
Preface
About This User's Guide
This user's guide is written for system integrators, IT professionals, and knowledge-
able end users who wish to add additional data security levels to their systems to
protect highly sensitive applications. It provides detailed information on conguring,
provisioning, and using the trusted platform module (TPM).
User's Guide Organization
Chapter 1 provides an overview of the trusted platform module (TPM), including
its features and uses.
Chapter 2 provides detailed instructions on installing, provisioning, and using the
TPM.
Conventions Used in This User's Guide
Pay special attention to the following symbols for proper TPM conguration.
Warning: Important information given to avoid TPM conguration errors.
Note: Additional information given to ensure correct TPM conguration
setup.
iii
Preface
Comentários a estes Manuais