PCI riser cage
- Install the PCI riser cage
- Remove the 2U adapter board bracket
- Install the 2U adapter board bracket
- Remove the Mini-SAS cable
- Connect the Mini-SAS cable
- Remove the 2U air baffle
- Install the 2U air baffle
- Remove the 1U air baffle
- Install the 1U air baffle
- Setup
- Hardware options installation
- Introduction
- Processor option
- Memory options
- Expansion board options
- GPU power cable option
- Smart Array controller cable options
- Installing the Mini-SAS P222 cable in a 1U node
- Installing the Mini-SAS P222 cable in a 2U node
- Installing the Mini-SAS P430 cable in a 1U node
- Installing the Mini-SAS P430 cable in a 2U node
- Installing the Mini-SAS P420 SFF cable in a 1U node
- Installing the Mini-SAS P420 SFF cable in a 2U node
- Installing the Mini-SAS P420 LFF cable in a 1U node
- Installing the Mini-SAS P420 LFF cable in a 2U node
- Installing the Mini-SAS P830 cable in a 2U node
- Controller options
- HP Trusted Platform Module option
- Cabling
- Software and configuration utilities
- Troubleshooting
- System battery
- Regulatory information
- Electrostatic discharge
- Specifications
- Support and other resources
- Acronyms and abbreviations
- Documentation feedback
- Index

Hardware options installation 56
Enabling the TPM requires accessing RBSU. For more information about RBSU, see the HP website
(http://www.hp.com/support/rbsu).
TPM installation requires the use of drive encryption technology, such as the Microsoft Windows BitLocker
Drive Encryption feature. For more information on BitLocker, see the Microsoft website
(http://www.microsoft.com).
CAUTION: Always observe the guidelines in this document. Failure to follow these guidelines
can cause hardware damage or halt data access.
When installing or replacing a TPM, observe the following guidelines:
• Do not remove an installed TPM. Once installed, the TPM becomes a permanent part of the system
board.
• When installing or replacing hardware, HP service providers cannot enable the TPM or the encryption
technology. For security reasons, only the customer can enable these features.
• When returning a system board for service replacement, do not remove the TPM from the system board.
When requested, HP Service provides a TPM with the spare system board.
• Any attempt to remove an installed TPM from the system board breaks or disfigures the TPM security
rivet. Upon locating a broken or disfigured rivet on an installed TPM, administrators should consider the
system compromised and take appropriate measures to ensure the integrity of the system data.
• When using BitLocker, always retain the recovery key/password. The recovery key/password is
required to enter Recovery Mode after BitLocker detects a possible compromise of system integrity.
• HP is not liable for blocked data access caused by improper TPM use. For operating instructions, see the
encryption technology feature documentation provided by the operating system.
Installing the Trusted Platform Module board
WARNING: To reduce the risk of personal injury, electric shock, or damage to the equipment,
remove the power cord to remove power from the node. The front panel Power On/Standby
button does not completely shut off system power. Portions of the power supply and some internal
circuitry remain active until AC power is removed.
WARNING: To reduce the risk of personal injury from hot surfaces, allow the drives and the
internal system components to cool before touching them.
1. Power down the node (on page 17).
2. Remove the node from the chassis (on page 17).
3. Place the node on a flat, level work surface.
4. Remove the PCI riser cage (on page 20).
CAUTION:
Any attempt to remove an installed TPM from the system board breaks or disfigures
the TPM security rivet. Upon locating a broken or disfigured rivet on an installed TPM,
administrators should consider the system compromised and take appropriate measures to ensure
the integrity of the system data.