HP Customer Support - Knowledge Base




  • Information
    We are upgrading our website

    If you experience errors during this time, please try again later. 



HP t820 Flexible Thin Client - Statement of Volatility

Statement of Volatility

HP confirms that Intel-based HP t820 Flexible Thin Client systems contain DDR3 volatile memory (memory amount depends on the customer configuration). In addition, the motherboard in the condition originally shipped without subsequent modification or the addition or installation of any applications, features, or functionality, contain the following nonvolatile memory: Real Time Clock battery backed-up configuration memory (256 Bytes), DIMM Serial Presence Detect (SPD) configuration data (256 Bytes per module, 128 Bytes programmable), Serial Peripheral Interface (SPI) ROM for System BIOS (16M Bytes) and Super I/O’s: masked keyboard ROM (overall 2K Bytes). In addition, these units contain a Trusted Platform Module (TPM) that contains 16K Bytes of non-volatile memory for user data. The volatile memory will not hold any user data once power has been removed for 30 seconds or longer.
The following lists steps that should be taken to restore the Non Volatile memory found in the Intel-based HP t820 Flexible Thin Client systems.
  1. Download the latest BIOS (system ROM) from the HP website.
  2. Follow the instructions for flashing the BIOS.
  3. Shut down the computer.
  4. Power on the computer and enter the Computer Setup Utility as follows:
    1. Press the Esc key when the “Press the ESC key for Startup Menu” prompt appears near the bottom of the screen.
    2. Select Computer Setup (F10) from the Startup Menu list.
  5. From the main menu, select Security, and then select System Security. In the menu, if the Embedded Security Device Support option shows Disable, skip to step 8.
  6. To erase all security keys from the TPM:
    1. Under Embedded Security Device in the System Security menu, set Reset to Factory Settings to Reset.
      Although the TPM security keys are cleared, data in the non-volatile memory indices may not be cleared. Data stored in these indices should not contain security sensitive information. If an application locks down and secures the non-volatile indices, these indices cannot be cleared.
  7. Press the F10 key to accept changes.
  8. To clear the secure boot key database.
  9. Enter the F10 Setup Utility.
  10. Go to the Security menu.
  11. Select Secure Boot Configuration.
  12. Use the arrow to select Clear Secure boot keys in the Key Management section.
  13. Use the space key to select Clear.
  14. Press F10 to accept changes.
  15. From the main menu, select File, and then select Save Changes and Exit.
  16. Enter the F10 Setup Utility.
  17. If the Ownership Tag or Asset Tag is set, manually clear it by selecting Security, and then System IDs.
  18. Select File, and the select Save Changes and Exit.
  19. To clear the Setup or Power-On passwords and clear any other settings, power down the computer and remove the AC power cord and the computer hood.
  20. Locate the green two pin password jumpers on header E49 (labeled PSWD) and remove it.
  21. Remove the AC power, wait 10 seconds until the unit AC power drains out, then press the clear CMOS button on the system board. This is typically a yellow push button (labeled CMOS).
  22. Replace the hood and AC power cord and turn the computer on. The passwords are now cleared and all other user-configurable, non-volatile memory settings are reset to their factory default values.
  23. Enter the F10 Setup Utility.
  24. To set default settings back to factory defaults, select File, select Default Setup, and then select Restore Factory Settings as Default.
  25. Select File, and the select Apply Defaults and Exit.
  26. Shut down the computer, remove the AC power cord, and then place the green jumper back on header E49. Replace the computer hood and power cord.
If Computrace is enabled on the computer, see the service provider for instruction to disable the feature.






Country/Region: Flag Australia