HP Client Security Commercial Managed IT Software
31 
File and Folder Encryption 
✖  ✔ 
Infineon Trusted Platform Module 
HP PC’s feature a Trusted Platform Module (TPM) embedded security chip on select HP business notebooks, 
desktops and workstations. This embedded security chip is certified to the Trusted Computing Group (TCG) 
Evaluation Assurance Level 4+ (EAL4+) standard. HP platforms support the latest TPM v1.2. 
The Trusted Computing Group (TCG) is an international industry standards group. The TCG develops 
specifications amongst its members. Upon completion, the TCG publishes the specifications for use and 
implementation by the industry. Table 6 provides a list of TPM features and benefits on an HP PC. 
TPM Management uses a Microsoft Management Console (MMC) snap-in tool. The TPM Management can be 
run as a stand-alone console or it can be added/used with MMC. 
Table6 TPMFeaturesandBenefitsonHPPC’s
Feature Benefit 
Designed to the TCG standard  As a standards-based technology, TPM security chips are designed to work with a growing 
number of third party software solutions while providing a platform to support future 
hardware and operating system architectures. 
Supports Microsoft CAPI and 
PKCS#11 cryptographic 
software interfaces 
Enables the TPM security chip to enhance a broad range of existing applications and 
solutions that take advantage of these interfaces (for example, Microsoft Outlook®, 
Netscape Navigator, RSA SecurID and public key infrastructure solutions from leaders like 
Microsoft, VeriSign and Entrust) 
Enhanced Microsoft EFS  Helps protect sensitive user data stored locally on a PC, where access to Microsoft EFS 
encrypted files are protected by the embedded security chip, providing a higher degree of 
hardware-based protection 
Support for TPM v.1.2  HP PC’s support the latest TPM v1.2 
Some scenarios supported by the embedded TPM module include: 
  A computer with the TPM can create encryption keys that can only be decrypted by the same TPM. The TPM 
"wraps" encryption keys with its own storage root key, which is stored within the TPM. Storing the storage root 
key in the TPM microchip, rather than on your hard disk, offers better protection against attacks designed to 
expose your encryption keys. This can benefit multiple security applications that use encryption. 
  Also, a TPM owner password is created when TPM is first initialized. The TPM owner password helps ensure that 
only the authorized owner can access and manage the TPM on the computer. 
For more information on trusted computing solutions from HP, including more information on the embedded security chip 
solution for HP business desktop, notebook and workstation PCs, visit www.hp.com/go/security 
OR 
Visit: SLB9635 or http://www.infineon.com/cms/en/product/chip-card-and-security-ics/embedded-security/trusted-
computing/trusted-platform-module-tpm1.2-pc/channel.html?channel=ff80808112ab681d0112ab6921ae011f. 










