This document provides information on the removal and replacement of all
parts as well as information on troubleshooting, Desktop Management, setup
utilities, PATA drives, safety, routine care, connector pin assignments, POST
error messages, and diagnostic indicator lights.
Microsoft, MS-DOS, Windows, and Windows NT are trademarks of Microsoft Corporation in the U.S. and other
countries.
Intel is a trademark of Intel Corporation in the U.S. and other countries.
The only warranties for HP products and services are set forth in the express warranty statements accompanying
such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall
not be liable for technical or editorial errors or omissions contained herein.
This document contains proprietary information that is protected by copyright. No part of this document may be
photocopied, reproduced, or translated to another language without the prior written consent of Hewlett-Packard
Company.
Product of the United States.
WARNING: Text set off in this manner indicates that failure to follow directions could result in bodily
Å
harm or loss of life.
CAUTION: Text set off in this manner indicates that failure to follow directions could result in damage to
ESystem Board and Riser Board Reference Designators
FMemory
Index
vi360201-002Service Reference Guide, dc5000
Installing the Operating System
Windows XP Professional is preinstalled on the computer and will be configured automatically
the first time the computer is turned on.
CAUTION: Do not add optional hardware devices to your computer until the operating system is
Ä
successfully installed. Doing so may cause errors and may prevent the operating system from installing
properly.
CAUTION: Once the automatic installation has begun, DO NOT TURN OFF THE COMPUTER UNTIL
Ä
THE PROCESS IS COMPLETE. Turning off the computer during the installation process might damage the
software that runs the computer.
The first time the computer is turned on, the operating system is automatically installed. This
takes approximately 10 minutes, depending on the system hardware configuration. At the
beginning of the installation process, you are prompted to select the appropriate language for the
operating system. Read and follow the instructions that appear on the screen to complete the
installation.
During this process, do not turn off your computer unless you are directed to do so.
1
1.0.1 Installing or Upgrading Device Drivers
To install hardware devices such as a printer, a display adapter, or network adapter after the
operating system installation is completed, the operating system needs access to the appropriate
software drivers for the devices.
When prompted for the I386 directory on the operating system CD, replace the path specification
with C:\I386 or use the browse button of the dialog box to browse the computer for the I386
folder.
1.0.2 Creating a Bootable Diskette or USB Flash Media Device
1. Insert a diskette into the diskette drive or attach the USB device.
2. Click Start, then click My Computer.
3. Right-click the diskette drive or USB device, then click Format.
4. Select the Create an MS-DOS startup disk check box, then click Start.
5. Follow the instructions that appear on the screen.
Service Reference Guide, dc5000360201-0021–1
Installing the Operating System
1.1 HP Soft ware
The Microsoft Windows XP Professional operating system is preinstalled on the computer and
will be configured automatically the first time the computer is turned on. The following HP
software will also be installed at that time on selected models:
■ Computer Setup Utilities and diagnostic features
■ HP Support Software including device drivers
■ Configuration Record
■ Online Safety & Comfort Guide
■ HP Intelligent Manageability
■ Enhanced HP Insight Personal Edition (Diagnostics for Windows)
■ DMI Support
■ Power Management with energy saver features
■ Security Management tools
■ Software Support Management tools
Certain drivers and utilities are available only in selected languages. You can obtain the latest
version of these files, in English and selected other languages, in one of three ways:
■ Support Software CD
■ HP web site at www.hp.com
■ Compaq Restore Plus! CD, which is supplied with many Compaq models
Additional HP software may be required in certain situations.
✎
1–2360201-002Service Reference Guide, dc5000
Setup Utilities and Diagnostics Features
Setup Utilities (F10) and diagnostic features provide information needed about the computer
system when contacting Customer Support. These tools can also be used to:
■ Change factory default settings and to set or change the system configuration, which may be
necessary when you add or remove hardware.
■ Determine if all of the devices installed on the computer are recognized by the system and
functioning properly.
■ Determine information about the operating environment of the computer.
■ Solve system configuration errors detected but not automatically fixed during the Power-On
Self-Test (POST).
■ Establish and manage passwords and other security features.
■ Establish and manage energy-saving timeouts.
All features identified in this chapter may not be available on all HP products.
✎
2
2.1 Power-On Self-Test (POST)
POST is a series of diagnostic tests that runs automatically when the system is turned on. POST
checks the following items to ensure that the computer system is functioning properly:
■ Keyboard
■ Memory modules
■ Diskette drives
■ All IDE and mass storage devices
■ Processors
■ Controllers
If the Power-On Password is set, a key icon appears on the screen while POST is running. You
✎
will need to enter the password before continuing. Refer to Chapter 3,
Configuration and Deployment,” for information on setting, deleting, or bypassing the password.
If POST finds an error in the system, an audible and/or visual message occurs. For POST error
messages and their solutions refer to Appendix C, “POST Error Messages.”
Section 3.1, “Initial
Service Reference Guide, dc5000360201-0022–1
Setup Utilities and Diagnostics Features
2.2 Computer Setup Utilities
Use Computer Setup Utilities (F10) to:
■ Modify or restore factory default settings.
■ Set the system date and time.
■ Set, view, change, or verify the system configuration including settings for processor,
graphics, memory, audio, storage, communications, and input devices.
■ Modify the boot order of bootable devices such as hard drives, diskette drives, optical drives,
or LS-120 drives.
■ Configure the boot priority of IDE (ATA) and USB hard drive controllers.
■ Enable Quick Boot which is faster than Full Boot but does not run all of the diagnostic tests
run during a Full Boot. You can set your system to:
❏ always Quick Boot (default);
❏ periodically Full Boot (from every 1 to 30 days); or
❏ always Full Boot.
■ Enable or disable Network Server Mode, which allows the computer to boot the operating
system when the power-on password is enabled with or without a keyboard or mouse
attached. When attached to the system, the keyboard and mouse remain locked until the
power-on password is entered.
■ Select POST Messages Enabled or Disabled to change the display status of Power-On
Self-Test (POST) messages. POST Messages Disabled suppresses most POST messages,
such as memory count, product name, and other non-error text messages. If a POST error
occurs, the error is displayed regardless of the mode selected. To manually switch to POST
Messages Enabled during POST, press any key (except
■ Establish an Ownership Tag, the text of which is displayed each time the system is turned on
F1 through F12).
or restarted.
■ Enter the Asset Tag or property identification number assigned by your company to this
computer.
■ Enable power-on password prompting during system restarts (warm boots) as well as during
power-on.
■ Establish a setup password that controls access to Computer Setup (F10) Utility and the
settings described in this section.
■ Secure the integrated I/O functionality, including the serial, USB, or parallel ports, audio, or
embedded NIC, so that they cannot be used until they are unsecured.
■ Enable or disable Master Boot Record (MBR) Security.
■ Enable or disable removable media boot ability.
■ Enable or disable removable media write ability (when supported by hardware).
■ Solve system configuration errors detected but not automatically fixed during the Power-On
Self-Test (POST).
■ Replicate your system setup by saving system configuration information on diskette and
restoring it on one or more computers.
■ Execute self-tests on a specified IDE (ATA) hard drive (when supported by the drive).
2–2360201-002Service Reference Guide, dc5000
2.2.1 Using Computer Setup (F10) Utilities
Computer Setup can be accessed only by turning on the computer or restarting the system. To
access the Computer Setup Utilities menu, complete the following steps:
1. Turn on or restart the computer. If you are in Windows, click Start >Shut Down >Restart the Computer.
2. Press the F10 key as soon as the monitor light turns green.
If you do not press the F10 key at the appropriate time, you must turn the computer off, then on
✎
again, and press the F10 key again to access the utility.
3. Select your language from the list and press the Enter key.
4. A choice of four headings appears in the Computer Setup Utilities menu: File, Storage,
Security, and Advanced.
5. Use the arrow (left and right) keys to select the appropriate heading. Use the arrow (up and
down) keys to select the option you want, then press
Utilities menu, press
6. To apply and save changes, select File > Save Changes and Exit.
Esc.
Enter. To return to the Computer Setup
Setup Utilities and Diagnostics Features
❏ If you have made changes that you do not want applied, select Ignore Changes and
Exit.
❏ To reset to factory settings, select Set Defaults and Exit. This option will restore the
original factory system defaults.
CAUTION: Do NOT turn the computer power OFF while the ROM is saving your F10 Computer Setup
Ä
changes because the CMOS could become corrupted. It is safe to turn off all power to the computer
after you exit the F10 Setup screen.
Service Reference Guide, dc5000360201-0022–3
Setup Utilities and Diagnostics Features
2.2.2 Computer Setup Menu
.
HeadingOptionDescription
File System InformationLists product name, processor type/speed/stepping, cache
size (L1/L2), system ROM family and version, installed memory
size (number of channels (single/dual) if applicable), chassis
serial number, integrated MAC for enabled or embedded NIC
(if applicable), and asset tracking number.
AboutDisplays copyright information.
Set Time and DateAllows you to set system time and date.
Save to DisketteSaves system configuration, including CMOS, to a formatted
blank 1.44-MB diskette in file CPQsetup.txt. Save/Restore for
Drive Key is supported.
Restore from
Diskette
Set Defaults and
Exit
Ignore Changes
and Exit
Save Changes
and Exit
Storage Device
Configuration
Restores system configuration from a diskette. Save/Restore for
Drive Key is supported.
Restores factory default settings which includes clearing any
established passwords.
Exits Computer Setup without applying or saving any changes.
Saves changes to system configuration and exits Computer
Setup.
Lists all installed BIOS controlled storage devices.
SCSI storage drives will not be listed in Computer (F10)
✎
Setup.
When a device is selected, detailed information and options
are displayed. The following options may be presented:
Diskette Type (For legacy diskette drives only)
Identifies the highest capacity media type accepted by the
diskette drive. Options are 3.5" 1.44 MB and 5.25" 1.2 MB.
Drive Emulation(IDE devices only)
Allows you to select a drive emulation type for a storage
device. (For example, a Zip drive can be made bootable by
selecting disk emulation.)
Drive TypeEmulation Options
ATAPI Zip driveNone (treated as Other).
Diskette (treated as diskette drive).
IDE Hard diskNone (treated as Other) Disk (treated as
hard drive).
Legacy disketteNo emulation options available.
IDE CD-ROMNo emulation options available.
2–4360201-002Service Reference Guide, dc5000
Setup Utilities and Diagnostics Features
HeadingOptionDescription
Storage
(continued)
Device
Configuration
(continued)
Drive Type
(continued)
ATAPI LS-120None (treated as Other).
Transfer Mode(IDE devices only)
Specifies the active data transfer mode. Options (subject to
device capabilities) are PIO 0, Max PIO, Enhanced DMA,
Ultra DMA 0, and Max UDMA.
Translation Mode (IDE disks only)
Lets you select the translation mode to be used for the device.
This enables the BIOS to access disks partitioned and formatted
on other systems and may be necessary for users of older
versions of Unix (e.g., SCO Unix version 3.2). Options are
Bit-Shift, LBA Assisted, User, and Off.
Ordinarily, the translation mode selected automatically by
Ä
the BIOS should not be changed. If the selected translation
mode is not compatible with the translation mode that was
active when the disk was partitioned and formatted, the data
on the disk will be inaccessible.
Translation Parameters (IDE disks only)
Allows you to specify the parameters (logical cylinders, heads,
and sectors per track) used by the BIOS to translate disk I/O
requests (from the operating system or an application) into
terms the hard drive can accept. Logical cylinders may not
exceed 1023. The number of heads may not exceed 255. The
number of sectors per track may not exceed 63. These fields
are only visible and changeable when the drive translation
mode is set to User.
Emulation Options
(continued)
Diskette (treated as diskette drive).
Multisector Transfers (IDE disks only)
Specifies how many sectors are transferred per multi-sector PIO
operation. Options (subject to device capabilities) are Disable,
8, and 16.
OptionsRemovable Media Boot
Enables/disables ability to boot the system from removable
media.
Removable Media Write
Enables/disables ability to write data to removable media.
This feature applies only to legacy diskette, (IDE/ATA)
✎
LS-120 Superdisk, (IDE/ATA) LS-240 Superdisk, and
(IDE/ATA) PD-optical drives.
After saving changes to Removable Media Boot, the
✎
computer will restart. Manually, turn the computer off, then
on.
*Option supported on select models.
Service Reference Guide, dc5000360201-0022–5
Setup Utilities and Diagnostics Features
HeadingOptionDescription
Storage
(continued)
Options
(continued)
IDE DPS Self-TestAllows you to execute self-tests on IDE hard drives capable of
Controller Order Allows you to specify the order of the attached hard drive
Primary IDE Controller *
Allows you to enable or disable the primary IDE/ATA
controller.
Secondary IDE Controller *
Allows you to enable or disable the secondary IDE/ATA
controller.
BIOS IDE DMA Transfers
Allows you to control how BIOS disk I/O requests are serviced.
When “Enable” is selected, the BIOS will service all disk I/O
requests with DMA data transfers. When “Disable” is selected,
the BIOS will service all disk I/O requests with PIO data
transfers.
performing the Drive Protection System (DPS) self-tests.
This selection will only appear when at least one drive
✎
capable of performing the IDE DPS self-tests is attached to the
system.
controllers. The first hard drive controller in the order will have
priority in the boot sequence and will be recognized as drive C
(if any devices are attached).
Boot OrderAllows you to specify the order in which attached peripheral
devices (such as a diskette drive, hard drive, optical drive, or
network interface card) are checked for bootable operating
system image. Each device on the list may be individually
excluded from or included for consideration as a bootable
operating system source.
MS-DOS drive lettering assignments may not apply after a
✎
non-MS-DOS operating system has started.
Shortcut to Temporarily Override Boot Order
To boot one time from a device other than the default device
specified in Boot Order, restart the computer and press F9
when the monitor light turns green. After POST is completed, a
list of bootable devices is displayed. Use the arrow keys to
select the preferred bootable device and press Enter. The
computer then boots from the selected non-default device for
this one time.
Security Setup PasswordAllows you to set and enables setup (administrator) password.
If the setup password is set, it is required to change
✎
Computer Setup options, flash the ROM, and make changes
to certain plug and play settings under Windows.
See the Troubleshooting Guide for more information.
Power-On
Password
Allows you to set and enable power-on password.
See the Troubleshooting Guide for more information.
*Option supported on select models.
2–6360201-002Service Reference Guide, dc5000
Setup Utilities and Diagnostics Features
HeadingOptionDescription
Security
(continued)
Password Options
(This selection will
appear only if a
power-on
password is set.)
Embedded
Security*
System IDsAllows you to set:
Master Boot
Record Security*
Allows you to specify whether the password is required for
warm boot (CTRL+ALT+DEL).
See the Desktop Management Guide for more information.
Allows you to set up a password and enable/disable the
embedded Security device.
See the Desktop Management Guide for more information.
• Asset tag (18-byte identifier) and ownership Tag (80-byte
identifier displayed during POST).
See Chapter 3, Desktop Management, in this Guide.
• Chassis serial number or Universal Unique Identifier (UUID)
number. The UUID can only be updated if the current
chassis serial number is invalid. (These ID numbers are
normally set in the factory and are used to uniquely identify
the system.)
Keyboard locale setting (for example, English or German) for
System ID entry.
Allows you to enable or disable Master Boot Record (MBR)
Security.
When enabled, the BIOS rejects all requests to write to the
MBR on the current bootable disk. Each time the computer is
powered on or rebooted, the BIOS compares the MBR of the
bootable disk to the previously saved MBR. If changes are
detected, you are given the option of saving the MBR on the
current bootable disk, restoring the previously-saved MBR, or
disabling MBR security. You must know the setup password if
one is set.
Disable MBR Security before intentionally changing the
✎
formatting or partitioning of the current bootable disk.
Several disk utilities (such as FDISK and FORMAT) attempt to
update the MBR.
If MBR Security is enabled and disk accesses are being
serviced by the BIOS, write requests to the MBR are rejected,
causing the utilities to report errors.
If MBR Security is enabled and disk accesses are being
serviced by the operating system, any MBR change will be
detected by the BIOS during the next reboot, and an MBR
Security warning message will be displayed.
Save Master Boot
Record*
*Option supported on select models.
Service Reference Guide, dc5000360201-0022–7
Saves a backup copy of the Master Boot Record of the current
bootable disk.
Only appears if MBR Security is enabled.
✎
Setup Utilities and Diagnostics Features
HeadingOptionDescription
Security
(continued)
*Option supported on select models.
Restore Master
Boot Record*
Device Security*Enables/disables serial ports A and B, parallel port, front USB
Network Service
Boot
Restores the backup Master Boot Record to the current
bootable disk.
Only appears if all of the following conditions are true:
✎
MBR Security is enabled.
A backup copy of the MBR has been previously saved.
The current bootable disk is the same disk from which the
backup copy of the MBR was saved.
Caution: Restoring a previously saved MBR after a disk
Ä
utility or operating system has modified the MBR may cause
the data on the disk to become inaccessible. Only restore a
previously saved MBR if you are confident that the current
bootable disk’s MBR has been corrupted or infected with a
virus.
ports, all USB ports, system audio, network controllers (some
models), Multibay devices (some models), and SCSI controllers
(some models).
Enables/disables the computer’s ability to boot from an
operating system installed on a network server. (Feature
available on NIC models only; the network controller must
reside on the PCI bus or be embedded on the system board.)
2–8360201-002Service Reference Guide, dc5000
HeadingOptionDescription
Advanced** Power-On OptionsAllows you to set:
POST mode (QuickBoot, FullBoot, or FullBoot every 1-30 days).
POST messages (enable/disable).
F9 prompt (enable/disable). Enabling this feature will display
the text F9=Boot Menu during POST. Disabling this feature
prevents the text from being displayed but pressing F9 will still
access the Shortcut Boot (Order) Menu screen. See Storage >
Boot Order for more information.
F10 prompt (enable/disable). Enabling this feature will
display the text F10=Setup during POST. Disabling this
feature prevents the text from being displayed but pressing
F10 will still access the Setup screen.
F12 prompt (enable/disable). Enabling this feature will
display the text F12=Network Service Boot during POST.
Disabling this feature prevents the text from being displayed
but pressing F12 will still force the system to attempt booting
from the network.
Option ROM* prompt (enable/disable). Enabling this feature
will cause the system to display a message before loading
options ROMs.
Fan idle mode* allows you to set the idle speed to 1 (default),
2, 3, or 4 (fastest). Higher speeds will provide more cooling
during idle, but will be louder.
Remote wakeup boot source (remote server/local hard drive).
After Power Loss (off/on): After power loss, if you connect your
computer to an electric power strip and would like to turn on
power to the computer using the switch on the power strip, set
this option to ON.
If you turn off power to your computer using the switch on a
✎
power strip, you will not be able to use the suspend/sleep
feature or the Remote Management features.
Setup Utilities and Diagnostics Features
* Available on select models.
**These options should be used by advanced users only.
Service Reference Guide, dc5000360201-0022–9
Setup Utilities and Diagnostics Features
HeadingOptionDescription
Advanced**
(continued)
Power-On Options
(continued)
Allows you to set: (continued)
POST Delay (in seconds) (enable/disable). Enabling this
feature will add a user-specified delay to the POST process.
This delay is sometimes needed for hard disks on some PCI
cards that spin up very slowly; so slowly that they are not ready
to boot by the time POST is finished. The POST delay also gives
you more time to select F10 to enter Computer (F10) Setup.
I/O APIC Mode (enable/disable). Enabling this feature will
allow Microsoft Windows Operating system to run optimally.
This feature must be disabled for certain non-Microsoft
Operating Systems to work properly.
ACPI/USB Buffers @ Top of Memory (enable/disable).
Enabling this feature places USB memory buffers at the top of
memory. The advantage of remapping is that it allows space in
the DOS Compatibility Hole range, below 1MB, to be made
available for additional PCI plug-in cards that need option
ROM space. The disadvantage is that a popular memory
manager, HIMEM.SYS, does not work properly when USB
buffers are at top of memory AND the system has 64 KB or less
of RAM.
Hot-Pluggable MultiBay Floppy* (enable/disable). Enabling
this feature allows you to hot-plug a MultiBay floppy into a
system running Windows 2000 or XP.
BIOS Wakeup*Allows you to set the computer to turn on automatically at a
time you specify.
Onboard DevicesAllows you to set resources for or disable onboard system
devices (serial port, parallel port, or diskette controller).
PCI DevicesLists currently installed PCI devices and their IRQ settings.
Allows you to reconfigure IRQ settings for these devices or to
disable them entirely. These settings have no effect under an
APIC-based operating system.
Bus Options*Allows you to enable or disable:
PCI bus mastering, which allows a PCI device to take control of
the PCI bus.
PCI VGA palette snooping, which sets the VGA palette
snooping bit in PCI configuration space; only needed when
more than one graphics controller is installed.
PCI SERR# generation.
ECC support allows hardware-based error correction for
ECC-capable memories.
*Available on select models.
**These options should be used by advanced users only.
2–10360201-002Service Reference Guide, dc5000
Setup Utilities and Diagnostics Features
HeadingOptionDescription
Advanced*
(continued)
Device optionsAllows you to set:
Printer mode (bi-directional, EPP+ECP, output only).
Num Lock state at power-on (off/on).
S5 Wake on LAN (enable/disable).
Processor cache (enable/disable).
Hyper-Threading* (enable/disable).
ACPI S3* support (enable/disable). S3 is an ACPI sleep state
that some add-in hardware options may not support.
If the ACPI S3 support option is not presented, the other ACPI
✎
S3 options (ACPI S3 Video REPOST, AXPI S3 Hard Disk
Reset, and ACPI S3 PS2 Mouse Wakeup) will not be
available.
ACPI S3 Video REPOST* (enable/disable). This feature reruns
the video option ROM on a boot from the S3 state.
ACPI S3 Hard Disk Reset* (enable/disable). Resets the hard
disk on a boot from the S3 sleep state.
ACPI S3 PS2 Mouse Wakeup* (enable/disable). Allows the
mouse to wake the system from the S3 sleep state.
Unique Sleep State Blink Patterns*. Allows you to choose an
LED blink pattern that uniquely identifies each sleep state.
Frame Buffer Size* Allows you to specify amount of system
memory dedicated to the embedded graphics frame buffer. The
AUTO setting attempts to optimize the frame buffer size
depending on the amount of total system memory.
Monitor Tracking (enable/disable). Allows ROM to save
monitor asset information.
Spread Spectrum* (enable/disable) allows system clocks to run
with a spread spectrum.
NIC PXE Option ROM Download (enable/disable). The BIOS
contains an embedded NIC option ROM to allow the unit to
boot through the network to a PXE server. This is typically used
to download a corporate image to a hard drive. The NIC
option ROM takes up memory space below 1MB commonly
referred to as DOS Compatibility Hole (DCH) space. This
space is limited. This F10 option will allow users to disable the
downloading of this embedded NIC option ROM thus giving
more DCH space for additional PCI cards which may need
option ROM space. The default will be to have the NIC option
ROM enabled.
PCI VGA
Configuration
* Available on select models.
**These options should be used by advanced users only.
Service Reference Guide, dc5000360201-0022–11
Displayed only if there are multiple PCI video adapters in the
system. Allows you to specify which VGA controller will be the
“boot” or primary VGA controller.
Setup Utilities and Diagnostics Features
2.3 Diagnostics for Windows
The Diagnostics for Windows (DFW) utility is a component of Intelligent Manageability that
allows you to view information about the hardware and software configuration of the computer
while running Microsoft Windows. It also allows you to perform hardware and software tests on
the subsystems of the computer.
When you invoke Diagnostics for Windows, the current configuration of the computer is shown
on the Overview screen. There is access from this screen to several categories of information
about the computer and the Test tab. The information in every screen of the utility can be saved
to a file or printed.
To test all subsystems, you must log in as the administrator. If you do not log in as the
✎
administrator, you will be unable to test some subsystems. The inability to test a subsystem will
be indicated by an error message under the subsystem name in the Test window or by shaded
check boxes that cannot be selected.
Use Diagnostics for Windows in the following instances to:
■ Determine if all the devices installed on the computer are recognized by the system and
functioning properly. Running tests is optional but recommended after installing or
connecting a new device.
■ Third party devices not supported by HP may not be detected. Save, print, or display the
information generated by the utility.
2.3.1 Detecting Diagnostics for Windows
Some computers ship with the Diagnostics for Windows preloaded, but not preinstalled.
To determine whether Diagnostics for Windows is installed:
1. Access the location of the Diagnostics icons:
In Windows XP Home or Windows XP Professional, select Start > Control Panel > Performance and Maintenance.
2. If icons for Configuration Record and Diagnostics for Windows are present, the Diagnostics
for Windows utility is installed. If the icons are not present, the utility is either not preloaded
or not installed.
2–12360201-002Service Reference Guide, dc5000
2.3.2 Installing Diagnostics for Windows
If Diagnostics for Windows is not preloaded, you can download the Diagnostics for Windows
SoftPaq from the following Web site:
http://www.hp.com/support/files
Once the software has been downloaded onto the hard drive it may be installed by performing
these steps:
1. Close all Windows applications.
2. Install the Diagnostics for Windows utility:
❏ In Windows XP, select Start > Setup Software icon. Select Diagnostics for Windows
> Next button, then follow the instructions on the screen.
❏ If the Setup Software icon is not on the Desktop or in the Start menu, run the Setup
program from the C:\CPQAPPS\DIAGS directory or select Start > Run and type the
following in the command line: C:\CPQAPPS\DIAGS\SETUP.
3. Click Next to install Diagnostics for Windows.
4. After the program has finished installing, you may be prompted to restart the computer, or it
may automatically restart. If prompted, click Finish to restart the computer or Cancel to exit
the program. You must restart the computer to complete the installation of Diagnostics for
Windows.
Setup Utilities and Diagnostics Features
If you want to upgrade an existing version of Diagnostics for Windows installed on the computer,
✎
http://www.hp.com/support/files and click on an applicable product. Locate the desired
visit
software and download the latest version. Execute the downloaded file and select Repair to
update the installed version. This will cause the new version to overwrite the old version.
2.3.3 Using Categories in Diagnostics for Windows
To use categories:
1. Click Start > HP Information Center > Diagnostics for Windows. You can also select the Diagnostics for Windows icon, located in the Control Panel.
The screen displays the overview of the computer hardware and software.
❏ In Windows 2000 Professional, select Start > Settings > Control Panel, then select
Diagnostics for Windows.
❏ In Windows XP Home and Windows XP Professional, select Start > Control Panel >
Performance and Maintenance, then select Diagnostics for Windows.
2. For specific hardware and software information, select a category from the Categories
pull-down menu or the appropriate icon on the toolbar.
As the cursor moves over the toolbar icons, the corresponding category name is displayed.
✎
3. To display more detailed information in a selected category, click More in the Information
Level box in the lower left corner of the window or click Level at the top of the screen and select More.
Service Reference Guide, dc5000360201-0022–13
Setup Utilities and Diagnostics Features
4. Review, print, and/or save this information as desired.
❏ To print the information, click File > Print. Select one of the following options:
Detailed Report (All Categories), Summary Report (All Categories), or Current
Category. Click OK to print the report you selected.
❏ To save the information, click File > Save As. Select one of the following options:
Detailed Report (All Categories), Summary Report (All Categories), or Current
Category. Click OK to save the report you selected.
5. To exit Diagnostics for Windows, click File, and then click Exit.
Menu Bar—File, Categories, Navigation, Level, Tab, Help
At the top of the Diagnostics for Windows screen is the Menu Bar consisting of six pull-down
menus. Selecting an item will provide the following information on the system:
■ File—Save As, Print, Printer Setup, Exit
■ Categories
❏ System—System board, ROM, date, and time
❏ Asset Control—Asset tag, system serial number, and processor
❏ Input Devices—Keyboard, mouse, and joystick(s)
❏ Communication—Ports
❏ Storage—Storage drives
❏ Graphics—Graphics
❏ Memory—System board and Windows memory
❏ Multimedia—Optical storage (CD, DVD, and so on) and audio
❏ Windows—Windows
❏ Architecture—PCI Device
❏ Resources—IRQ, I/O, and Memory Map
❏ Health—Status of system temperature and hard drives
❏ Miscellaneous—CMOS, DMI, BIOS, System, Product Name, and Serial Number
■ Navigation—Previous Category (F5), Next Category (F6)
■ Level—Less (F7), More (F8) <information on the screen>
■ Ta b
❏ Overview—Displays general information about the computer. This window is displayed
when first starting the utility. The left side of the window shows hardware information,
while the right side shows software information.
❏ Test—Allows you to choose various parts of the system to test. You can also choose the
type of test and testing
mode.
❏ Status—Displays the status of each test in progress. You can cancel testing by clicking
the Cancel Testing button.
❏ Log—Displays a log of tests for each device.
❏ Error—Displays any errors that occurred during device testing. The window lists the
device being tested, the type and number of errors, and the error code.
2–14360201-002Service Reference Guide, dc5000
Setup Utilities and Diagnostics Features
■ Help—Contents, How to use Help, About
2.3.4 Running Diagnostic Tests in Diagnostics for Windows
To run diagnostic tests:
1. Click Start > HP Information Center > Diagnostics for Windows.
Alternately, you can access Diagnostics for Windows via the control panel.
The screen displays the overview of the computer hardware and software. Five tabs are
displayed below the row of icons: Overview, Tes t , Status, Log, and Error.
2. Click the Te st tab, or click Tab at the top of the screen and select Test .
3. Select one of the following options:
❏ Quick Test—Runs a quick, general test on each device. Requires no user intervention if
Unattended Mode is selected.
❏ Complete Test—Runs maximum testing of each device. The user can select Interactive
Mode or Unattended Mode.
❏ Custom Test—Runs only the tests you select. To select specific devices or tests, find the
device in the list, then select the check box beside each test. When selected, a red check
mark is displayed in the box. Some tests selected may require user intervention.
To test all subsystems, you must log in as the administrator. If you do not log in as the
✎
administrator, you will be unable to test some subsystems. The inability to test a subsystem will
be indicated by an error message under the subsystem name in the Test window or by shaded
boxes that cannot be checked.
4. Select Interactive Mode or Unattended Mode. In Interactive Mode, the diagnostic software
will prompt you for input during tests that require it. Some tests require interaction and will
display errors or halt testing if selected in conjunction with Unattended Mode.
❏ Interactive Mode provides maximum control over the testing process. You determine
whether the test passed or failed and may be prompted to insert or remove devices.
❏ Unattended Mode does not display prompts. If errors are found, they are displayed when
testing is complete.
5. Click the Begin Testing button at the bottom of the window. Test Status is displayed,
showing the progress and result of each test. For more details on the tests run, click the Log
tab or click Tab at the top of the screen and select Log.
6. To view a test report, select one of three tabs:
❏ Status—Summarizes the tests run, passed, and failed during the current testing session.
❏ Log—Lists tests run on the system, the numbers of times each test has run, the number
of errors found on each test, and the total run time of each test.
❏ Error—Lists all errors found on the computer with their error codes.
7. To save a test report:
❏ Select the Log tab Save button to save a Log tab report.
❏ Select the Error tab Save button to save an Error tab report.
Service Reference Guide, dc5000360201-0022–15
Setup Utilities and Diagnostics Features
8. To print a test report:
❏ If the report is on the Log tab, select File > Save As, then print the file from the selected
folder.
❏ If the report is on the Error tab, select the Error tab Print button.
9. If errors are found, click the Error tab to display more detailed information and
recommended actions.
10. Click Print or save the error information for future reference.
11. To exit Diagnostics for Windows, click File > Exit.
2.4 Configuration Record
The Configuration Record utility is a windows-based information-gathering tool that gathers
critical hardware and software information from various computer subsystems. The information
includes such things as the ROM, asset tag, processor, physical drives, PCI devices, memory,
graphics, operating system version number, operating system parameters, and the operating
system startup files to give a complete view of the computer. Configuration Record provides a
means for automatically identifying and comparing configuration changes, and has the ability to
maintain a configuration history. The information can be saved as a history of multiple sessions.
This utility allows the resolution of problems without taking the computer offline and assists in
maximizing the computer availability. The information obtained by the utility is useful in
troubleshooting system problems, and streamlines the service process by enabling quick and
easy identification of system configurations.
The utility displays it findings in a Now.log file. If the original Base.log file is present in the cpqdiags directory, the Base.log file is displayed next to the Now.log file in a split window with
the differences between the two highlighted in the color red.
2.4.1 Installing Configuration Record
The Configuration Record is part of Diagnostics for Windows and is automatically installed at
the same time as Diagnostics for Windows.
2.4.2 Running Configuration Record
To run this program:
1. Click Start > HP Information Center > Configuration Record.
Alternately, you can access Diagnostics for Windows via the control panel.
The Configuration Record utility has two view options: Show Changed Items Only and Show
✎
All. The default view is Show
color red since it shows only the differences. Switching to Show All displays the complete,
comprehensive view of the system.
Changed Items Only, therefore all the text is displayed in the
2. The default view is Show Changed Items Only. To view all the information gathered by
Configuration Record, click View at the top of the window and select Show All, or click the
Show All Items icon.
2–16360201-002Service Reference Guide, dc5000
Setup Utilities and Diagnostics Features
3. To save the information in the left or right window, select File > Save Window File and
then select Left Window File or Right Window File.
Saving the configuration of the computer periodically allows the user to keep a history of the
✎
configuration. This history may be useful to you in the future if the system ever encounters a
problem that needs debugging.
4. To exit Configuration Record, click File, then click Exit.
2.5 Remote Diagnostics Enabling Agent
This utility provides a Web browser interface to Diagnostics for Windows. It enables remote
control of the diagnostics and facilitates easy transfer of computer information from remote
machines to a service provider.
The Remote Diagnostics Enabling Agent captures hardware configuration and provides the
ability to perform tests remotely to diagnose computer problems. In addition, the Remote
Diagnostics Enabling Agent identifies any computer hardware device problems signaled by the
HP Management Agents. These hardware devices are automatically selected for testing by the
Remote Diagnostics Enabling Agent.
The Remote Diagnostics Enabling Agent only works if Diagnostics for Windows is also
✎
installed.
The Remote Diagnostics Enabling Agent is pre-loaded on some computers and is available
through a SoftPaq at http://www.hp.com under Support and Drivers.
2.5.1 Installing or Upgrading Remote Diagnostics
Enabling
Agent
1. Visit http://www.hp.com/support/files and click on the applicable product.
2. Locate the appropriate software and download the latest version.
3. Execute the downloaded file. If you are upgrading an existing version, select Repair for the
new version to overwrite the old version.
2.5.2 Running the Remote Diagnostics Enabling Agent
1. Select the Remote Diagnostics icon located in the Control Panel.
The Remote Diagnostics Enabling Agent allows you to run Diagnostic Test or the Configuration
✎
Record in a browser window. Both of these utilities can be run remotely or locally.
2. To exit Remote Diagnostics, click File and then click Close.
2.6 Protecting the Software
To protect software from loss or damage, you should keep a backup copy of all system software,
applications, and related files stored on the hard drive. See the operating system or backup utility
documentation for instructions on making backup copies of data files.
Service Reference Guide, dc5000360201-0022–17
Setup Utilities and Diagnostics Features
2.7 Restoring the Software
The Windows operating system and software can be restored to its original state by using the
Restore CD. See the Restore CD for complete instructions on using this feature.
2–18360201-002Service Reference Guide, dc5000
Desktop Management
HP Intelligent Manageability provides standards-based solutions for managing and controlling
desktops, workstations, and notebook PCs in a networked environment.
The key capabilities and features of desktop management are:
■ Initial configuration and deployment
■ Remote system installation
■ Software updating and management
■ ROM flash
■ Asset tracking and security
■ Fault notification and recovery
Support for specific features described in this guide may vary by model or software version.
✎
3
3.1 Initial Configuration and Deployment
HP computers come with a preinstalled system software image. After a brief software
“unbundling” process, the computer is ready to be used.
A customized software image may be deployed by:
■ Installing additional software applications after unbundling the preinstalled software image.
■ Using software deployment tools, such as Altiris Deployment Solutions, to replace the
preinstalled software with a customized software image.
■ Using a disk cloning process to copy the contents from one hard drive to another.
The best deployment method depends on your information technology environment and
processes. The PC Deployment section of the Solutions and Services Web site
(http://h18000.www1.hp.com/solutions/pcsolutions)
best deployment method.
The Restore Plus! CD, ROM-based setup, and ACPI hardware provide further assistance with
recovery of system software, configuration management and troubleshooting, and power
management.
provides information to help you select the
Service Reference Guide, dc5000360201-0023–1
Desktop Management
3.2 Remote System Installation
Remote System Installation allows you to start and set up your system using the software and
configuration information located on a network server by initiating the Preboot Execution
Environment (PXE). The Remote System Installation feature is usually used as a system setup
and configuration tool, and can be used for the following tasks:
■ Formatting a hard drive.
■ Deploying a software image on one or more new PCs.
■ Remotely updating the system BIOS in flash ROM. See Section 3.4.1, “Remote ROM
Flash.”
■ Configuring the system BIOS settings.
To initiate Remote System Installation, press F12 when the F12 = Network Service Boot
message appears in the lower-right corner of the HP logo screen. Follow the instructions on the
screen to continue the process. The default boot order is a BIOS configuration setting that can be
changed to always attempt to PXE boot.
3.3 Software Updating and Management
HP provides several tools for managing and updating software on desktops and
workstations—HP Client Manager Software, Altiris Client Management Solutions, System
Software Manager; Proactive Change Notification; and Subscriber's Choice.
3.3.1 HP Client Manager Software
HP Client Manager Software (HP CMS) assists HP customers in managing the hardware aspects
of their client computers with features that include:
■ Detailed views of hardware inventory for asset management
■
PC health check monitoring and diagnostics
■ Proactive notification of changes in your hardware environment
■ Web-accessible reporting of business critical details such as machines with thermal
warnings, memory alerts, and more
■ Remote updating of system software such as device drivers and ROM BIOS
■ Remote changing of boot order
For more information on the HP Client Manager, visit
http://h18000.www1.hp.com/im/client_mgr.html.
3.3.2 Altiris Client Management Solutions
HP and Altiris have partnered to provide comprehensive, tightly integrated systems management
solutions to reduce the cost of owning HP client PCs. HP Client Manager Software is the
foundation for additional Altiris Client Management Solutions that address:
■ Inventory and Asset Management
❏ SW license compliance
❏ PC tracking and reporting
❏ Lease contract, fixing asset tracking
3–2360201-002Service Reference Guide, dc5000
Desktop Management
■ Deployment and Migration
❏ Windows 2000/XP migration
❏ System deployment
❏ Personality migrations
■ Help Desk and Problem Resolution
❏ Managing help desk tickets
❏ Remote troubleshooting
❏ Remote problem resolution
❏ Client disaster recovery
■ Software and Operations Management
❏ Ongoing desktop management
❏ HP system SW deployment
❏ Application self-healing
For more information and details on how to download a fully-functional 30-day evaluation
version of the Altiris solutions, visit
On selected desktop and notebook models, an Altiris management agent is included as part of the
factory loaded image. This agent enables communication with the Altiris Development Solution
which can be used to complete new hardware deployment or personality migration to a new
operating system using easy-to-follow wizards. Altiris solutions provide easy-to-use software
distribution capabilities. When used in conjunction with System Software Manager, or HP Client
Manager Software, administrators can also update ROM BIOS and device driver software from a
central console.
For more information, visit
http://h18000.www1.hp.com/im/index.html.
3.3.3 System Software Manager
System Software Manager (SSM) lets you update system-level software on multiple systems
simultaneously. When executed on a PC client system, SSM detects both hardware and software
versions, then updates the appropriate software from a central repository, also known as a file
store. Driver versions that are supported by SSM are denoted with a special icon on the driver
download Web site and on the Support Software CD. To download the utility or to obtain more
information on SSM, visit
http://h18000.www1.hp.com/im/ssmwp.html.
3.3.4 Proactive Change Notification (PCN)
This feature is available on select models.
The HP Proactive Notification program uses the Subscriber's Choice Web site to proactively and
automatically:
■ Send you Product Change Notification (PCN) emails informing you of hardware and
software changes to most commercial computers and servers, up to 60 days in advance.
Security Bulletins, and Driver alerts for most commercial computers and servers.
Service Reference Guide, dc5000360201-0023–3
Desktop Management
You create your own profile to ensure that you only receive the information relevant to your IT
environment. To learn more about HPPN and create your custom profile, visit
http://www.hp.com/go/pcn.
3.3.5 Subscriber’s Choice
Subscriber’s Choice is a client-based service from HP. Based on your profile, HP will supply
you with personalized product tips, feature articles, and/or driver and support
alerts/notifications. Subscriber’s Choice Driver and Support Alerts/Notifications will deliver
e-mails notifying you that the information you subscribed to in your profile is available for
review and retrieval. To learn more about Subscriber’s Choice and create a custom profile, visit
http://www.hp.com/go/pcn.
3.4 ROM Flash
The computer comes with a reprogrammable flash ROM (read only memory). By establishing a
setup password in Computer Setup (F10) Utility, you can protect the ROM from being
unintentionally updated or overwritten. This is important to ensure the operating integrity of the
computer. Should you need or want to upgrade your ROM, you may:
■ Order an upgraded ROMPaq diskette from HP.
■ Download the latest ROMPaq images from http://www.hp.com/support.
CAUTION: For maximum ROM protection, be sure to establish a setup password. The setup password
Ä
prevents unauthorized ROM upgrades. System Software Manager allows the system administrator to set
the setup password on one or more PCs simultaneously. For more information, visit
http://www.hp.com/go/ssm.
3.4.1 Remote ROM Flash
Remote ROM Flash allows the system administrator to safely upgrade the ROM on remote HP
computers directly from the centralized network management console. Enabling the system
administrator to perform this task remotely, on multiple computers and personal computers,
results in a consistent deployment of and greater control over HP PC ROM images over the
network.
The computer must be powered on, or turned on through Remote Wakeup, to take advantage of
✎
Remote ROM Flash.
For more information on Remote ROM Flash, refer to the HP Client Manager Software or
System Software Manager at
3.4.2 HPQ Flash
The HPQFlash utility is used to locally update or restore the system ROM on individual PCs
through a Windows operating system.
http://h18000.www1.hp.com/im/prodinfo.html.
For more information on HPQFlash, visit
of the computer when prompted.
3–4360201-002Service Reference Guide, dc5000
http://www.hp.com/support/files and enter the name
3.4.3 FailSafe Boot Block ROM
The FailSafe Boot Block ROM allows for system recovery in the unlikely event of a ROM flash
failure, for example, if a power failure were to occur during a ROM upgrade. The Boot Block is a
flash-protected section of the ROM that checks for a valid system ROM flash when power to the
system is turned on.
■ If the system ROM is valid, the system starts normally.
■ If the system ROM fails the validation check, the FailSafe Boot Block ROM provides
enough support to start the system from a ROMPaq diskette, which will program the system
ROM with a valid image.
Some models also support recovery from a ROMPaq CD. ISO ROMPaq images are included
✎
with selected models in the downloadable ROM softpaqs.
When the bootblock detects an invalid system ROM, the System Power LED blinks RED 8
times, one every second, followed by a 2-second pause. Also 8 simultaneous beeps will be heard.
A Boot Block recovery mode message is displayed on the screen (some models).
To recover the system after it enters Boot Block recovery mode, complete the following steps:
1. If there is a diskette in the diskette drive or a CD in the CD drive, remove the diskette and
CD and turn off the power.
Desktop Management
2. Insert a ROMPaq diskette into the diskette drive or, if permitted on this computer, a
ROMPaq CD into the CD drive.
3. Turn on the computer.
If no ROMPaq diskette or ROMPaq CD is found, you will be prompted to insert one and
restart the computer.
If a setup password has been established, the Caps Lock light will turn on and you will be
prompted to enter the password.
4. Enter the setup password.
If the system successfully starts from the diskette and successfully reprograms the ROM,
then the three keyboard lights will turn on. A rising tone series of beeps also signals
successful completion.
5. Remove the diskette or CD and turn the power off.
6. Turn the power on again to restart the computer.
The following table lists the various keyboard light combinations used by the Boot Block ROM
(when a PS/2 keyboard is attached to the computer), and explains the meaning and action
associated with each combination.
Service Reference Guide, dc5000360201-0023–5
Desktop Management
Keyboard Light Combinations Used by Boot Block ROM
Failsafe Boot
Block Mode
Num LockGreenOnROMPaq diskette not present, is bad, or
Caps LockGreenOnEnter password.
Num, Caps,
Scroll Lock
Num, Caps,
Scroll Lock
Diagnostic lights do not flash on USB keyboards.
✎
Keyboard
LED Color
GreenBlink on in
GreenOnBoot Block ROM Flash successful. Turn
3.4.4 Replicating the Setup
This procedure gives an administrator the ability to quickly and easily copy one setup
configuration to other computers of the same model. To replicate the setup:
1. Access the Computer Setup Utilities (F10) menu.
2. Click File > Save to Diskette. Follow the instructions on the screen.
This requires a diskette drive or a supported USB flash media device, such as Drive Key.
✎
Keyboard
LED ActivityState/Message
drive not ready.
Keyboard locked in network mode.
sequence,
one-at-a-time—
N,C,SL
power off, then on to reboot.
3. To replicate the configuration, click File > Restorefrom Diskette, and follow the
instructions on the screen.
System Software Manager (SSM) may also be used to distribute setup configurations to multiple
computers. For more information, see
http://www.hp.com/go/ssm.
3.4.5 Dual-State Power Button
With Advanced Configuration and Power Interface (ACPI) enabled for Windows 2000 and
Windows XP, the power button can function either as an on/off switch or as a suspend button.
The suspend feature does not completely turn off power, but instead causes the computer to enter
a low-power standby. This allows you to quickly power down without closing applications and
to quickly return to the same operational state without any data loss.
To change the power button’s configuration, complete the following steps:
1. In Windows 2000, left click on the Start Button, then select Settings > Control Panel >
Power Options.
In Windows XP, left click on the Start Button, then select Control Panel > Power
Options.
2. In the Power Options Properties, select the Advanced tab.
3. In the Power Button section, select the desired power button setting.
3–6360201-002Service Reference Guide, dc5000
After configuring the power button to function as a suspend button, press the power button to put
the system in a very low power state (suspend). Press the button again to quickly bring the
system out of suspend to full power status. To completely turn off all power to the system, press
and hold the power button for four seconds.
CAUTION: Do not use the power button to turn off the computer unless the system is not responding;
Ä
turning off the power without operating system interaction could cause damage to or loss of data on the
hard drive.
3.4.6 Power Management
Power Management is a feature that saves energy by shutting down certain components of the
computer when they are not in use, saving energy without having to shut down the computer.
With Advanced Configuration and Power Interface (ACPI) enabled for Windows 2000 and
Windows XP, timeouts (the period of inactivity allowed before shutting down these components)
can be enabled, customized, or disabled using the operating system.
1. In Windows 2000, left click on the Start Button, then select Settings > Control Panel >
Power Options.
In Windows XP, left click on the Start Button, then select Control Panel > Power
Options.
Desktop Management
2. In the Power Options Properties, select the Power Schemes tab.
3. Select the desired power scheme settings.
Use Display Properties to establish, modify, or disable Power Management settings for the
monitor. To access Display Properties, right click on the Windows Desktop, then choose
Properties.
3.4.7 World Wide Web Site
When making the transition to new or revised operating systems, it is important to implement the
support software designed for that operating system. If you plan to run a version of Microsoft
Windows that is different from the version included with your computer, you must install
corresponding device drivers and utilities to ensure that all features are supported and
functioning properly.
HP has made the task of locating, accessing, evaluating, and installing the latest support software
easier. You can download the software from
the latest device drivers, utilities, and flashable ROM images needed to run the latest Microsoft
Windows operating system on your HP computer.
http://www.hp.com/support. The Web site contains
3.4.8 Building Blocks and Partners
HP management solutions integrate with other systems management applications, and are based
on industry standards, such as:
■ Web-Based Enterprise Management (WBEM)
■ Windows Management Interface (WMI)
■ Wake on LAN Technology
■ ACPI
■ SMBIOS
Service Reference Guide, dc5000360201-0023–7
Desktop Management
■ Pre-boot Execution (PXE) support
3.5 Asset Tracking and Security
Asset tracking features incorporated into the computer provide key asset tracking data that can be
managed using HP Insight Manager, HP Client Manager or other system management
applications. Seamless, automatic integration between asset tracking features and these products
enables you to choose the management tool that is best suited to your environment and to
leverage your investment in existing tools.
HP also offers several solutions for controlling access to valuable components and information.
Security features available on select models help to prevent unauthorized access to the internal
components of the personal computer. By disabling parallel, serial, or USB ports, or by disabling
removable media boot capability, you can protect valuable data assets. Memory Change alerts
can be automatically forwarded to system management applications to deliver proactive
notification of tampering with a computer’s internal components.
Protect Tools is available as an option on select systems.
✎
Use the following utilities to manage security settings on your HP computer:
■ Locally, using the Computer Setup Utilities. See the Computer Setup (F10) Utility Guide
included with the computer for additional information and instructions on using the
Computer Setup Utilities.
■ Remotely, using HP Client Manager or System Software Manager. This software enables the
secure, consistent deployment and control of security settings from a simple command-line
utility.
The following table and sections refer to managing security features of your computer locally
through the Computer Setup Utilities (F10).
Security Features Overview
FeaturePurposeHow It Is Established
Removable Media Boot
Control
Serial, Parallel, USB, or
Infrared Interface Control
Power-On PasswordPrevents use of the computer
Setup PasswordPrevents reconfiguration of the
Prevents booting from the
removable media drives
(available on select drives).
Prevents transfer of data
through the integrated serial,
parallel, USB (universal serial
bus), or infrared interface.
until the password is entered.
This can apply to both initial
system startup and restarts.
computer (use of the Computer
Setup Utilities) until the
password is entered.
From the Computer Setup
Utilities (F10) menu.
From the Computer Setup
Utilities (F10) menu.
From the Computer Setup
Utilities (F10) menu.
From the Computer Setup
Utilities (F10) menu.
For more information about Computer Setup, see the Computer Setup (F10) Utility Guide.
✎
Support for security features may vary depending on your specific computer configuration.
3–8360201-002Service Reference Guide, dc5000
Security Features Overview (Continued)
FeaturePurposeHow It Is Established
Desktop Management
DriveLockPrevents unauthorized access
to the data on specific hard
drives. This feature is available
on select models only.
Embedded SecurityPrevents unauthorized access
to the data on specific hard
drives. This feature is
available on select models
only.
Master Boot Record SecurityMay prevent unintentional or
malicious changes to the
Master Boot Record of the
current bootable disk, and
provides a means of
recovering the “last known
good” MBR.
Memory Change AlertsDetects when memory
modules have been added,
moved, or removed; notifies
user and system administrator.
Ownership TagDisplays ownership
information, as defined by the
system administrator, during
system startup (protected by
setup password).
From the Computer Setup
Utilities (F10) menu.
From the Computer Setup
Utilities (F10) menu.
From the Computer Setup
Utilities (F10) menu.
For information on enabling
Memory Change Alerts,
refer to the online Intelligent Manageability Guide.
From the Computer Setup
Utilities (F10) menu.
Cable Lock ProvisionInhibits access to the interior of
the computer to prevent
unwanted configuration
changes or component
removal. Can also be used to
secure the computer to a fixed
object to prevent theft.
Security Loop ProvisionInhibits access to the interior of
the computer to prevent
unwanted configuration
changes or component
removal.
For more information about Computer Setup, see the Computer Setup (F10) Utility Guide.
✎
Support for security features may vary depending on your specific computer configuration.
Install a cable lock to secure
the computer to a fixed
object.
Install a lock in the security
loop to prevent unwanted
configuration changes or
component removal.
Service Reference Guide, dc5000360201-0023–9
Desktop Management
3.5.1 Password Security
The power-on password prevents unauthorized use of the computer by requiring entry of a
password to access applications or data each time the computer is turned on or restarted. The
setup password specifically prevents unauthorized access to Computer Setup, and can also be
used as an override to the power-on password. That is, when prompted for the power-on
password, entering the setup password instead will allow access to the computer.
A network-wide setup password can be established to enable the system administrator to log in to
all network systems to perform maintenance without having to know the power-on password,
even if one has been established.
3.5.2 Establishing a Setup Password Using Computer Setup
Establishing a setup password through Computer Setup prevents reconfiguration of the computer
(use of the Computer Setup (F10) utility) until the password is entered.
1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart.
2. As soon as the computer is turned on, press and hold the F10 key until you enter Computer
Setup. Press
If you do not press the F10 key at the appropriate time, you must turn the computer off, then on
✎
again, and press the
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
Enter to bypass the title screen, if necessary.
F10 key again to access the utility.
3. Select Security, then select Setup Password and follow the instructions on the screen.
4. Before exiting, click File > Save ChangesandExit.
3.5.3 Establishing a Power-On Password Using Computer Setup
Establishing a power-on password through Computer Setup prevents access to the computer
when power is turned on, unless the password is entered. When a power-on password is set,
Computer Setup presents Password Options under the Security menu. Password options include
Password Prompt on Warm Boot. When Password Prompt on Warm Boot is enabled, the
password must also be entered each time the computer is rebooted.
1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart.
2. As soon as the computer is turned on, press and hold the F10 key until you enter Computer
Setup. Press
If you do not press the F10 key at the appropriate time, you must turn the computer off, then on
✎
again, and press the
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
3. Select Security, then Power-On Password and follow the instructions on the screen.
4. Before exiting, click File > Save ChangesandExit.
Enter to bypass the title screen, if necessary.
F10 key again to access the utility.
3–10360201-002Service Reference Guide, dc5000
Desktop Management
Entering a Power-On Password
To enter a power-on password, complete the following steps:
1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart.
2. When the key icon appears on the monitor, type your current password, then press Enter.
Type carefully; for security reasons, the characters you type do not appear on the screen.
✎
If you enter the password incorrectly, a broken key icon appears. Try again. After three
unsuccessful tries, you must turn off the computer, then turn it on again before you can continue.
Entering a Setup Password
If a setup password has been established on the computer, you will be prompted to enter it each
time you run Computer Setup.
1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart.
2. As soon as the computer is turned on, press and hold the F10 key until you enter Computer
Setup. Press
If you do not press the F10 key at the appropriate time, you must turn the computer off, then on
✎
again, and press the
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
Enter to bypass the title screen, if necessary.
F10 key again to access the utility.
3. When the key icon appears on the monitor, type the setup password, then press the Enter
key.
Type carefully; for security reasons, the characters you type do not appear on the screen.
✎
If you enter the password incorrectly, a broken key icon appears. Try again. After three
unsuccessful tries, you must turn off the computer, then turn it on again before you can continue.
Changing a Power-On or Setup Password
1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart.
To change the setup password, run Computer Setup.
2. To change the Power-On password, go to step 3.
To change the Setup password, as soon as the computer is turned on, press and hold the F10
key until you enter Computer Setup. Press Enter to bypass the title screen, if necessary.
If you do not press the F10 key at the appropriate time, you must turn the computer off, then on
✎
again, and press the
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
F10 key again to access the utility.
Service Reference Guide, dc5000360201-0023–11
Desktop Management
3. When the key icon appears, type your current password, a slash (/) or alternate delimiter
character, your new password, another slash (/) or alternate delimiter character, and your new
password again as shown:
current password/new password/new password
Type carefully; for security reasons, the characters you type do not appear on the screen.
✎
4. Press the Enter key.
The new password takes effect the next time you turn on the computer.
Refer to the “National Keyboard Delimiter Characters” section in this chapter for information
✎
about the alternate delimiter characters. The power-on password and setup password may also be
changed using the Security options in Computer Setup.
Deleting a Power-On or Setup Password
1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart.
To delete the setup password, run Computer Setup.
2. To delete the Power-On password, go to step 3.
To delete the Setup password, as soon as the computer is turned on, press and hold the F10
key until you enter Computer Setup. Press Enter to bypass the title screen, if necessary.
If you do not press the F10 key at the appropriate time, you must turn the computer off, then on
✎
again, and press the
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
3. When the key icon appears, type your current password followed by a slash (/) or alternate
delimiter character as shown:
current password/
4. Press the Enter key.
Refer to “National Keyboard Delimiter Characters” section in this chapter for information about
✎
the alternate delimiter characters. The power-on password and setup password may also be
changed using the Security options in Computer Setup.
F10 key again to access the utility.
3–12360201-002Service Reference Guide, dc5000
Desktop Management
National Keyboard Delimiter Characters
Each keyboard is designed to meet country-specific requirements. The syntax and keys that you
use for changing or deleting your password depend on the keyboard that came with your
computer.
National Keyboard Delimiter Characters
Arabic/Greek-Russian/
Belgian=Hebrew.SlovakianBHCSY*-Hungarian-SpanishBrazilian/Italian-Swedish/Finnish/
Chinese/Japanese/SwissCzech-Korean/Taiwanese/
Danish-Latin American-Thai/
French!Norwegian-Turkish.
French CanadianéPolish-U.K. English/
German-Portuguese-U.S. English/
* For Bosnia-Herzegovina, Croatia, Slovenia, and Yugoslavia
Clearing Passwords
To disable the power-on or setup password features, or to clear the power-on or setup passwords,
complete the following steps:
1. Shut down the operating system properly, then turn off the computer and any external
devices, and disconnect the power cord from the power outlet.
2. Disconnect the keyboard, monitor, and any other external devices connected to the
computer.
WARNING: To reduce the risk of personal injury from electrical shock and/or hot surfaces, be sure to
Å
disconnect the power cord from the wall outlet, and allow the internal system components to cool before
touching.
CAUTION: When the computer is plugged in, the power supply always has voltage applied to the
Ä
system board even when the unit is turned off. Failure to disconnect the power cord can result in
damage to the system.
CAUTION: Static electricity can damage the electronic components of the computer or optional
Ä
equipment. Before beginning these procedures, ensure that you are discharged of static electricity by
briefly touching a grounded metal object. See the Safety & Regulatory Information guide for more
information.
3. Remove the computer cover or access panel.
4. Locate the header and jumper.
Service Reference Guide, dc5000360201-0023–13
Desktop Management
The password jumper is green so that it can be easily identified. For assistance locating the
✎
password jumper and other system board components, see the Illustrated Parts Map (IPM) for
that particular system.
5. Remove the jumper from pins 1 and 2. Place the jumper on either pin 1 or 2, but not both, so
that it does not get lost.
6. Replace the computer cover or access panel.
7. Reconnect the external equipment.
8. Plug in the computer and turn on power. Allow the operating system to start. This clears the
current passwords and disables the password features.
9. To establish new passwords, repeat steps 1 through 4, replace the password jumper on pins 1
and 2, then repeat steps 6 through 8. Establish the new passwords in Computer Setup. Refer
to the Computer Setup (F10) Utility Guide on the Documentation CD for Computer Setup
instructions.
3.5.4 DriveLock
DriveLock is an industry-standard security feature that prevents unauthorized access to the data
on specific hard drives. DriveLock has been implemented as an extension to Computer Setup. It
is only available on certain systems and only when DriveLock-capable hard drives are detected.
DriveLock is intended for HP customers for whom data security is the paramount concern. For
such customers, the cost of the hard drive and the loss of the data stored on it is inconsequential
when compared with the damage that could result from unauthorized access to its contents. In
order to balance this level of security with the practical need to accommodate a forgotten
password, the HP implementation of DriveLock employs a two-password security scheme. One
password is intended to be set and used by a system administrator while the other is typically set
and used by the end-user. There is no “back-door” that can be used to unlock the drive if both
passwords are lost. Therefore, DriveLock is most safely used when the data contained on the
hard drive is replicated on a corporate information system or is regularly backed up.
In the event that both DriveLock passwords are lost, the hard drive is rendered unusable. For
users who do not fit the previously defined customer profile, this may be an unacceptable risk.
For users who do fit the customer profile, it may be a tolerable risk given the nature of the data
stored on the hard drive.
3–14360201-002Service Reference Guide, dc5000
Desktop Management
Using DriveLock
The DriveLock option appears under the Security menu in Computer Setup. The user is
presented with options to set the master password or to enable DriveLock. A user password must
be provided in order to enable DriveLock. Since the initial configuration of DriveLock is
typically performed by a system administrator, a master password should be set first. HP
encourages system administrators to set a master password whether they plan to enable
DriveLock or keep it disabled. This will give the administrator the ability to modify DriveLock
settings if the drive is locked in the future. Once the master password is set, the system
administrator may enable DriveLock or choose to keep it disabled.
If a locked hard drive is present, POST will require a password to unlock the device. If a
power-on password is set and it matches the device’s user password, POST will not prompt the
user to re-enter the password. Otherwise, the user will be prompted to enter a DriveLock
password. Either the master or the user password may be used. Users will have two attempts to
enter a correct password. If neither attempt succeeds, POST will continue but the drive will
remain inaccessible.
DriveLock Applications
HP recommends that the system administrator be responsible for configuring the hard drive
which would involve, among other things, setting the DriveLock master password. In the event
that the user forgets the user password or the equipment is passed on to another employee, the
master password can always be used to reset the user password and regain access to the hard
drive.
HP recommends that corporate system administrators who choose to enable DriveLock also
establish a corporate policy for setting and maintaining master passwords. This should be done to
prevent a situation where an employee intentionally or unintentionally sets both DriveLock
passwords before leaving the company. In such a scenario, the hard drive would be rendered
unusable and require replacement. Likewise, by not setting a master password, system
administrators may find themselves locked out of a hard drive and unable to perform routine
checks for unauthorized software, other asset control functions, and support.
For users with less stringent security requirements, HP does not recommend enabling
DriveLock. Users in this category include personal users or users who do not maintain sensitive
data on their hard drives as a common practice. For these users, the potential loss of a hard drive
resulting from forgetting both passwords is much greater than the value of the data DriveLock
has been designed to protect. Access to Computer Setup and DriveLock can be restricted through
the Setup password. By specifying a Setup password and not giving it to end users, system
administrators are able to restrict users from enabling DriveLock.
Service Reference Guide, dc5000360201-0023–15
Desktop Management
3.5.5 Master Boot Record Security
The Master Boot Record (MBR) contains information needed to successfully boot from a disk
and to access the data stored on the disk. Master Boot Record Security may prevent unintentional
or malicious changes to the MBR, such as those caused by some computer viruses or by the
incorrect use of certain disk utilities. It also allows you to recover the “last known good” MBR,
should changes to the MBR be detected when the system is restarted.
To enable MBR Security, complete the following steps:
1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart.
2. As soon as the computer is turned on, press and hold the F10 key until you enter Computer
Setup. Press
If you do not press the F10 key at the appropriate time, you must turn the computer off, then on
✎
again, and press the
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
3. Select Security > Master Boot Record Security > Enabled.
4. Select Security > Save Master Boot Record.
Enter to bypass the title screen, if necessary.
F10 key again to access the utility.
5. Before exiting, click File > Save ChangesandExit.
When MBR Security is enabled, the BIOS prevents any changes being made to the MBR of the
current bootable disk while in MS-DOS or Windows Safe Mode.
Most operating systems control access to the MBR of the current bootable disk; the BIOS cannot
✎
prevent changes that may occur while the operating system is running.
Each time the computer is turned on or restarted, the BIOS compares the MBR of the current
bootable disk to the previously saved MBR. If changes are detected and if the current bootable
disk is the same disk from which the MBR was previously saved, the following message is
displayed:
1999—Master Boot Record has changed.
Press any key to enter Setup to configure MBR Security.
Upon entering Computer Setup, you must
■ Save the MBR of the current bootable disk;
■ Restore the previously saved MBR; or
■ Disable the MBR Security feature.
You must know the setup password, if one exists.
If changes are detected and if the current bootable disk is not the same disk from which the MBR
was previously saved, the following message is displayed:
2000—Master Boot Record Hard Drive has changed.
Press any key to enter Setup to configure MBR Security.
3–16360201-002Service Reference Guide, dc5000
Desktop Management
Upon entering Computer Setup, you must
■ Save the MBR of the current bootable disk; or
■ Disable the MBR Security feature.
You must know the setup password, if one exists.
In the unlikely event that the previously saved MBR has been corrupted, the following message
is displayed:
1998—Master Boot Record has been lost.
Press any key to enter Setup to configure MBR Security.
Upon entering Computer Setup, you must
■ Save the MBR of the current bootable disk; or
■ Disable the MBR Security feature.
You must know the setup password, if one exists.
3.5.6 Before You Partition or Format the Current Bootable Disk
Ensure that MBR Security is disabled before you change partitioning or formatting of the current
bootable disk. Some disk utilities, such as FDISK and FORMAT, attempt to update the MBR. If
MBR Security is enabled when you change partitioning or formatting of the disk, you may
receive error messages from the disk utility or a warning from MBR Security the next time the
computer is turned on or restarted. To disable MBR Security, complete the following steps:
1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart.
2. As soon as the computer is turned on, press and hold the F10 key until you enter Computer
Setup. Press
If you do not press the F10 key at the appropriate time, you must turn the computer off, then on
✎
again, and press the
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
3. Select Security > Master Boot Record Security > Disabled.
4. Before exiting, click File > Save ChangesandExit.
Enter to bypass the title screen, if necessary.
F10 key again to access the utility.
3.5.7 Cable Lock Provision
The rear panel of the computer accommodates a cable lock so that the computer can be
physically secured to a work area.
For illustrated instructions, please see the Removal and Replacement Chapter for the specific
chassis.
Service Reference Guide, dc5000360201-0023–17
Desktop Management
3.5.8 Fingerprint Identification Technology
Eliminating the need to enter user passwords, HP Fingerprint Identification Technology tightens
network security, simplifies the login process, and reduces the costs associated with managing
corporate networks. Affordably priced, it is not just for high-tech, high-security organizations
anymore.
Support for Fingerprint Identification Technology varies by model.
✎
For more information, visit http://www.hp.com/security.
3.6 Fault Notification and Recovery
Fault Notification and Recovery features combine innovative hardware and software technology
to prevent the loss of critical data and minimize unplanned downtime.
If the computer is connected to a network managed by HP Client Manager, the computer sends a
fault notice to the network management application. With HP Client Manager Software, you can
also remotely schedule diagnostics to automatically run on all managed PCs and create a
summary report of failed tests.
3.6.1 Drive Protection System
The Drive Protection System (DPS) is a diagnostic tool built into the hard drives installed in
select HP computers. DPS is designed to help diagnose problems that might result in
unwarranted hard drive replacement.
When HP computers are built, each installed hard drive is tested using DPS, and a permanent
record of key information is written onto the drive. Each time DPS is run, test results are written
to the hard drive. Your service provider can use this information to help diagnose conditions that
caused you to run the DPS software. Refer to the Troubleshooting Guide for instructions on
using DPS.
3.6.2 Surge-Tolerant Power Supply
An integrated surge-tolerant power supply provides greater reliability when the computer is hit
with an unpredictable power surge. This power supply is rated to withstand a power surge of up
to 2000 volts without incurring any system downtime or data loss.
3.6.3 Thermal Sensor
The thermal sensor is a hardware and software feature that tracks the internal temperature of the
computer. This feature displays a warning message when the normal range is exceeded, which
gives you time to take action before internal components are damaged or data is lost.
3–18360201-002Service Reference Guide, dc5000
Ultra ATA Drive Guidelines and Features
4.1 Ultra ATA Jumpers
Ultra ATA drives are configured by means of jumper settings. Factory-installed drives ship with
the jumpers preset to the cable-select mode; therefore, no jumper setting changes are required on
factory pre installed, replacement, or option drives. With cable-select, the drive is configured as
either Master (Drive/Device 0) or Slave (Drive/Device 1) by its physical attachment to the cable.
If you purchase a third-party hard drive, refer to the documentation included with the drive kit to
ensure proper cable installation and configuration.
All drives on a controller channel need to have their jumpers either in the cable-select mode or
✎
have the individual drive jumper installed on the appropriate Master (Drive/Device 0) or Slave
(Drive/Device 1) position.
4.2 Ultra ATA Cables
4
When installing a second device on either the primary or secondary controller, you must use an
industry standard 80-conductor Ultra ATA cable for optimal performance. These cables have a
maximum length of 18 inches and a maximum distance of 6 inches between the two devices for a
two-drive cable.
Drives operating at speeds faster than those of the Ultra ATA-33 devices require
industry-standard 40-pin, 80-conductor cables to maintain the higher data transfer rates possible
with the improved technology.
When using Ultra ATA-133, -100, -66, and slower -33 drives in the same system, each drive will
operate at its appropriate data transfer rate.
4.2.1 Cable Layout
The faces of industry-standard cable connectors are color coded for easy recognition:
■ System board connector = blue face
■ Device 0 connector = black face
■ Device 1 connector = gray face
The color code of an industry-standard cable is valid only if the drive’s jumper is in the
✎
cable-select position.
Service Reference Guide, dc5000360201-0024–1
Ultra ATA Drive Guidelines and Features
Single-Drive Cable
System
Board
Blue
Face
Device 0
(master)
Black
Face
Two-Drive Cable
System
Board
Blue
Face
On a two-drive cable, the Drive/Device 0 connector is always the farthest one from the system
board connector and the Drive/Device 1 connector is always the closest to the system board
connector.
Some cables may be labeled “Drive 0” instead of “Device 0” and “Drive 1” instead of
✎
“Device 1”.
Device 1
(slave)
Gray
Face
Device 0
(master)
Black
Face
4.3 Drive Installation Guidelines
Most computer system boards have two ATA (IDE) controller channels with a dedicated
connector for each controller. One controller is designated as the primary and the other as the
secondary controller.
Each of the two controllers can have up to two devices attached to it. Each computer system may
therefore have a maximum of four ATA/ATAPI drives. All drives are connected to these
controllers using an industry-standard 80-conductor cable.
The industry standard 1.44 MB diskette drive has its own separate channel and is not included as
✎
a part of the maximum four drives.
Any drive attached to a controller must have a drive designation. If only a single drive is
connected to a controller and its jumper is in the cable-select position, it is designated as the
Master Drive (Drive/Device 0) by its attachment to the Drive/Device 0 cable position. If two
cable-selected drives are connected to a single controller, one will be designated by its
attachment to the cable as the Master (Drive/Device 0) and the other as Slave (Drive/Device 1).
For optimal performance of a computer system, all drives need to be attached to the ATA
controllers in a specified sequence. This sequence is determined by the device class of the drives
and by specific attach sequence rules.
4–2360201-002Service Reference Guide, dc5000
4.3.1 Device Classes
In order to determine the best drive attach sequence, ATA/ATAPI drives are segregated into four
different classes based upon the bandwidth demands they place on an ATA controller. The most
demanding devices are in Class 1 and the least demanding are in Class 4.
Ultra ATA Drive Guidelines and Features
Class 1
Hard
Drives
ATA-100
ATA-66
ATA-33
Class 2
High Speed
Optical Drives
DVD
DVD-CD R/W
Class 3
Optical Storage
Drives
R/W CD-ROM
CD-ROM
General Attach Guidelines
■ The lower the device class number, the faster the device and the more bandwidth required.
■ Drives installed in the Device 0 positions on both the primary and secondary controllers
receive the greatest possible bandwidth.
■ The bootable ATA hard drive should always be installed on the primary controller in the
Device 0 position.
4.3.2 Attach Sequence Rules by Class Priority
Drives should be attached in the sequence shown for optimum performance starting at
position 1.
4
1
Class 4
Magnetic
Storage Drives
LS-120
Tape
Zip
3
Primary
2
41
Controller*
Secondary
32
Controller
Device 1Device 0
*If there are three or more devices, two or more of which are hard drives, two hard drives should
be attached to the primary controller first before following the General Attach Sequence Rule.
Service Reference Guide, dc5000360201-0024–3
Ultra ATA Drive Guidelines and Features
The attach sequence rule may also be stated in table format:
SequenceDescription
1The lowest class drive - bootable hard drive recommended.
2If only two drives, the last drive goes here; otherwise the lowest class of the
remaining drives.
3If only three drives, attach the final drive here. If a fourth drive exists, attach the
lowest class drive here.
4If there is a fourth drive, attach the final drive here - the drive with the highest
class number of all devices.
*If there are three or more devices, two or more of which are hard drives, two hard drives should
be attached to the primary controller first before following the General Attach Sequence Rule.
The rules allow for:
■ Keeping the hard drive on a separate controller channel maximizes drive performance until a
fourth device is added.
General Attach Sequence Rule*
■ Keeping the hard drives and removable media drives on separate controller channels
maximizes compatibility.
■ Keeping the hard drive and the writable optical drive on separate controller channels
maximizes optical drive reliability.
4.3.3 Attach Sequence Worksheet
Use the worksheet below for obtaining optimum system performance when setting up a
computer with multiple drives. Use the General Attach Sequence Rule to determine the best
drive installation sequence.
Attach Sequence Worksheet
Device NameDevice Class
Two examples of how to use the worksheet are:
Position
Number
Controller
Name
Device
Number
■ Three device installation
■ Four device installation
4–4360201-002Service Reference Guide, dc5000
Ultra ATA Drive Guidelines and Features
Example 1: Three Device Installation Sample
A system has three devices: Ultra ATA-100 hard drive, CD-ROM drive, and a DVD drive. Using
the Device Class Table in Section 4.3.1, the devices may be identified as:
■ Ultra ATA-100 hard drive = Class 1
■ DVD drive = Class 2
■ CD-ROM drive = Class 3
Attach Sequence Worksheet - Three Device Installation (Sample)
Device
Device Name
Ultra ATA-100 hard drive11Primary0
DVD drive22Secondary0
CD-ROM drive33Secondary1
Class
4
3
Primary
Position
Number
Controller
Name
1
2
41
Device
Number
Controller*
Secondary
32
Controller
Device 1Device 0
Example 2: Four Device Installation Sample
A system has four devices: Ultra ATA-100 hard drive, Ultra ATA-100 hard drive, DVD-CDR/W
drive, and a ZIP-250 drive. Using the Device Class Table in Section 4.3.1, the devices may be
reidentified as:
■ Ultra ATA-100 hard drive = Class 1
■ Ultra ATA-100 hard drive = Class 1
■ DVD-CDR/W drive = Class 2
■ ZIP-250 drive = Class 4
Service Reference Guide, dc5000360201-0024–5
Ultra ATA Drive Guidelines and Features
Attach Sequence Worksheet - Four Device Installation (Sample)
Device
Device Name
Ultra ATA-100 hard drive11Primary0
DVD-CDR/W drive22Secondary0
ZIP-250 drive 43Secondary1
Ultra ATA-100 hard
drive*
Class
14Primary1
Position
Number
Controller
Name
Device
Number
*If there are three or more devices, two or more of which are hard drives, two hard drives should
be attached to the primary controller first before following the General Attach Sequence Rule.
4
3
Primary
1
2
41
Controller*
Secondary
32
Controller
Device 1Device 0
4.3.4 Additional Drive Application Notes
■ When replacing a hard drive, the replacement should be of the same type (Ultra ATA -33,
-66, or -100) as that being removed to retain the same level of performance.
■ When Ultra ATA and SCSI hard drives are mixed in the same system, the Ultra ATA drive
will become the boot drive unless the boot order is changed in Computer Setup (F10 Setup).
4.4 SMART
The Self Monitoring Analysis and Recording Technology (SMART) ATA drives for the HP
Personal Computers have built-in drive failure prediction that warns the user or network
administrator of an impending failure or crash of the hard drive. The SMART drive tracks fault
prediction and failure indication parameters such as reallocated sector count, spin retry count,
and calibration retry count. If the drive determines that a failure is imminent, it generates a fault
alert.
4–6360201-002Service Reference Guide, dc5000
4.5 Drive Capacities
The combination of the file system and the operating system used in the computer determines the
maximum usable size of a drive partition. A drive partition is the largest segment of a drive that
may be properly accessed by the operating system. A single hard drive may therefore be
subdivided into a number of unique drive partitions in order to make use of all of its space.
The table that follows identifies the capabilities and restrictions imposed on the computer by the
combinations of file and operating systems.
Microsoft to Drive Manufacturer Size Conversion Table*
Ultra ATA Drive Guidelines and Features
Drive Size as Identified by Microsoft
Operating System
2 GB2.1 GB
4 GB4.3 GB
32 GB34.4 GB
64 GB68.7 GB
128 GB137 GB
2 TB2.199 TB
*Drive size calculations by drive manufacturers are bytes to the base 10 while calculations by
Microsoft are bytes to the base 2.
Drive/Partition Capacity Limits
File
System
FAT 32ATAWindows 2000/ XP32 GB128 GB
FAT 32SCSIWindows 2000/ XP32 GB2 TB
Controller
TypeO perating System
Drive Size as Identified by
Drive Manufacturers
Maximum Size
Partition Drive
NTFSATAWindows NT/2000/XP128 GB128 GB
NTFSSCSIWindows NT/2000/XP2TB2TB
Service Reference Guide, dc5000360201-0024–7
Ultra ATA Drive Guidelines and Features
4–8360201-002Service Reference Guide, dc5000
Identifying the Chassis, Routine Care, and
Disassembly Preparation
This chapter provides general service information for the computer. Adherence to the procedures
and precautions described in this chapter is essential for proper service.
CAUTION: When the computer is plugged into an AC power source voltage is always applied to the
Ä
system board. You must disconnect the power cord from the power source before opening the computer
to prevent system board or component damage.
5.1 Chassis Designations
5.1.1 Microtower (µT)
5
Service Reference Guide, dc5000360201-0025–1
Identifying the Chassis, Routine Care, and Disassembly Preparation
5.1.2 Small Form Factor (SFF)
5–2360201-002Service Reference Guide, dc5000
Identifying the Chassis, Routine Care, and Disassembly Preparation
5.2 Electrostatic Discharge Information
A sudden discharge of static electricity from your finger or other conductor can destroy
static-sensitive devices or microcircuitry. Often the spark is neither felt nor heard, but damage
occurs. An electronic device exposed to electrostatic discharge (ESD) may not appear to be
affected at all and can work perfectly throughout a normal cycle. The device may function
normally for a while, but it has been degraded in the internal layers, reducing its life expectancy.
Networks built into many integrated circuits provide some protection, but in many cases, the
discharge contains enough power to alter device parameters or melt silicon junctions.
5.2.1 Generating Static
The following table shows that:
■ Different activities generate different amounts of static electricity.
■ Static electricity increases as humidity decreases.
Relative Humidity
Event55%40%10%
Walking across carpet
Walking across vinyl floor
Motions of bench worker
Removing DIPs* from plastic tube
Removing DIPs* from vinyl tray
Removing DIPs* from Styrofoam
Removing bubble pack from PCB
Packing PCBs in foam-lined box
*These are then multi-packaged inside plastic tubes, trays, or Styrofoam.
7,500 V
3,000 V
400 V
400 V
2,000 V
3,500 V
7,000 V
5,000 V
15,000 V
5,000 V
800 V
700 V
4,000 V
5,000 V
20,000 V
11,000 V
700 volts can degrade a product.
✎
5.2.2 Preventing Electrostatic Damage to Equipment
Many electronic components are sensitive to ESD. Circuitry design and structure determine the
degree of sensitivity. The following packaging and grounding precautions are necessary to
prevent damage to electric components and accessories.
■ To avoid hand contact, transport products in static-safe containers such as tubes, bags, or
boxes.
■ Protect all electrostatic parts and assemblies with conductive or approved containers or
packaging.
35,000 V
12,000 V
6,000 V
2,000 V
11,500 V
14,500 V
26,500 V
21,000 V
■ Keep electrostatic sensitive parts in their containers until they arrive at static-free stations.
■ Place items on a grounded surface before removing them from their container.
■ Always be properly grounded when touching a sensitive component or assembly.
■ Avoid contact with pins, leads, or circuitry.
■ Place reusable electrostatic-sensitive parts from assemblies in protective packaging or
conductive foam.
Service Reference Guide, dc5000360201-0025–3
Identifying the Chassis, Routine Care, and Disassembly Preparation
5.2.3 Personal Grounding Methods and Equipment
Use the following equipment to prevent static electricity damage to equipment:
■ Wrist straps are flexible straps with a maximum of one-megohm ± 10% resistance in the
ground cords. To provide proper ground, a strap must be worn snug against bare skin. The
ground cord must be connected and fit snugly into the banana plug connector on the
grounding mat or workstation.
■ Heel straps/Toe straps/Boot straps can be used at standing workstations and are
compatible with most types of shoes or boots. On conductive floors or dissipative floor mats,
use them on both feet with a maximum of one-megohm ± 10% resistance between the
operator and ground.
1. Never use solvents or flammable solutions to clean the computer.
2. Never immerse any parts in water or cleaning solutions; apply any liquids to a clean cloth
and then use the cloth on the component.
3. Always unplug the computer when cleaning with liquids or damp cloths.
4. Always unplug the computer before cleaning the keyboard, mouse, or air vents.
5. Disconnect the keyboard before cleaning it.
6. Wear safety glasses equipped with side shields when cleaning the keyboard.
5.3.2 Cleaning the Computer Case
Follow all safety precautions in Section 5.3.1, “General Cleaning Safety Precautions,” before
cleaning the computer.
To clean the computer case, follow the procedures described below:
■ To remove light stains or dirt, use plain water with a clean, lint-free cloth or swab.
■ For stronger stains, use a mild dishwashing liquid diluted with water. Rinse well by wiping it
with a cloth or swab dampened with clear water.
■ For stubborn stains, use isopropyl (rubbing) alcohol. No rinsing is needed as the alcohol will
evaporate quickly and not leave a residue.
■ After cleaning, always wipe the unit with a clean, lint-free cloth.
■ Occasionally clean the air vents on the computer. Lint and other foreign matter can block the
vents and limit the airflow.
Service Reference Guide, dc5000360201-0025–5
Identifying the Chassis, Routine Care, and Disassembly Preparation
5.3.3 Cleaning the Keyboard
Follow all safety precautions in Section 5.3.1, “General Cleaning Safety Precautions,” before
cleaning the keyboard.
To clean the tops of the keys or the keyboard body, follow the procedures described in Section
5.3.2, “Cleaning the Computer Case.”
When cleaning debris from under the keys, review all rules in Section 5.3.1, “General Cleaning
Safety Precautions,” before following these procedures:
CAUTION: Use safety glasses equipped with side shields before attempting to clean debris from under
Ä
the keys.
■ Visible debris underneath or between the keys may be removed by vacuuming or shaking.
■ Canned, pressurized air may be used to clean debris from under the keys. Caution should be
used as too much air pressure can dislodge lubricants applied under the wide keys.
■ If you remove a key, use a specially designed key puller to prevent damage to the keys. This
tool is available through many electronic supply outlets.
CAUTION: Never remove a wide leveled key (like the space bar) from the keyboard. If these keys are
Ä
improperly removed or installed, the keyboard may not function properly.
■ Cleaning under a key may be done with a swab moistened with isopropyl alcohol and
squeezed out. Be careful not to wipe away lubricants necessary for proper key functions. Use
tweezers to remove any fibers or dirt in confined areas. Allow the parts to air dry before
reassembly.
5.3.4 Cleaning the Monitor
■ Wipe the monitor screen with a clean cloth moistened with water or with a towelette
designed for cleaning monitors. Do not use sprays or aerosols directly on the screen; the
liquid may seep into the housing and damage a component. Never use solvents or flammable
liquids on the monitor.
■ To clean the monitor body follow the procedures in Section 5.3.2, “Cleaning the Computer
Case.”
5.3.5 Cleaning the Mouse
Before cleaning the mouse, ensure that the power to the computer is turned off.
■ Clean the mouse ball by first removing the retaining plate and the ball from the housing. Pull
out any debris from the ball socket and wipe the ball with a clean, dry cloth before
reassembly.
■ To clean the mouse body, follow the procedures in Section 5.3, “Routine Care.”
5–6360201-002Service Reference Guide, dc5000
Identifying the Chassis, Routine Care, and Disassembly Preparation
5.4 Service Considerations
Listed below are some of the considerations that you should keep in mind during the disassembly
and assembly of the computer.
5.4.1 Power Supply Fan
The power supply fan is a variable-speed fan based on the temperature in the power supply.
CAUTION: The cooling fan is off only when the computer is turned off or the power cable has been
Ä
disconnected.
The cooling fan is always on when the computer is either in the “On,” “Standby,” or “Suspend” modes.
You must disconnect the power cord from the power source before opening the computer to prevent
system board or component damage.
5.4.2 Tools and Software Requirements
To service the computer, you need the following:
■ Torx T-15 screwdriver (Compaq screwdriver with bits, PN 161946-001)
■ Torx T-15 screwdriver with small diameter shank (for certain front bezel removal)
■ Flat-bladed screwdriver (may sometimes be used in place of the Torx screwdriver)
■ Phillips #2 screwdriver
■ Diagnostics software
5.4.3 Screws
The screws used in the computer are not interchangeable. They may have standard or metric
threads and may be of different lengths. If an incorrect screw is used during the reassembly
process, it can damage the unit. HP strongly recommends that all screws removed during
disassembly be kept with the part that was removed, then returned to their proper locations.
Metric screws have a black finish.
✎
U.S. screws have a silver finish.
As each subassembly is removed from the computer, it should be placed away from the work
✎
area to prevent damage.
Service Reference Guide, dc5000360201-0025–7
Identifying the Chassis, Routine Care, and Disassembly Preparation
5.4.4 Cables and Connectors
Most cables used throughout the unit are flat, flexible cables. These cables must be handled with
care to avoid damage. Apply only the tension required to seat or unseat the cables during
insertion or removal from the connector. Handle cables by the connector whenever possible. In
all cases, avoid bending or twisting the cables, and ensure that the cables are routed in such a way
that they cannot be caught or snagged by parts being removed or replaced.
CAUTION: When servicing this computer, ensure that cables are placed in their proper location during
Ä
the reassembly process. Improper cable placement can damage the computer.
5.4.5 Hard Drives
Handle hard drives as delicate, precision components, avoiding all physical shock and vibration.
This applies to failed drives as well as replacement spares.
■ If a drive must be mailed, place the drive in a bubble-pack mailer or other suitable protective
packaging and label the package “Fragile: Handle With Care.”
■ Do not remove hard drives from the shipping package for storage. Keep hard drives in their
protective packaging until they are actually mounted in the CPU.
■ Avoid dropping drives from any height onto any surface.
■ If you are inserting or removing a hard drive, turn off the computer. Do not remove a hard
drive while the computer is on or in standby mode.
■ Before handling a drive, ensure that you are discharged of static electricity. While handling a
drive, avoid touching the connector. For more information about preventing electrostatic
damage, refer to
■ Do not use excessive force when inserting a drive.
■ Avoid exposing a hard drive to liquids, temperature extremes, or products that have
The battery that comes with the computer provides power to the real-time clock and has a
lifetime of about three years.
See the appropriate removal and replacement chapter for the chassis you are working on in this
guide for instructions on the replacement procedures.
WARNING: This computer contains a lithium battery. There is a risk of fire and chemical burn if the
Å
battery is handled improperly. Do not disassemble, crush, puncture, short external contacts, dispose in
water or fire, or expose it to temperatures higher than 140ºF (60ºC).
CAUTION: Batteries, battery packs, and accumulators should not be disposed of together with the
Ä
general household waste.
5–8360201-002Service Reference Guide, dc5000
Removal and Replacement Procedures—
Microtower (µT) Chassis
Adherence to the procedures and precautions described in this chapter is essential for proper
service. After completing all necessary removal and replacement procedures, run the Diagnostics
utility to verify that all components operate properly.
Not all features listed in this guide are available on all computers.
✎
6.1 Preparation for Disassembly
See Chapter 5, “Identifying the Chassis, Routine Care, and Disassembly Preparation,” for initial
procedures.
1. Remove/disengage any security devices that prohibit opening the computer (Section 6.2,
“External Security Devices,” Section 6.2.1, “Installing a Cable Lock,” and Section 6.2.2,
“Installing a Padlock”).
6
2. Close any open software applications.
3. Exit the operating system.
4. Remove any diskette or compact disc from the computer.
5. Turn off the computer and any peripheral devices that are connected to it.
CAUTION: Turn off the computer before disconnecting any cables.
Ä
CAUTION: Regardless of the power-on state, voltage is always present on the system board as long as
Ä
the system is plugged into an active AC outlet. In some systems the cooling fan is on even when the
computer is in the “Standby,” or “Suspend” modes. The power cord should always be disconnected
before servicing a unit.
6. Disconnect the power cord from the electrical outlet and then from the computer.
7. Disconnect all peripheral device cables from the computer.
During disassembly, label each cable as you remove it, noting its position and routing. Keep all
✎
screws with the units removed.
CAUTION: The screws used in the computer are of different thread sizes and lengths; using the wrong
Ä
screw in an application may damage the unit.
Service Reference Guide, dc5000360201-0026–1
Removal and Replacement Procedures— Microtower (µT) Chassis
6.2 External Security Devices
6.2.1 Installing a Cable Lock
The cable lock may be used to secure the computer access panel to the chassis and, at the same
time, secure the computer to a fixed object.
6–2360201-002Service Reference Guide, dc5000
6.2.2 Installing a Padlock
A padlock may be used by itself to secure the access panel to the computer chassis. A padlock
may also be used with a security cable to secure the computer to a fixed object.
I
Removal and Replacement Procedures— Microtower (µT) Chassis
Service Reference Guide, dc5000360201-0026–3
Removal and Replacement Procedures— Microtower (µT) Chassis
6.3 Access Panel
1. Prepare the computer for disassembly (Chapter 6, “Removal and Replacement Procedures—
Microtower (µT) Chassis”).
CAUTION: Before removing the computer access panel, ensure that the computer is turned off and that
Ä
the power cord is disconnected from the electrical outlet.
2. Loosen the captive thumbscrew 1 that secures the access panel to the computer chassis.
3. Slide the access panel 2 back about 1 inch (2.5 cm), then lift it off the unit.
You may want to lay the computer on its side to install internal parts. Be sure the side with the
✎
access panel and pull grip is facing up.
To install the access panel, reverse the removal procedure.
6–4360201-002Service Reference Guide, dc5000
6.4 Front Bezel
1. Prepare the computer for disassembly (Section 6.1, “Preparation for Disassembly”).
2. Remove the access panel (Section 6.3, “Access Panel”).
3. To remove the front bezel, press in on the two bottom tabs on the left side of the bezel 1 so
that they release from the chassis. Then press in on the upper tab on the left side of the bezel
2 so that it releases from the chassis. The bezel will rotate out slightly from left to right.
CAUTION: Do not over-rotate or try to pull the bezel off at this point, otherwise you may break the
Ä
remaining hooks on the inside of the bezel.
Removal and Replacement Procedures— Microtower (µT) Chassis
Service Reference Guide, dc5000360201-0026–5
Removal and Replacement Procedures— Microtower (µT) Chassis
4. Press down on the upper right corner of the bezel to release the hook that secures the top of
the bezel to the chassis 1. Continue to rotate the bezel, then push the bezel to the left to
release the right side latches and rotate the bezel off the chassis from left to right 2.
6–6360201-002Service Reference Guide, dc5000
Removal and Replacement Procedures— Microtower (µT) Chassis
To reinstall the front bezel,
1. Position the chassis in the upright position.
2. Insert the two hooks on the right side of the bezel 1 into the rectangular holes on the chassis
then rotate the bezel into place 2 so that the three tabs on the left side of the bezel and the
single tab on the upper right corner of the bezel snap into the slots on the chassis.
Service Reference Guide, dc5000360201-0026–7
Removal and Replacement Procedures— Microtower (µT) Chassis
6.5 Front Drive Bezels
1. Prepare the computer for disassembly (Section 6.1, “Preparation for Disassembly”).
2. Remove the access panel (Section 6.3, “Access Panel”).
3. Remove the front bezel (Section 6.4, “Front Bezel”).
6.5.1 5.25" Drive Bezel Blank
Press the two retaining tabs on the inside of the large bezel 1 towards the outside of the bezel to
release the bezel blank. At the same time, pull the bezel blank in 2 to remove it from the front
bezel.
To install a bezel blank, reverse the removal procedure.
6–8360201-002Service Reference Guide, dc5000
6.5.2 Diskette Drive Bezel
Press the two upper 1 or the two lower 2 tabs for the diskette drive bezel towards the center of
the drive bezel and push the bezel out to remove it from the front bezel.
Removal and Replacement Procedures— Microtower (µT) Chassis
To install a bezel or a bezel blank, reverse the removal procedure.
6.5.3 3.5" Drive Bezel Blank
Press the two upper 1 or the two lower 2 tabs for the 3.5" drive bezel towards the center of the
3.5" drive bezel and push the bezel blank out to remove it from the front bezel.
To install a bezel blank, reverse the removal procedure.
Service Reference Guide, dc5000360201-0026–9
Removal and Replacement Procedures— Microtower (µT) Chassis
6.6 Memory Modules
CAUTION: The memory module sockets have gold metal contacts. When upgrading the memory, it is
Ä
important to use memory modules with gold metal contacts to prevent corrosion and/or oxidation
resulting from having incompatible metals in contact with each other.
CAUTION: Static electricity can damage the electronic components of the computer or optional cards.
Ä
Before beginning these procedures, ensure that you are discharged of static electricity by briefly
touching a grounded metal object. Refer to Chapter for more information.
CAUTION: When handling a memory module, be careful not to touch any of the contacts. Doing so
Ä
may damage the module.
1. Prepare the computer for disassembly (Section 6.1, “Preparation for Disassembly”).
2. Remove the access panel and rotate the computer so the system board is parallel to the table
to make it easier to work on (
WARNING: To reduce risk of personal injury from hot surfaces, allow the internal system components
Å
to cool before touching.
Section 6.3, “Access Panel”).
3. Open both latches of the memory module socket 1, and insert the memory module into the
socket 2. Begin by installing a module into the socket nearest the preinstalled module, and
install the modules following the numerical order of the sockets.
A memory module can be installed in only one way. Match the notch on the module with the tab
✎
on the memory socket.
4. Push the module down into the socket, ensuring that the module is fully inserted and
properly seated. Make sure the latches are in the closed position 3.
5. Repeat steps 3 and 4 for any additional modules that you want to install.
To reassemble the computer, reverse the removal procedure.
6–10360201-002Service Reference Guide, dc5000
6.7 Expansion Cards
6.7.1 Expansion Slot Cover
1. Prepare the computer for disassembly (Section 6.1, “Preparation for Disassembly”).
2. Remove the access panel and rotate the computer so the system board is parallel to the table
to make it easier to work on (
3. On the rear of the computer, slide the slot cover lock up to access the expansion slot covers.
Section 6.3, “Access Panel”).
Removal and Replacement Procedures— Microtower (µT) Chassis
For instructions on PCI expansion cards, see Section 6.7.2, “PCI Expansion Card.”
Service Reference Guide, dc5000360201-0026–11
Removal and Replacement Procedures— Microtower (µT) Chassis
6.7.2 PCI Expansion Card
For preliminary steps, see Section 6.7.1, “Expansion Slot Cover.”
1. Lay the computer on its side with the open side facing up.
If replacing a PCI expansion card go to step 2.
If installing a PCI expansion card for the first time in a computer, skip to step 5.
2. When removing an expansion card from a standard expansion socket, hold the card at each
end, and carefully rock it back and forth until the connectors pull free from the socket.
3. Pull the expansion card straight up from the socket 1 then away from the inside of the
chassis 2 to maneuver the card out of the computer.
CAUTION: Be sure not to scrape the card against the other components.
Ä
CAUTION: After removing an expansion card, you must replace it with a new card or cover the open
Ä
slot (for example, with a metal slot cover or a piece of cardboard taped in place) for proper cooling of
internal components during operation.
4. Store the old card in the anti-static packaging that contained the new card.
5. If you are installing a PCI expansion card for the first time in this computer you will need to
remove the correct expansion slot cover at this time.
6–12360201-002Service Reference Guide, dc5000
Removal and Replacement Procedures— Microtower (µT) Chassis
6. When installing an expansion card, hold the card just above the expansion slot on the system
board then move the card toward the rear of the chassis so that the bracket on the card is
aligned with the open slot on the rear of the chassis 1.
7. Press the card straight down into the expansion slot on the system board 2.
Press firmly on the card so that the whole connector seats properly in the expansion card slot.
✎
8. Slide the slot cover lock down toward the expansion card brackets and slot covers to secure
them in place.
Installing the access panel will secure the slot cover lock.
✎
Service Reference Guide, dc5000360201-0026–13
Removal and Replacement Procedures— Microtower (µT) Chassis
6.8 Drives
The computer supports up to six drives that may be installed in various configurations.
This Section describes the procedure for replacing or upgrading the storage drives. A Torx T-15
screwdriver is needed to remove and install the guide screws on a drive.
CAUTION: Make sure personal files on the hard drive are backed up to an external storage device
Ä
before removing the hard drive. Failure to do so will result in data loss. After replacing the primary hard
drive, you will need to run the Restore CD to load the Compaq factory-installed files.
6.8.1 Drive Positions
Drive Positions
ItemDescriptionItemDescription
1Optical drive*4Bay for optional 3.5" drive
2Second optical drive5Primary hard drive
3Diskette drive (optional)6Optional hard drive
*An optical drive is a CD-ROM, CD-R/RW, DVD-ROM, DVD-R/RW, or CD-RW/DVD Combo
drive.
6–14360201-002Service Reference Guide, dc5000
6.8.2 Removing a Drive
1. Prepare the computer for disassembly (Section 6.1, “Preparation for Disassembly”).
2. Remove the access panel and rotate the computer so the system board is parallel to the table
to make it easier to work on (
3. Remove the front bezel (Section 6.4, “Front Bezel”).
4. Disconnect the power and data cables from the back of the drive, as shown in the following
illustrations.
Disconnecting Optical Drive Cables
Removal and Replacement Procedures— Microtower (µT) Chassis
Section 6.3, “Access Panel”).
Disconnecting Diskette Drive Cables
Service Reference Guide, dc5000360201-0026–15
Removal and Replacement Procedures— Microtower (µT) Chassis
Disconnecting Hard Drive Cables
Releasing the Drives
5. A latch drive bracket with release tabs secures the drives in the drive bay. Lift the release tab
on the latch drive bracket 1 for the drive you want to remove, then slide the drive from its
drive bay
2.
6. Remove the four guide screws (two on each side) from the old drive. You will need these
screws to install a new drive.
6–16360201-002Service Reference Guide, dc5000
6.8.3 Installing a Drive
CAUTION: To prevent loss of work and damage to the computer or drive:
Ä
■ If you are inserting or removing a hard drive, shut down the operating system properly, then turn off
the computer. Do not remove a hard drive while the computer is on or in standby mode.
■ Before handling a drive, ensure that you are discharged of static electricity. While handling a drive,
avoid touching the connector. For more information about preventing electrostatic damage, refer to
Chapter 5 for more information
■ Handle a drive carefully; do not drop it.
■ Do not use excessive force when inserting a drive.
■ Avoid exposing a hard drive to liquids, temperature extremes, or products that have magnetic fields
such as monitors or speakers.
1. Install four guide screws (two on each side) into the new drive. The screws help guide the
drive into its proper position in the bay.
❏ If this is a new installation, guide screws are provided on the front of the chassis under
the front bezel.
❏ If this is a replacement drive, use the screws taken from the old drive.
Removal and Replacement Procedures— Microtower (µT) Chassis
There are a total of eight extra guide screws on the front of the chassis. Four have U.S. threads
✎
and four have metric threads. Metric screws have a black finish. U.S. threaded screws have a
silver finish. Make sure to install the appropriate guide screws into the drive.
2. Align the guide screws with the guide slots, then slide the drive into the drive bay, making
sure it is fully seated.
Service Reference Guide, dc5000360201-0026–17
Removal and Replacement Procedures— Microtower (µT) Chassis
3. Reconnect the power and data cables to the drive as shown in the following illustrations.
Refer to Chapter 4, “Ultra ATA Drive Guidelines and Features,” and Section 4.3, “Drive
✎
Installation Guidelines,” for information on attaching the cabling to get optimum performance.
Connecting Optical Drive Cables
Connecting Diskette Drive Cables
6–18360201-002Service Reference Guide, dc5000
Removal and Replacement Procedures— Microtower (µT) Chassis
Connecting Hard Drive Cables
4. Install the front bezel (Section 6.4, “Front Bezel”).
5. Install the access panel (Section 6.3, “Access Panel”).
6. Turn on the computer.
If you replaced the primary hard drive, the restore CD may be used to restore the operating
✎
system, software drivers, and/or any software applications that were preinstalled on the
computer. Follow the instructions in the guide included with the restore CD. When the restore
process has completed, reinstall any personal files that were backed up before replacing the hard
drive.
Service Reference Guide, dc5000360201-0026–19
Removal and Replacement Procedures— Microtower (µT) Chassis
6.9 Chassis Fan
1. Prepare the computer for disassembly (Section 6.1, “Preparation for Disassembly”).
2. Remove the access panel and rotate the computer so the system board is parallel to the table
to make it easier to work on (
3. Disconnect the power cable that connects the chassis fan to the system board 1.
4. Remove the four screws from the rear of the chassis 2 that secure the fan.
5. Remove the fan from the chassis 3.
Section 6.3, “Access Panel”).
To install the chassis fan, reverse the removal procedure.
6–20360201-002Service Reference Guide, dc5000
Removal and Replacement Procedures— Microtower (µT) Chassis
6.10 Front I/O Panel Housing Assembly
1. Prepare the computer for disassembly (Section 6.1, “Preparation for Disassembly”).
2. Remove the access panel and rotate the computer so the system board is parallel to the table
to make it easier to work on (
3. Disconnect three attaching cables from the system board: the power switch/LED cable, the
front USB cable, and the front audio cable.
4. Remove the two screws 1 that secure the housing to the chassis and then pull the housing 2
away from the chassis.
Section 6.3, “Access Panel”).
To install the housing assembly, reverse the removal procedures.
Service Reference Guide, dc5000360201-0026–21
Removal and Replacement Procedures— Microtower (µT) Chassis
6.11 Front I/O Devices
1. Prepare the computer for disassembly (Section 6.1, “Preparation for Disassembly”).
2. Remove the access panel and rotate the computer so the system board is parallel to the table
to make it easier to work on (
3. Remove the front I/O panel assembly (Section 6.10, “Front I/O Panel Housing Assembly”).
4. Remove the two screws 1 that hold the USB and audio port assembly in place.
5. Remove the I/O device assembly from the I/O panel 2 by pushing it out of the housing.
Section 6.3, “Access Panel”).
To install the I/O devices, reverse the removal procedures and then reinstall the housing
assembly.
6–22360201-002Service Reference Guide, dc5000
Removal and Replacement Procedures— Microtower (µT) Chassis
6.12 Power Switch Assembly
1. Prepare the computer for disassembly (Section 6.1, “Preparation for Disassembly”).
2. Remove the access panel and rotate the computer so the system board is parallel to the table
to make it easier to work on (
3. Remove the front I/O panel assembly (Section 6.10, “Front I/O Panel Housing Assembly”).
4. Squeeze the switch holder retaining clips together 1 and push the switch assembly out of the
front I/O panel housing.
5. From the inside of the I/O panel assembly, spread the clips 2 that secure the LEDs in place
and then push the LEDs out of the retainers from the front side.
6. If necessary, compress the retaining clips on the LED holders and push the holders out of the
front of the I/O panel housing.
7. Remove the switch from the switch holder 3.
Section 6.3, “Access Panel”).
8. To install the power switch assembly install the switch into the switch holder.
Service Reference Guide, dc5000360201-0026–23
Removal and Replacement Procedures— Microtower (µT) Chassis
9. Place the switch holder with switch installed into the inside of the front I/O panel housing
and position the legs of the retaining clip into the clip slots. Press firmly so that the clips will
penetrate the slot openings and latch into place. If one clip will not easily engage, it may be
necessary to use the end of a ball point pen (or another thin, stiff object) to compress the clip
leg while inserting it into the clip slot.
10. Push the LEDs into the their retainers. The power LED (having the blue and black leads)
should be to the right when viewed from the front of the computer.
11. Reconnect the housing assembly to the front of the chassis and reconnect the cables to the
system board.
6–24360201-002Service Reference Guide, dc5000
Removal and Replacement Procedures— Microtower (µT) Chassis
6.13 Processor and Heatsink
1. Prepare the computer for disassembly (Section 6.1, “Preparation for Disassembly”).
2. Remove the access panel and rotate the computer so the system board is parallel to the table
to make it easier to work on (
3. Disconnect the heatsink fan cable from the system board.
4. Release the tension from the heatsink 1.
5. Remove the retaining clips 2.
6. Remove the heatsink from atop the processor 3.
7. Open the ZIF socket lever 4.
8. Remove the processor 5.
Section 6.3, “Access Panel”).
To install the processor and heatsink:
1. Insert the processor into the ZIF socket.
2. Press down on the processor while rotating and locking the ZIF socket handle in place.
3. Refresh the thermal grease between the heatisnk and processor if necessary.
4. Install the heatsink and latch it in place.
5. Connect the heatsink fan control to the system board.
6. Replace the access panel and reconnect the computer.
Service Reference Guide, dc5000360201-0026–25
Removal and Replacement Procedures— Microtower (µT) Chassis
6.14 System Board
1. Prepare the computer for disassembly (Section 6.1, “Preparation for Disassembly”).
2. Remove the access panel and rotate the computer so the system board is parallel to the table
to make it easier to work on (
4. Disconnect all cables connected to the system board, noting their location for reinstallation.
5. Compress the system board tray handle 1 to release the latch and slide the system board tray
towards the front of the computer 2 to free it from the back of the chassis.
Section 6.3, “Access Panel”).
To install the system board, slide the tray assembly into the chassis and press down on the two
places shown in the drawing 1 while sliding the tray into its locked position 2.
6–26360201-002Service Reference Guide, dc5000
6.15 Battery
The battery that comes with your computer provides power to the real-time clock and has a
lifetime of about three years. When replacing the battery, use a battery equivalent to the battery
originally installed on the computer. The computer comes with a 3-volt lithium coin cell battery.
The lifetime of the lithium battery can be extended by plugging the computer into a live AC wall
✎
socket. The lithium battery is only used when the computer is NOT connected to AC power.
WARNING: This computer contains an internal lithium manganese dioxide battery. There is a risk of fire and
Å
burns if the battery is not handled properly. To reduce the risk of personal injury:
■ Do not attempt to recharge the battery.
■ Do not expose to temperatures higher than 140°F (60°C)
■ Do not disassemble, crush, puncture, short external contacts, or dispose of in fire or
water.
■ Replace the battery only with the HP/Compaq spare designated for this product.
CAUTION: Before replacing the battery, it is important to back up the computer CMOS settings. When
Ä
the battery is removed or replaced, the CMOS settings will be cleared. Refer to the Troubleshooting
Guide for information on backing up the CMOS settings.
Removal and Replacement Procedures— Microtower (µT) Chassis
Batteries, battery packs, and accumulators should not be disposed of together with the general
N
household waste. In order to forward them to recycling or proper disposal, please use the public
collection system or return them to HP/Compaq, their authorized partners, or their agents.
CAUTION: Static electricity can damage the electronic components of the computer or optional
Ä
equipment. Before beginning these procedures, ensure that you are discharged of static electricity by
briefly touching a grounded metal object.
1. Prepare the computer for disassembly (Section 6.1, “Preparation for Disassembly”).
2. Remove the access panel and rotate the computer so the system board is parallel to the table
to make it easier to work on (
It may be necessary to remove an expansion card to gain access to the battery.
Section 6.3, “Access Panel”).
✎
3. Locate the battery and battery holder on the system board.
4. Depending on the type of battery holder on your system board, complete the following
instructions to replace the battery:
Service Reference Guide, dc5000360201-0026–27
Removal and Replacement Procedures— Microtower (µT) Chassis
6.15.1 Type 1 Battery Holder
1. Lift the battery out of its holder.
2. Slide the replacement battery into position, positive side up.
3. The battery holder automatically secures the battery in the proper position.
4. Replace the computer cover or access panel (Section 6.3, “Access Panel”).
5. Plug in the computer and turn on power to the computer.
6. Reset the date and time, your passwords, and any special system setups, using Computer
Setup. Refer to the Computer Setup (F10) Utility Guide.
6–28360201-002Service Reference Guide, dc5000
6.15.2 Type 2 Battery Holder
1. To release the battery from its holder, squeeze the metal clamp that extends above one edge
of the battery 1. When the battery pops up, lift it out.
2. To insert the new battery, slide one edge of the replacement battery under the holder’s lip 2
with the positive side up. Push the other edge down until the clamp snaps over the other edge
of the battery.
Removal and Replacement Procedures— Microtower (µT) Chassis
After the battery has been replaced, use the following steps to complete this procedure.
✎
3. Replace the computer cover or access panel (Section 6.3, “Access Panel”).
4. Plug in the computer and turn on power to the computer.
Reset the date and time, your passwords, and any special system setups, using Computer Setup.
Refer to the Computer Setup (F10) Utility Guide.
Service Reference Guide, dc5000360201-0026–29
Removal and Replacement Procedures— Microtower (µT) Chassis
6.15.3 Type 3 Battery Holder
1. To release the battery from its holder, press back lever 1 that extends above one edge of the
battery.
2. When the battery pops up, lift it out 2.
3. To insert the new battery, push it down into the holder with the positive side to the left as
shown in the drawing above.
4. Replace the computer access panel (Section 6.3, “Access Panel”).
5. Plug in the computer and turn on power.
6. Reset the date and time, your passwords, and any special system setups, using Computer
Setup. Refer to the Computer Setup (F10) Utility Guide.
6–30360201-002Service Reference Guide, dc5000
6.16 Speaker
1. Prepare the computer for disassembly (Section 6.1, “Preparation for Disassembly”).
2. Remove the access panel and rotate the computer so the system board is parallel to the table
to make it easier to work on (
3. Move/remove any components necessary to gain access to the speaker.
4. Disconnect the speaker wire from the system board connector.
5. Remove the four screws 1, that secure the speaker to the chassis.
6. Remove the speaker 2.
Removal and Replacement Procedures— Microtower (µT) Chassis
Section 6.3, “Access Panel”).
To install the speaker, reverse the removal procedures.
Service Reference Guide, dc5000360201-0026–31
Removal and Replacement Procedures— Microtower (µT) Chassis
6.17 Power Supply
WARNING: Voltage is always present on the system board when the computer is plugged into an
Å
active AC outlet. To avoid possible personal injury and damage to the equipment the power cord should
be disconnected from the computer and/or the AC outlet before opening the computer.
1. Prepare the computer for disassembly (Section 6.1, “Preparation for Disassembly”).
2. Remove the access panel and rotate the computer so the system board is parallel to the table
to make it easier to work on (
3. Disconnect all power cables from the mass storage devices and from the system board.
4. Remove the screws that connect the power supply to the chassis 1.
5. Slide the power supply toward the front of the computer, then lift it out of the computer 2.
Section 6.3, “Access Panel”).
To install the power supply, reverse the removal procedure.
6–32360201-002Service Reference Guide, dc5000
Removal and Replacement Procedures—
Small Form Factor (SFF) Chassis
Adherence to the procedures and precautions described in this chapter is essential for proper
service. After completing all necessary removal and replacement procedures, run the Diagnostics
utility to verify that all components operate properly.
Not all features listed in this guide are available on all computers.
✎
7.1 Preparation for Disassembly
See Chapter 5, “Identifying the Chassis, Routine Care, and Disassembly Preparation,” for initial
procedures.
1. Remove/disengage any security devices that prohibit opening the computer (Section 7.2,
“External Security Devices”).
2. Close any open software applications.
7
3. Exit the operating system.
4. Remove any diskette or compact disc from the computer.
5. Turn off the computer and any peripheral devices that are connected to it.
CAUTION: Turn off the computer before disconnecting any cables.
Ä
CAUTION: Regardless of the power-on state, voltage is always present on the system board as long as
Ä
the system is plugged into an active AC outlet. In some systems the cooling fan is on even when the
computer is in the “Standby,” or “Suspend” modes. The power cord should always be disconnected
before servicing a unit.
6. Disconnect the power cord from the electrical outlet and then from the computer.
7. Disconnect all peripheral device cables from the computer.
During disassembly, label each cable as you remove it, noting its position and routing. Keep all
✎
screws with the units removed.
CAUTION: The screws used in the computer are of different thread sizes and lengths; using the wrong
Ä
screw in an application may damage the unit.
Service Reference Guide, dc5000360201-0027–1
Removal and Replacement Procedures— Small Form Factor (SFF) Chassis
7.2 External S e c u r i t y Dev i c e s
7.2.1 Cable Lock
The cable lock may be used to secure the computer access panel to the chassis and, at the same
time, secure the computer to a fixed object.
As shown, there are two acceptable methods for using the cable lock.While both methods work,
for added security HP recommends that you use the method shown on the left where the cable
lock penetrates both the access panel and the chassis.
7–2360201-002Service Reference Guide, dc5000
7.2 . 2 Pa d l ock
A padlock may be used by itself to secure the access panel to the computer chassis. A padlock
may also be used with a security cable to secure the computer to a fixed object.
I
Removal and Replacement Procedures— Small Form Factor (SFF) Chassis
Service Reference Guide, dc5000360201-0027–3
Removal and Replacement Procedures— Small Form Factor (SFF) Chassis
7.3 C o m p u ter Access Pa n e l
1. Prepare the computer for disassembly (Section 7.1, “Preparation for Disassembly”).
CAUTION: Before removing the computer access panel, ensure that the computer is turned off and that
Ä
the power cord is disconnected from the electrical outlet.
2. Pull up and hold open the latch on the top of the computer 1.
3. Slide the computer access panel 2 back about 0.5inch (1.3 cm), then lift it off the unit.
When installing the access panel, press down on its center to ensure the latches are properly
secured while sliding it into the locked position.
7–4360201-002Service Reference Guide, dc5000
7.4 Front Bezel
1. Prepare the computer for disassembly (Section 7.1, “Preparation for Disassembly”).