Optima x561 Guide De Référence
6
Trusted Platform Module Quick Reference
Hard Drive Image Backup Procedures
To allow for emergency recovery from a hard drive failure, frequent images of
the hard drive should be created and stored in a secure location. In the event of
a hard drive failure, the latest image can be restored to a new hard drive and
access to the encrypted data can be re-established.
the hard drive should be created and stored in a secure location. In the event of
a hard drive failure, the latest image can be restored to a new hard drive and
access to the encrypted data can be re-established.
✏
NOTE
All encrypted and unencrypted data that was added after the last image
was created will be lost.
was created will be lost.
Clear Text Backup (Optional)
It is recommended that system owners follow the Hard Drive Image Backup
Procedures.
This option is not recommended because the data is exposed during backup and
restores. To backup select files without creating a drive image, files can be
moved from secured programs or drive letters to an unencrypted directory. The
unencrypted (clear text) files may then be backed up to removable media and
stored in a secure location. The advantage of the clear text backup is that no
TPM key is required to restore the data.
Procedures.
This option is not recommended because the data is exposed during backup and
restores. To backup select files without creating a drive image, files can be
moved from secured programs or drive letters to an unencrypted directory. The
unencrypted (clear text) files may then be backed up to removable media and
stored in a secure location. The advantage of the clear text backup is that no
TPM key is required to restore the data.
Trusted Platform Module Ownership
The Trusted Platform Module is disabled by default when shipped and the
owner/end customer of the system assumes “ownership” of the TPM. This
permits the owner of the system to control initialization of the TPM and create
all the passwords associated with the TPM that will be used to protect their keys
and data.
System builders/integrators may install both the Wave Systems EMBASSY
Security Center and the Wave Systems EMBASSY Trust Suite, but SHOULD
NOT attempt to use or activate the TPM or either software package.
owner/end customer of the system assumes “ownership” of the TPM. This
permits the owner of the system to control initialization of the TPM and create
all the passwords associated with the TPM that will be used to protect their keys
and data.
System builders/integrators may install both the Wave Systems EMBASSY
Security Center and the Wave Systems EMBASSY Trust Suite, but SHOULD
NOT attempt to use or activate the TPM or either software package.
Trusted Platform Module Software Installation
The software package for the TPM can be installed from the following location
on the Intel Express Installer CD:
on the Intel Express Installer CD:
D:\software\Drivers\TPM\1.00.05R\1.00.05_NO_TPMPATCH_CCEK\setup.exe