Intel Desktop Board D915GEV/D915GUX/D915GAV/D915GAG Product Guide
Security Precautions
Security, like any other aspect of computer maintenance requires planning. What is unique about security has to do with understanding who "friends" and adversaries are. The TPM provides mechanisms to enable the owner/user to protect their information from adversaries. To provide this protection the TPM effectively puts "locks" around the data. Just like physical locks, if keys or combinations are lost, the assets (i.e., data) may be inaccessible not only to adversaries, but also to asset owner/user.
The TPM provides two classes of keys: migratable and
CAUTION
The following precautions and procedures may assist in recovering from any of the previously listed situations. Failure to implement these security precautions and procedures may result in unrecoverable data loss.
Password Procedures
The Infineon Security Platform software allows users to configure passwords from 6 to 255 characters.
A good password should consist of:
•At least one upper case letter (A to Z)
•At least one numerical character (0 to 9)
•At least one symbol character (!, @, &, etc.)
Example Passwords: “I wear a Brown hat 2 worK @ least
NOTE
Avoid using names or dates that can be easily guessed such as: birthdays, anniversaries, family member names, pet names, etc.
All passwords associated with the Infineon Security Platform software (Owner, Emergency Recovery Token, and User passwords) and the Wave Systems EMBASSY Trust Suite are NOT RECOVERABLE and cannot be reset without the original text. The system owner should document all passwords, store them in a secured location (vault, safe deposit box,
64