Users Manual Part 2

62 l
The TPM is a security hardware device on the system board that holds computer-generated
keys for encryption. The purpose of the TPM is to help to avoid attacks by hackers who aim to
capture passwords and encryption keys to sensitive data. The TPM provides the ability to run
applications more secure and to make transactions and communication more trustworthy. The
security features provided by the TPM involve the following: random number generation, hashing,
asymmetric key generation, and asymmetric encryption/decryption. Each individual TPM has its
unique signature initialized during the silicon manufacturing process that further enhances its
trust/security effectiveness. Each TPM must have an Owner before it can be used as a security
device.
Trusted Platform Module (TPM)
Protecting Your Computer
6 Choose how much of your drive to encrypt. The options include Encrypt used disk space only
and Encrypt entire drive. When done, click on the Next button.
7 Choose which encryption mode to use. The options include New encryption mode and
Compatible mode. When done, click on the Next button.
8 Check the Run BitLocker system check to ensure that BitLocker can read the recovery and
encryption keys correctly and then click on the Start encrypting button. The encryption
begins. The whole procedure might take a while depending on the size of the drive. While the
hard drive is being encrypted, you can keep working.
The TPM, when bundled with an optional security software package, can provide overall system
security, le protection features, and protect against email/privacy concerns.
To enable the TPM support and its associated features, do the following:
1 During system setup, press the F2 key to open the Nexstgo System Conguration utility.
2 Use the four-directional keys ( , , , ) on the keyboard to select Setup Utility and press
Enter key. The Setup Utility Main menu opens.
3 Use
, keys to select Security.