This document provides information on the removal and replacement of all
parts as well as information on troubleshooting, Desktop Management, setup
utilities, PATA and SATA drives, safety, routine care, connector pin
assignments, POST error messages, and diagnostic indicator lights.
Document Part Number 376226-001
Page 2
Page 3
Service Reference Guide
HP Compaq Business Desktop dx2100 ST Series
1st Edition
Document Part Number: 376226-001
1st Edition, August 2005
This document provides information on the removal and replacement of all parts as well as
information on troubleshooting, Desktop Management, setup utilities, SATA and PATA drives,
safety, routine care, connector pin assignments, POST error messages, and diagnostic indicator
lights.
HP, Hewlett Packard, and the Hewlett-Packard logo are trademarks of Hewlett-Packard Company in the U.S. and
other countries.
Compaq and the Compaq logo are trademarks of Hewlett-Packard Development Company, L.P. in the U.S. and
other countries.
Microsoft, MS-DOS, Windows, and Windows NT are trademarks of Microsoft Corporation in the U.S. and other
countries.
Intel, Pentium, Intel Inside, and Celeron are trademarks of Intel Corporation in the U.S. and other countries.
Adobe, Acrobat, and Acrobat Reader are trademarks or registered trademarks of Adobe Systems Incorporated.
All other product names mentioned herein may be trademarks of their respective companies.
Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein or for
incidental or consequential damages in connection with the furnishing, performance, or use of this material. The
information in this document is provided “as is” without warranty of any kind, including, but not limited to, the
implied warranties of merchantability and fitness for a particular purpose, and is subject to change without notice.
The warranties for HP products are set forth in the express limited warranty statements accompanying such
products. Nothing herein should be construed as constituting an additional warranty.
This document contains proprietary information that is protected by copyright. No part of this document may be
photocopied, reproduced, or translated to another language without the prior written consent of Hewlett-Packard
Company.
WARNING: Text set off in this manner indicates that failure to follow directions could result in bodily
Å
harm or loss of life.
CAUTION: Text set off in this manner indicates that failure to follow directions could result in damage to
ESystem Board and Riser Card Reference Designators
FMemory
Index
Page 9
Installing the Operating System
CAUTION: Do not add optional hardware or third-party devices to your computer until the operating
system is successfully installed. Doing so may cause errors and may prevent the operating system from
installing properly.
Once the automatic installation has begun, DO NOT TURN OFF THE COMPUTER UNTIL
THE PROCESS IS COMPLETE. Turning off the computer during the installation process might damage the
software that runs the computer or prevent its proper installation.
The first time the computer is turned on, the operating system is automatically installed. This
takes approximately 10 minutes, depending on the system hardware configuration. At the
beginning of the installation process, you are prompted to select the appropriate language for the
operating system. Read and follow the instructions that appear on the screen to complete the
installation.
If the computer shipped with more than one operating system language on the hard drive, the
✎
installation process could take up to 60 minutes.
During this process, do not turn off your computer unless you are directed to do so.
1
1.1 Installing or Upgrading Device Drivers
To install hardware devices such as a printer, a display adapter, or network adapter after the
operating system installation is completed, the operating system needs access to the appropriate
software drivers for the devices.
If prompted for the I386 directory, replace the path specification with C:\i386, or use the Browse
button in the dialog box to locate the i386 folder. This action points the operating system to the
appropriate drivers.
Obtain the latest support software, including support software for the operating system from
www.hp.com. Click Support & Drivers, select Download drivers and software, enter the
model number of the computer, and press .
You can also obtain the latest support software on CDs. The following Web site provides
information on how to purchase a support software CD subscription:
If the computer has an optical CD-RW drive, install the appropriate application to be able to
write to the drive. To install the application, double-click the Setup Software icon on the desktop
or the application launcher and select the Easy CD Creator and Direct CD option when
prompted.
1–1
Page 10
Installing the Operating System
1.2 Transferring Files and Settings
Use the Microsoft Windows XP Files and Settings Transfer Wizard to move files and settings
from an old computer to a new one. Click Start > All Programs > Accessories > System Tools > Files and Settings Transfer Wizard.
1.3 Backing Up and Restoring Files
1.3.1 Creating a Backup File—Windows XP Professional
1. Click Start > All Programs > Accessories > System Tools > Backup.
2. Use the Backup or Restore Wizard to create a backup file or tape.
A backup file can be saved to a hard disk, a floppy disk, CD, USB flash media device, tape drive,
or to any other removable or nonremovable media.
1.3.2 Restoring from the Backup File—Windows XP Professional
1. Click Start > All Programs > Accessories > System Tools > Backup.
2. Use the Backup or Restore Wizard to restore files from a backup file.
A backup file can be on a hard disk, a floppy disk, CD, USB flash media device, tape drive, or
any other removable or nonremovable media.
2. Type convert drive_letter: /fs:ntfs (where drive_letter is the volume to be converted) and
press
.
1.5 HP Software
The Microsoft Windows XP Professional operating system is preinstalled on the computer and
will be configured automatically the first time the computer is turned on. The following HP
software may also be installed at that time on selected models:
■ Computer Setup Utilities
■ HP Support Software including device drivers
■ Configuration Record
■ Online Safety & Comfort Guide
Power Management with energy saver features
Security Management tools
Page 11
■ Software Support Management tools
Certain drivers and utilities are available only in selected languages. You can obtain the latest
version of these files, in English and selected other languages, in one of three ways:
■ Support Software CD
■ HP Web site at
■ Restore Plus! CD, which is supplied with many HP models
Additional HP software may be required in certain situations.
Page 12
Installing the Operating System
1–4376226-001Service Reference Guide, dx2100 ST
Page 13
Setup Utilities and Diagnostics Features
Setup Utilities (F10) and diagnostic features provide information needed about the computer
system when contacting Customer Support. These tools can also be used to:
Change factory default settings and to set or change the system configuration, which may be
necessary when you add or remove hardware.
Determine if all of the devices installed on the computer are recognized by the system and
functioning properly.
Determine information about the operating environment of the computer.
Solve system configuration errors detected but not automatically fixed during the Power-On
Self-Test (POST).
Establish and manage passwords and other security features.
Establish and manage energy-saving timeouts.
All features identified in this chapter may not be available on all HP products.
2
2.1 Power-On Self-Test (POST)
POST is a series of diagnostic tests that runs automatically when the system is turned on. POST
checks the following items to ensure that the computer system is functioning properly:
Keyboard
Memory modules
All mass storage devices
Processors
Controllers
If the Power-On Password is set, a key icon appears on the screen while POST is running. You
will need to enter the password before continuing. Refer to Chapter 3, Section
on setting, deleting, or bypassing the password.
If POST finds an error in the system, an audible and/or visual message occurs. For POST error
messages and their solutions refer to Appendix C, “POST Error Messages.”
3.1for information
Service Reference Guide, dx2100 ST376226-0012–1
Page 14
Setup Utilities and Diagnostics Features
Computer Setup Utilities
Use Computer Setup Utilities (F10) to:
Change factory default settings.
Set the system date and time.
Set, view, change, or verify the system configuration, including settings for processor,
graphics, memory, audio, storage, communications, and input devices.
Modify the boot order of bootable devices such as hard drives, diskette drives, optical drives,
or USB flash media devices.
Enable Quick Boot, which is faster than Full Boot but does not run all of the diagnostic tests
run during a Full Boot. You can set the system to:
❏ always Quick Boot (default);
periodically Full Boot (from every 1 to 30 days); or
always Full Boot.
Select Post Messages Enabled or Disabled to change the display status of Power-On
Self-Test (POST) messages. Post Messages Disabled suppresses most POST messages, such
as memory count, product name, and other non-error text messages. If a POST error occurs,
the error is displayed regardless of the mode selected. To manually switch to Post Messages
Enabled during POST, press any key (except
F1 through F12).
Establish an Ownership Tag, the text of which is displayed each time the system is turned on
or restarted.
Enter the Asset Tag or property identification number assigned by the company to this
computer.
Enable the power-on password prompt during system restarts (warm boots) as well as during
power-on.
Establish a setup password that controls access to Computer Setup (F10) Utility and the
settings described in this section.
To secure integrated I/O functionality, including the serial, USB, or parallel ports, audio, or
embedded NIC, so that they cannot be used until they are unsecured.
Enable or disable removable media boot ability.
Enable or disable legacy diskette write ability (when supported by hardware).
Solve system configuration errors detected but not automatically fixed during the Power-On
Self-Test (POST).
Replicate the system setup by saving system configuration information on diskette and
restoring it on one or more computers.
Execute self-tests on a specified ATA hard drive (when supported by drive).
Enable or disable DriveLock security (when supported by MultiBay drive).
Page 15
2.2.1 Using Computer Setup (F10) Utilities
Computer Setup can be accessed only by turning on the computer or restarting the system. To
access the Computer Setup Utilities menu, complete the following steps:
1. Turn on or restart the computer. If you are in Windows, click Start >Shut Down >Restart.
2. As soon as the computer is turned on, press and hold the key until you enter Computer
Setup. Press
If you do not press the key at the appropriate time, you must restart the computer and press
and hold the
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
3. Select your language from the list and press .
4. A choice of five headings appears in the Computer Setup Utilities menu: File, Storage,
Security, Power, and Advanced.
5. Use the arrow (left and right) keys to select the appropriate heading. Use the arrow (up and
down) keys to select the option you want, then press
Utilities menu, press
6. To apply and save changes, select File > Save Changes and Exit.
If you have made changes that you do not want applied, select Ignore ChangesandExit.
to bypass the title screen, if necessary.
key again to access the utility.
.
. To return to the Computer Setup
To reset to factory settings, select Set DefaultsandExit. This option will restore the
original factory system defaults.
Do NOT turn the computer power OFF while the ROM is saving your F10 Computer Setup
changes because the CMOS could become corrupted. It is safe to turn off all power to the computer after
you exit the F10 Setup screen.
Page 16
Computer Setup Menu
.
HeadingOptionDescription
System InformationLists:
•Product name
• Processor type/speed/stepping
•Cache size (L1/L2)
• Installed memory size/speed, number of channels (single or
dual) (if applicable)
• Integrated MAC address for embedded, enabled NIC (if
applicable)
• System ROM (includes family name and version)
• Chassis serial number
• Asset tracking number
AboutDisplays copyright information.
Set Time and DateAllows you to set system time and date.
Replicated SetupSave to Removable Media
1.44-MB diskette, a USB flash media device, or a diskette-like
device (a storage device set to emulate a diskette drive).
✎
Restores system configuration from a diskette, a USB flash media
device, or a diskette-like device.
Default SetupSave Current Settings as Default
Restore Factory Settings as Default
Page 17
Setup Utilities and Diagnostics Features
When a device is selected, detailed information and options are
displayed. The following options may be presented.
Diskette Type
Options are 3.5" 1.44 MB, and 5.25" 1.2 MB.
Drive Emulation
Allows you to select a drive emulation type for a certain storage
device. (For example, a Zip drive can be made bootable by
selecting diskette emulation.)
ATAPI Zip driveNone (treated as Other)
Diskette (treated as diskette drive)
ATA Hard diskNone (treated as Other)
Hard disk (treated as hard drive)
Legacy disketteNo emulation options available
CD-ROM driveNo emulation options available
ATAPI LS-120None (treated as Other).
Diskette (treated as diskette drive).
Default Values IDE/SATA
Multisector Transfers (ATA disks only)
operation. Options (subject to device capabilities) are Disabled, 8,
and 16.
(ATA devices only)
(ATA disks only)
of older versions of UNIX
(e.g., SCO UNIX version 3.2). Options are Automatic, Bit-Shift,
LBA Assisted, User, and None
Ä
automatically by the BIOS should not be changed. If the selected
translation mode is not compatible with the translation mode that
was active when the disk was partitioned and formatted, the data
on the disk will be inaccessible.
Support for specific Computer Setup options may vary depending on the hardware configuration.
2–5
Page 18
Storage
(continued)
Translation Parameters
(continued)
Removable Media Boot
Legacy Diskette Write
After saving changes to Removable Media Write, the computer
will restart. Turn the computer off, then on, manually.
Allows you to control how BIOS device I/O requests are serviced.
When “Enable” is selected, the BIOS will service ATA device read
and write requests with DMA data transfers. When “Disable” is
selected, the BIOS will service ATA device read and write requests
with PIO data transfers.
Allows you to choose how the SATA controller and devices are
accessed by the operating system.
“Separate IDE Controller
” is the default option. Up to 4 SATA and 2
PATA devices may be accessed in this mode. The SATA and PATA
controllers appear as two separate IDE controllers. Use this option
with Microsoft Windows 2000 and Windows XP.
• SATA 0 is seen as SATA Primary Device 0
• SATA 1 (if present) is seen as SATA Secondary Device 0
“Combined IDE Controller
” is the other option. Up to 2 PATA and 2
SATA devices may be accessed in this mode. The SATA and PATA
controllers appear as one combined IDE controller. Use this option
with Microsoft Windows 98 and earlier operating systems.
• PATA Primary Device 0 replaces SATA 1
• PATA Primary Device 1 replaces SATA 3
Allows you to enable or disable the primary IDE controller. This
feature is supported on some models.
Allows you to enable or disable the Primary SATA controller.
Support for specific Computer Setup options may vary depending on the hardware configuration.
Page 19
Storage Storage Options
DPS Self-TestAllows you to execute self-tests on ATA hard drives capable of
Boot OrderAllows you to:
Allows you to enable or disable the Secondary SATA controller. This
feature is supported on some models.
performing the Drive Protection System (DPS) self-tests.
This selection will only appear when at least one drive capable of
performing the DPS self-tests is attached to the system.
• Specify the order in which attached devices (such as a USB
flash media device, diskette drive, hard drive, optical drive, or
network interface card) are checked for a bootable operating
system image. Each device on the list may be individually
excluded from or included for consideration as a bootable
operating system source.
• Specify the order of attached hard drives. The first hard drive in
the order will have priority in the boot sequence and will be
recognized as drive C (if any devices are attached).
MS-DOS drive lettering assignments may not apply after a
non-MS-DOS operating system has started.
Shortcut to Temporarily Override Boot Order
To boot one time from a device other than the default device
specified in Boot Order, restart the computer and press F9
Enter
Troubleshooting GuideDocumentation CD
Troubleshooting Guide
CTRL+ALT+DEL
Desktop Management Guide
Page 20
Setup Utilities and Diagnostics Features
(continued)
Notify User
Setup Password
Desktop
Management GuideDocumentation CD
Desktop
Management GuideDocumentation CD
Enables/disables the computer’s ability to boot from an operating
system installed on a network server. (Feature available on NIC
models only; the network controller must reside on the PCI bus or be
embedded on the system board.)
System IDsAllows you to set:
• Asset tag (18-byte identifier) and ownership Tag (80-byte
identifier displayed during POST).
See the on the
for more information.
• Chassis serial number or Universal Unique Identifier (UUID)
number. The UUID can only be updated if the current chassis
serial number is invalid. (These ID numbers are normally set in
the factory and are used to uniquely identify the system.)
• Keyboard locale setting (for example, English or German) for
System ID entry.
Support for specific Computer Setup options may vary depending on the hardware configuration.
2–8376226-001Service Reference Guide, dx2100 ST
Page 21
Setup Utilities and Diagnostics Features
Security
DriveLock SecurityAllows you to assign or modify a master or user password for
(continued)
Data Execution
Prevention
PowerOS Power
Management
MultiBay hard drives. When this feature is enabled, the user is
prompted to provide one of the DriveLock passwords during POST. If
neither is successfully entered, the hard drive will remain
inaccessible until one of the passwords is successfully provided
during a subsequent cold-boot sequence.
This selection will only appear when at least one MultiBay drive
that supports the DriveLock feature is attached to the system.
See the Desktop Management Guide on the Documentation CD for
more information.
Enable/Disable.
Data Execution Prevention Mode help prevent OS security breaches.
This selection is in effect only if the processor and operating
system being used comprehend and utilize the function.
• Runtime Power Management - Enable/Disable. Allows certain
operating systems to reduce processor voltage and frequency
when the current software load does not require the full
capabilities of the processor.
• Idle Power Savings - Extended/Normal. Allows certain
operating systems to decrease the processors power
consumption when the processor is idle.
• ACPI S3 Support - Enables or disables ACPI S3 support.
• ACPI S3 Hard Disk Reset - Enabling this causes the BIOS to
ensure hard disks are ready to accept commands after
resuming from S3 before returning control to the operating
system.
• ACPI S3 PS2 Mouse Wakeup - Enables or disables waking from
S3 due to PS2 mouse activity.
Hardware Power
Management
SATA power management enables or disables SATA bus and/or
device power management.
ThermalFan idle mode - This bar graph controls the minimum permitted fan
speed.
Support for specific Computer Setup options may vary depending on the hardware configuration.
2–9
Page 22
HeadingOptionDescription
Advanced*
*For
advanced
users only
Power-On OptionsAllows you to set:
• POST mode (QuickBoot, FullBoot, or FullBoot every 1-30 days).
• POST messages (enable/disable).
• prompt (enable/disable). Enabling this feature will display
the text F9=Boot Menu during POST. Disabling this feature
prevents the text from being displayed but pressing F9 will still
access the Shortcut Boot (Order) Menu screen. See Storage >
Boot Order
F10
F10=Setup
F10
F12
F12=Network Service Boot
F12
ON
power strip, you will not be able to use the suspend/sleep feature
or the Remote Management features.
• POST Delay (in seconds) (5, 10, 15, or 20 seconds). Enabling
this feature will add a user-specified delay to the POST process.
This delay is sometimes needed for hard disks on some PCI
cards that spin up very slowly; so slowly that they are not ready
to boot by the time POST is finished. The POST delay also gives
you more time to press F10 to enter Computer (F10) Setup.
• I/O APIC Mode (enable/disable). Enabling this feature will
allow Microsoft Windows Operating Systems to run optimally.
This feature must be disabled for certain non-Microsoft
Operating Systems to work properly.
Support for specific Computer Setup options may vary depending on the hardware configuration.
Page 23
Advanced*
*For
advanced
users only
Power-On Options Allows you to set: (continued)
• ACPI/USB Buffers @ Top of Memory (enable/disable).
Enabling this feature places USB memory buffers at the top
of memory. The advantage is that some amount of memory
below 1 MB is freed up for use by option ROMs. The
disadvantage is that a popular memory manager, HIMEM.SYS,
does not work properly when USB buffers are at top of memory
AND the system has 64 MB or less of RAM.
• Hyper-threading (enable/disable).
• Limit CPUID Maximum Value to 3 - Restricts the number of
CPUID functions reported by the microprocessor. Enable this
feature if booting to WinNT.
BIOS Power-OnAllows you to set the computer to turn on automatically at a time you
specify.
Onboard DevicesAllows you to set resources for or disable onboard system devices
(diskette controller, serial port, or parallel port).
PCI Devices• Lists currently installed PCI devices and their IRQ settings.
• Allows you to reconfigure IRQ settings for these devices or to
disable them entirely. These settings have no effect under an
APIC-based operating system.
Bus Options*On some models, allows you to enable or disable:
• PCI SERR# Generation.
• PCI VGA palette snooping, which sets the VGA palette
snooping bit in PCI configuration space; only needed when
more than one graphics controller is installed.
Support for specific Computer Setup options may vary depending on the hardware configuration.
• To disable Wake on LAN during the off state (S5), use the arrow
(left and right) keys to select the Advanced > Device Options
menu and set the S5 Wake on Lan feature to “Disable.” This
obtains the lowest power consumption available on the computer
during S5. It does not affect the ability of the computer to Wake on
LAN from suspend or hibernation, but will prevent it from waking
from S5 via the network. It does not affect operation of the network
connection while the computer is on.
• If a network connection is not required, completely disable the
network controller (NIC) by using the arrow (left and right) keys to
select the SecurityDevice Security
Integrated Video. When PCI Express video is on, Integrated
Video must remain disabled.
• Monitor Tracking (enable/disable). Allows ROM to save
monitor asset information.
• NIC PXE Option ROM Download (enable/disable). The BIOS
contains an embedded NIC option ROM to allow the unit to
boot through the network to a PXE server. This is typically used
to download a corporate image to a hard drive. The NIC
option ROM takes up memory space below 1MB commonly
referred to as DOS Compatibility Hole (DCH) space. This space
is limited. This F10 option will allow users to disable the
downloading of this embedded NIC option ROM thus giving
more DCH space for additional PCI cards which may need
option ROM space. The default will be to have the NIC option
ROM enabled.
PCI VGA
Configuration
Displayed only if there are multiple PCI video adapters in the
system. Allows you to specify which VGA controller will be the
“boot” or primary VGA controller.
Support for specific Computer Setup options may vary depending on the hardware configuration.
Page 25
2.3 Diagnostics for Windows
The Diagnostics for Windows (DFW) utility is a component of HP Client Management Solutions
that allows you to view information about the hardware and software configuration of the
computer while running Microsoft Windows (Microsoft Windows 2000 and Microsoft Windows
XP). It also allows you to perform hardware and software tests on the subsystems of the
computer.
When you invoke Diagnostics for Windows, the current configuration of the computer is shown
on the Overview screen. There is access from this screen to several categories of information
about the computer and the Te st tab. The information in every screen of the utility can be saved
to a file or printed.
To test all subsystems, you must log in as the administrator. If you do not log in as the
administrator, you will be unable to test some subsystems. The inability to test a subsystem will
be indicated by an error message under the subsystem name in the Test window or by shaded
check boxes that cannot be selected.
Use Diagnostics for Windows in to determine if all the devices installed on the computer are
recognized by the system and functioning properly. Running tests is optional but recommended
after installing or connecting a new device.
Third party devices not supported by HP may not be detected by Diagnostics for Windows. Save,
print, or display the information generated by the utility.
Page 26
2.3.1 Detecting Diagnostics for Windows
Some computers ship with the Diagnostics for Windows preloaded, but not preinstalled.
To determine whether Diagnostics for Windows is installed:
1. Access the location of the Diagnostics icons in Windows XP Home or Windows XP
Professional. Select Start > Control Panel > Performance and Maintenance.
2. If icons for Configuration Record and Diagnostics for Windows are present, the Diagnostics
for Windows utility is installed. If the icons are not present, the utility is either not preloaded
or not installed.
2.3.2 Installing Diagnostics for Windows
If Diagnostics for Windows is not preloaded, you can download the Diagnostics for Windows
SoftPaq from the following Web site:
Once the software has been downloaded onto the hard drive it may be installed by performing
these steps:
1. Close all Windows applications.
2. Install the Diagnostics for Windows utility:
In Windows XP, select Start > Software Setup icon. Select Diagnostics for Windows > Next button, then follow the instructions on the screen.
If the Setup Software/Software Setup icon is not on the Desktop or in the Start menu,
run the Setup program from the C:\CPQAPPS\DIAGS directory or select Start > Run
and type the following in the command line: C:\CPQAPPS\DIAGS\SETUP.
3. Click Next to install Diagnostics for Windows.
4. After the program has finished installing, you may be prompted to restart the computer, or it
may automatically restart. If prompted, click Finish to restart the computer or Cancel to exit
the program. You must restart the computer to complete the installation of Diagnostics for
Windows.
If you want to upgrade an existing version of Diagnostics for Windows installed on the computer,
visit
software and download the latest version. Execute the downloaded file and select Repair to
update the installed version. This will cause the new version to overwrite the old version.
and click on an applicable product. Locate the desired
Page 27
To use categories:
1. Click Start > HP Information Center >Diagnostics for Windows. You can also select the Diagnostics for Windows icon, located in the Control Panel.
The screen displays the overview of the computer hardware and software.
In Windows XP Home and Windows XP Professional, select Start > Control Panel > Performance and Maintenance, then select Diagnostics for Windows.
2. For specific hardware and software information, select a category from the Categories
pull-down menu or the appropriate icon on the toolbar.
As the cursor moves over the toolbar icons, the corresponding category name is displayed.
3. To display more detailed information in a selected category, click More in the Information Level box in the lower left corner of the window or click Level at the top of the screen and
select More.
4. Review, print, and/or save this information as desired.
To print the information, click File > Print. Select one of the following options:
Detailed Report (All Categories), Summary Report (All Categories), or Current
Category. Click OK to print the report you selected.
To save the information, click File > Save As. Select one of the following options:
Detailed Report (All Categories), Summary Report (All Categories), or Current
Category. Click OK to save the report you selected.
5. To exit Diagnostics for Windows, click File, and then click Exit.
Menu Bar—File, Categories, Navigation, Level, Tab, Help
At the top of the Diagnostics for Windows screen is the Menu Bar consisting of six pull-down
menus. Selecting an item will provide the following information on the system:
File—Save As, Print, Printer Setup, Exit
Categories
System—System board, ROM, date, and time
Asset Control—Asset tag, system serial number, and processor
Input Devices—Keyboard, mouse, and joystick(s)
Communication—Ports
Storage—Storage drives
Graphics—Graphics
Memory—System board and Windows memory
Multimedia—Optical storage (CD, DVD, and so on) and audio
Windows—Windows
Architecture—PCI Device
Page 28
Resources—IRQ, I/O, and Memory Map
Health—Status of system temperature and hard drives
Miscellaneous—CMOS, DMI, BIOS, System, Product Name, and Serial Number
Navigation—Previous Category (F5), Next Category (F6)
Level—Less (F7), More (F8) <information on the screen>
Tab
Overview—Displays general information about the computer. This window is displayed
when first starting the utility. The left side of the window shows hardware information,
while the right side shows software information.
Test—Allows you to choose various parts of the system to test. You can also choose the
type of test and testing
Status—Displays the status of each test in progress. You can cancel testing by clicking
the Cancel Testing button.
Log—Displays a log of tests for each device.
Error—Displays any errors that occurred during device testing. The window lists the
device being tested, the type and number of errors, and the error code.
Help—Contents, How to use Help, About
mode.
2.3.4 Running Diagnostic Tests in Diagnostics for Windows
To run diagnostic tests:
1. Click Start > HP Information Center > Diagnostics for Windows.
Alternately, you can access Diagnostics for Windows via the control panel.
The screen displays the overview of the computer hardware and software. Five tabs are
displayed below the row of icons: Overview, Te st , Status, Log, and Error.
2. Click the Te st tab, or click Tab at the top of the screen and select Te st .
3. Select one of the following options:
Quick Test—Runs a quick, general test on each device. Requires no user intervention if
Unattended Mode is selected.
Complete Test—Runs maximum testing of each device. The user can select Interactive
Mode or Unattended Mode.
Custom Test—Runs only the tests you select. To select specific devices or tests, find the
device in the list, then select the check box beside each test. When selected, a red check
mark is displayed in the box. Some tests selected may require user intervention.
To test all subsystems, you must log in as the administrator. If you do not log in as the
administrator, you will be unable to test some subsystems. The inability to test a subsystem will
be indicated by an error message under the subsystem name in the Test window or by shaded
boxes that cannot be checked.
Page 29
4. Select Interactive Mode or Unattended Mode. In Interactive Mode, the diagnostic software
will prompt you for input during tests that require it. Some tests require interaction and will
display errors or halt testing if selected in conjunction with Unattended Mode.
Interactive Mode provides maximum control over the testing process. You determine
whether the test passed or failed and may be prompted to insert or remove devices.
Unattended Mode does not display prompts. If errors are found, they are displayed when
testing is complete.
5. Click the Begin Testing button at the bottom of the window. Test Status is displayed,
showing the progress and result of each test. For more details on the tests run, click the Log
tab or click Tab at the top of the screen and select Log.
6. To view a test report, select one of three tabs:
Status—Summarizes the tests run, passed, and failed during the current testing session.
Log—Lists tests run on the system, the numbers of times each test has run, the number
of errors found on each test, and the total run time of each test.
Error—Lists all errors found on the computer with their error codes.
7. To save a test report:
Select the Log tab Save button to save a Log tab report.
Select the Error tab Save button to save an Error tab report.
8. To print a test report:
If the report is on the Log tab, select File > Save As, then print the file from the selected
folder.
If the report is on the Error tab, select the Error tab Print button.
9. If errors are found, click the Error tab to display more detailed information and
recommended actions.
10. Click Print or save the error information for future reference.
11. To exit Diagnostics for Windows, click File > Exit.
2.4 Configuration Record
The Configuration Record utility is a windows-based information-gathering tool that gathers
critical hardware and software information from various computer subsystems. The information
includes such things as the ROM, asset tag, processor, physical drives, PCI devices, memory,
graphics, operating system version number, operating system parameters, and the operating
system startup files to give a complete view of the computer. Configuration Record provides a
means for automatically identifying and comparing configuration changes, and has the ability to
maintain a configuration history. The information can be saved as a history of multiple sessions.
This utility allows the resolution of problems without taking the computer offline and assists in
maximizing the computer availability. The information obtained by the utility is useful in
troubleshooting system problems, and streamlines the service process by enabling quick and easy
identification of system configurations.
The utility displays it findings in a Now.log file. If the original Base.log file is present in the cpqdiags directory, the Base.log file is displayed next to the Now.log file in a split window with
the differences between the two highlighted in the color red.
Page 30
The Configuration Record is part of Diagnostics for Windows and is automatically installed at
the same time as Diagnostics for Windows.
To run this program:
1. Click Start > HP Information Center > Configuration Record.
Alternately, you can access Diagnostics for Windows via the control panel.
The Configuration Record utility has two view options: Show Changed Items Only and Show All. The default view is Show
color red since it shows only the differences. Switching to Show All displays the complete,
comprehensive view of the system.
2. The default view is Show Changed Items Only. To view all the information gathered by
Configuration Record, click View at the top of the window and select Show All, or click the
Show All Items icon.
3. To save the information in the left or right window, select File > Save Window File and then
select Left Window File or Right Window File.
Saving the configuration of the computer periodically allows the user to keep a history of the
configuration. This history may be useful to you in the future if the system ever encounters a
problem that needs debugging.
Changed Items Only, therefore all the text is displayed in the
4. To exit Configuration Record, click File, then click Exit.
Page 31
Desktop Management
HP Client Management Solutions provides standards-based solutions for managing and
controlling desktops, workstations, and notebook PCs in a networked environment.
The key capabilities and features of desktop management are:
Initial configuration and deployment
Remote system installation
Software updating and management
ROM flash
Asset tracking and security
Fault notification and recovery
Support for specific features described in this guide may vary by model or software version.
3
3.1 Initial Configuration and Deployment
HP computers come with a preinstalled system software image. After a brief software
“unbundling” process, the computer is ready to be used.
A customized software image may be deployed by:
Installing additional software applications after unbundling the preinstalled software image.
Using software deployment tools, such as Altiris Deployment Solution, to replace the
preinstalled software with a customized software image.
Using a disk cloning process to copy the contents from one hard drive to another.
The best deployment method depends on your information technology environment and
processes. The PC Deployment section of the Solutions and Services Web site
provides information to help
you select the best deployment method.
The Restore Plus! CD, ROM-based setup, and ACPI hardware provide further assistance with
recovery of system software, configuration management and troubleshooting, and power
management.
Page 32
Desktop Management
Remote System Installation allows you to start and set up your system using the software and
configuration information located on a network server by initiating the Preboot Execution
Environment (PXE). The Remote System Installation feature is usually used as a system setup
and configuration tool, and can be used for the following tasks:
Formatting a hard drive.
Deploying a software image on one or more new PCs.
Remotely updating the system BIOS in flash ROM. See Section 3.3.9, “Remote ROM
Flash.”
Configuring the system BIOS settings.
To initiate Remote System Installation, press when the F12 = Network Service Boot
message appears in the lower-right corner of the HP logo screen. Follow the instructions on the
screen to continue the process. The default boot order is a BIOS configuration setting that can be
changed to always attempt to PXE boot.
HP and Altiris have partnered to provide tools designed to make the task of corporate PC
deployment and management easier and less time-consuming, ultimately lowering the total cost
of ownership and making HP PCs the most manageable client PCs in the enterprise environment.
Software Updating and Management
HP provides several tools for managing and updating software on desktops and workstations:
HP System Software Manager
HP Client Manager
HP Client Management Solutions using Altiris
HP Local Recovery
Dantz Backup and Recovery
HP Proactive Change Notification
HP Subscriber's Choice.
HP System Software Manager
HP System Software Manager (SSM) is a utility that lets you update system-level software on
multiple systems simultaneously. When executed on a PC client system, SSM detects both
hardware and software versions, then updates the appropriate software from a central repository,
also known as a file store. Driver versions that are supported by SSM are denoted with a special
icon on the driver download Web site and on the Support Software CD. To download the utility
or to obtain more information on SSM, visit
.
Page 33
3.3.2 HP Client Manager
HP Client Manager, developed with Altiris, is available free for all supported HP business
desktop, notebook, and workstation models. SSM is integrated into HP Client Manager, and
enables central tracking, monitoring, and management of the hardware aspects of HP client
systems.
Use HP Client Manager to:
Get valuable hardware information such as CPU, memory, video, and security settings
Monitor system health to fix problems before they occur
Automatically collect and remotely distribute SoftPaqs that will update the hardware's BIOS,
drivers, and security settings
Remotely configure BIOS and security settings
Automate processes to quickly resolve hardware problems
HP Client Manager uses the same Altiris infrastructure as the other Altiris client lifecycle
management solutions. This design provides a significant benefit for the IT staff, since only one
infrastructure needs to be setup and maintained. Since information is stored in one database, you
get complete and consistent inventory reports as well as system health and security information.
You use a single, consistent console interface for scheduling and tracking progress of both
hardware and software management tasks for your client systems.
For more information on HP Client Manager, visit
http://h18000.www1.hp.com/im/client_mgr.html.
3.3.3 HP Client Management Solutions using Altiris
Additional Altiris client management solutions can be purchased through HP that complement
the hardware management capabilities of HP Client Manager. These Altiris solutions address
client IT lifecycle challenges including:
Inventory assessment
Software license compliance
Personality migration
Software image deployment
Software distribution
Asset management
Client backup and recovery
Problem resolution
For more information on HP Client Management Solutions using Altiris, visit
.
3.3.4 HP Local Recovery
Local Recovery provides data and system file protection for HP business desktops, notebooks,
and workstations. With Local Recovery, you can quickly recover and get back to work when
information is accidentally deleted or your operating system is corrupted. Designed for
disconnected or seldom-connected users, Local Recovery protects your HP computer's data and
system state through scheduled snapshots stored in a protected area on the local hard disk. You
Page 34
can initiate a backup or restore by simply clicking your mouse or pressing the F11 key in a
pre-boot environment. System backup and disaster recovery is now easy for all users regardless
of connectivity.
For more information on HP Local Recovery, visit .
3.3.5 Dantz Retrospect Express
Dantz Retrospect Express protects a single Windows desktop or notebook computer. Retrospect
Express allows recovery from data loss due to viruses, newly installed software, user error,
damaged hardware, hardware upgrades, hackers, and lost or stolen computers. It offers a choice
between simple duplicates or comprehensive backups and an intuitive setup wizard to get you up
and running in minutes. Retrospect Express comes with Disaster Recovery built into the product
for the best protection available.
For more information on Dantz Retrospect Express, visit
3.3.6 Proactive Change Notification (PCN)
The Proactive Change Notification program uses the Subscriber's Choice Web site in order to
proactively and automatically:
Send you Proactive Change Notification (PCN) e-mails informing you of hardware and
software changes to most commercial computers and servers, up to 60 days in advance.
.
Send you e-mail containing Customer Bulletins, Customer Advisories, Customer Notes,
Security Bulletins, and Driver alerts for most commercial computers and servers.
You create your own profile to ensure that you only receive the information relevant to a specific
IT environment. To learn more about the Proactive Change Notification program and create a
custom profile, visit
Subscriber’s Choice is a client-based service from HP. Based on your profile, HP will supply
you with personalized product tips, feature articles, and/or driver and support
alerts/notifications. Subscriber’s Choice Driver and Support Alerts/Notifications will deliver
e-mails notifying you that the information you subscribed to in your profile is available for
review and retrieval. To learn more about Subscriber’s Choice and create a custom profile, visit
.
Page 35
3.3.8 ROM Flash
The computer comes with a reprogrammable flash ROM (read only memory). By establishing a
setup password in Computer Setup (F10) Utility, you can protect the ROM from being
unintentionally updated or overwritten. This is important to ensure the operating integrity of the
computer. Should you need or want to upgrade your ROM, you may:
Order an upgraded ROMPaq™ diskette from HP.
Download the latest ROMPaq images the HP driver and support page,
3.3.9 Remote ROM Flash
Remote ROM Flash allows the system administrator to safely upgrade the ROM on remote HP
computers directly from the centralized network management console. Enabling the system
administrator to perform this task remotely, on multiple computers and personal computers,
results in a consistent deployment of and greater control over HP PC ROM images over the
network. It also results in greater productivity and lower total cost of ownership.
.
The computer must be powered on, or turned on through Remote Wakeup, to take advantage of
Remote ROM Flash.
For more information on Remote ROM Flash, refer to the HP Client Manager Software or
System Software Manager at .
3.3.10 HPQFlash
The HPQFlash utility is used to locally update or restore the system ROM on individual PCs
through a Windows operating system.
For more information on HPQFlash, visit and enter the name
of the computer when prompted.
3.3.11 FailSafe Boot Block ROM
The FailSafe Boot Block ROM allows for system recovery in the unlikely event of a ROM flash
failure, for example, if a power failure were to occur during a ROM upgrade. The Boot Block is
a flash-protected section of the ROM that checks for a valid system ROM flash when power to
the system is turned on.
If the system ROM is valid, the system starts normally.
If the system ROM fails the validation check, the FailSafe Boot Block ROM provides
enough support to start the system from a ROMPaq diskette, which will program the system
ROM with a valid image.
Some models also support recovery from a ROMPaq CD. ISO ROMPaq images are included
with selected models in the downloadable ROM softpaqs.
Page 36
When the boot block detects an invalid system ROM, the System Power LED blinks RED 8
times, one every second, followed by a 2-second pause. Also 8 simultaneous beeps will be heard.
A Boot Block recovery mode message is displayed on the screen (some models).
To recover the system after it enters Boot Block recovery mode, complete the following steps:
1. If there is a diskette in the diskette drive or a CD in the CD drive, remove the diskette and CD
and turn off the power.
2. Insert a ROMPaq diskette into the diskette drive or, if permitted on this computer, a ROMPaq
CD into the CD drive.
3. Turn on the computer.
If no ROMPaq diskette or ROMPaq CD is found, you will be prompted to insert one and
restart the computer.
If a setup password has been established, the Caps Lock light will turn on and you will be
prompted to enter the password.
4. Enter the setup password.
If the system successfully starts from the diskette and successfully reprograms the ROM,
then the three keyboard lights will turn on. A rising tone series of beeps also signals
successful completion.
5. Remove the diskette or CD and turn the power off.
6. Turn the power on again to restart the computer.
The following table lists the various keyboard light combinations used by the Boot Block ROM
(when a PS/2 keyboard is attached to the computer), and explains the meaning and action
associated with each combination.
Keyboard Light Combinations Used by Boot Block ROM
Failsafe Boot
Block Mode
Num, Caps,
Scroll Lock
Diagnostic lights do not flash on USB keyboards.
Keyboard
LED Color
GreenOnBoot Block ROM Flash successful. Turn
Keyboard
LED ActivityState/Message
Keyboard locked in network mode.
one-at-a-time—
N, C, SL
power off, then on to reboot.
Page 37
3.3.12 Replicating the Setup
The following procedures give an administrator the ability to easily copy one setup configuration
to other computers of the same model. This allows for faster, more consistent configuration of
multiple computers.
Both procedures require a diskette drive or a supported USB flash media device, such as an HP
Drive Key.
Copying to Single Computer
CAUTION:
computers are not the same model. For example, do not copy the setup configuration from a dc7100
Ultra-Slim Desktop to a dx6100 Slim Tower.
1. Select a setup configuration to copy. Turn off the computer. If you are in Windows, click
> Shut Down > Shut Down.
Start
2. If you are using a USB flash media device, insert it now.
3. Turn on the computer.
4. As soon as the computer is turned on, press and hold the key until you enter Computer
Setup. Press
to bypass the title screen, if necessary.
If you do not press the key at the appropriate time, you must restart the computer and press
and hold the
key again to access the utility.
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
5. If you are using a a diskette, insert it now.
6. Select File> Replicated Setup > Save to Removable Media. Follow the instructions on the
screen to create the configuration diskette or USB flash media device.
7. Turn off the computer to be configured and insert the configuration diskette or USB flash
media device.
8. Turn on the computer to be configured.
9. As soon as the computer is turned on, press and hold the key until you enter Computer
Setup. Press
to bypass the title screen, if necessary.
10. Select File> Replicated Setup > Restore from Removable Media, and follow the
instructions on the screen.
11. Restart the computer when the configuration is complete.
This method takes a little longer to prepare the configuration diskette or USB flash media device,
but copying the configuration to target computers is significantly faster.
Page 38
A bootable diskette is required for this procedure or to create a bootable USB flash media device.
If Windows XP is not available to use to create a bootable diskette, use the method for copying to
a single computer instead (see “Copying to Single Computer” on page 7).
1. Create a bootable diskette or USB flash media device. See “Supported USB Flash Media
Device” on page 8 or “Unsupported USB Flash Media Device” on page 10.
2. Select a setup configuration to copy. Turn off the computer. If you are in Windows, click
> Shut Down > Shut Down.
Start
3. If you are using a USB flash media device, insert it now.
4. Turn on the computer.
5. As soon as the computer is turned on, press and hold the key until you enter Computer
Setup. Press
to bypass the title screen, if necessary.
If you do not press the key at the appropriate time, you must restart the computer and press
and hold the
key again to access the utility.
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
6. If you are using a a diskette, insert it now.
7. Select File > Replicated Setup > Save to Removable Media. Follow the instructions on the
screen to create the configuration diskette or USB flash media device.
8. Download a BIOS utility for replicating setup (repset.exe) and copy it onto the configuration
diskette or USB flash media device. To obtain this utility, go to
and enter the model number of the computer.
9. On the configuration diskette or USB flash media device, create an autoexec.bat file
containing the following command:
repset.exe
10. Turn off the computer to be configured. Insert the configuration diskette or USB flash media
device and turn the computer on. The configuration utility will run automatically.
11. Restart the computer when the configuration is complete.
Creating a Bootable Device
Supported USB Flash Media Device
Supported devices, such as an HP Drive Key or a DiskOnKey, have a preinstalled image to
simplify the process of making them bootable. If the USB flash media device being used does not
have this image, use the procedure later in this section (see “Unsupported USB Flash Media
Device” on page 10).
CAUTION:
Page 39
To create a bootable USB flash media device, you must have:
a PC that is bootable from a flash media device
a supported USB flash media device
A bootable DOS diskette with the FDISK and SYS programs. If SYS is not available,
FORMAT may be used, but all existing files on the USB flash media device will be lost.
1. Turn off the computer.
2. Insert the USB flash media device into one of the computer's USB ports and remove all other
USB storage devices except USB diskette drives.
3. Insert a bootable DOS diskette with FDISK.COM and either SYS.COM or FORMAT.COM
into a diskette drive and turn on the computer to boot to the DOS diskette.
4. Run FDISK from the A:\ prompt by typing FDISK and pressing Enter. If prompted, click Yes
(Y) to enable large disk support.
5. Enter Choice [ ] to display the drives in the system. The USB flash media device will be the
drive that closely matches the size of one of the drives listed. It will usually be the last drive
in the list. Note the letter of the drive.
USB flash media device drive: __________
and proceed from step 4. If none are found, either the system does not support the USB flash media
device or the USB flash media device is defective. DO NOT proceed in attempting to make the USB flash
media device bootable.
6. Exit FDISK by pressing the key to return to the A:\ prompt.
7. If your bootable DOS diskette contains SYS.COM, go to step 8. Otherwise, go to step 9.
8. At the A:\ prompt, enter SYS x: where x represents the drive letter noted above.
CAUTION:
After the system files have been transferred, SYS will return to the A:\ prompt. Go to
13.
step
9. Copy any files you want to keep from your USB flash media device to a temporary directory
on another drive (for example, the system's internal hard drive).
10. At the A:\ prompt, enter FORMAT /S X: where X represents the drive letter noted before.
CAUTION:
FORMAT will display one or more warnings and ask you each time whether you want to
proceed. Enter
Y each time. FORMAT will format the USB flash media device, add the
system files, and ask for a Volume Label.
11. Press Enter for no label or enter one if desired.
12. Copy any files you saved in step 9 back to your USB flash media device.
13. Remove the diskette and reboot the computer. The computer will boot to the USB flash
media device as drive C.
Page 40
The default boot order varies from computer to computer, and it can be changed in the Computer
Setup (F10) Utility.
If you have used a DOS version from Windows 9x, you may see a brief Windows logo screen. If
you do not want this screen, add a zero-length file named LOGO.SYS to the root directory of the
USB flash media device.
Return to “Copying to Multiple Computers” on page 7.
Unsupported USB Flash Media Device
CAUTION:
To create a bootable USB flash media device, you must have:
a PC that is bootable from a USB flash media device
a USB flash media device
A bootable DOS diskette with the FDISK and SYS programs. If SYS is not available,
FORMAT may be used, but all existing files on the USB flash media device will be lost.
1. If there are any PCI cards in the system that have SCSI, ATA RAID or SATA drives attached,
turn off the computer and unplug the power cord.
CAUTION:
2. Open the computer and remove the PCI cards.
3. Insert the USB flash media device into one of the computer's USB ports and remove all other
USB storage devices except USB diskette drives. Close the computer cover.
4. Plug in the power cord and turn on the computer.
5. As soon as the computer is turned on, press and hold the F10 key until you enter Computer
Setup. Press
Enter to bypass the title screen, if necessary.
If you do not press the F10 key at the appropriate time, you must restart the computer and press
and hold the
F10 key again to access the utility.
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
6. Go to Advanced > PCI Devices to disable both the PATA and SATA controllers. When
disabling the SATA controller, note the IRQ to which the controller is assigned. You will
need to reassign the IRQ later. Exit setup, confirming the changes.
SATA IRQ: __________
7. Insert a bootable DOS diskette with FDISK.COM and either SYS.COM or FORMAT.COM
into a diskette drive and turn on the computer to boot to the DOS diskette.
8. Run FDISK and delete any existing partitions on the USB flash media device. Create a new
partition and mark it active. Exit FDISK by pressing the
Esc key.
9. If the system did not automatically restart when exiting FDISK, press Ctrl+Alt+Del to
reboot to the DOS diskette.
Page 41
10. At the A:\ prompt, type FORMAT C: /S and press Enter. Format will format the USB flash
media device, add the system files, and ask for a Volume Label.
11. Press Enter for no label or enter one if desired.
12. Turn off the computer and unplug the power cord. Open the computer and re-install any PCI
cards that were previously removed. Close the computer cover.
13. Plug in the power cord, remove the diskette, and turn on the computer.
14. As soon as the computer is turned on, press and hold the F10 key until you enter Computer
Setup. Press
Enter to bypass the title screen, if necessary.
15. Go to Advanced > PCI Devices and re-enable the PATA and SATA controllers that were
disabled in step 6. Put the SATA controller on its original IRQ.
16. Save the changes and exit. The computer will boot to the USB flash media device as drive C.
The default boot order varies from computer to computer, and it can be changed in the Computer
Setup (F10) Utility. Refer to the Computer Setup Guide on the Documentation CD for
instructions.
If you have used a DOS version from Windows 9x, you may see a brief Windows logo screen. If
you do not want this screen, add a zero-length file named LOGO.SYS to the root directory of the
USB flash media device.
Return to “Copying to Multiple Computers” on page 7.
Dual-State Power Button
With Advanced Configuration and Power Interface (ACPI) enabled, the power button can
function either as an on/off switch or as a suspend button. The suspend feature does not
completely turn off power, but instead causes the computer to enter a low-power standby. This
allows you to power down quickly without closing applications and to return quickly to the same
operational state without any data loss.
To change the power button’s configuration, complete the following steps:
1. Left click on the Start Button, then select Control Panel > Power Options.
2. In the Power Options Properties, select the Advanced tab.
3. In the Power Button section, select Stand by.
After configuring the power button to function as a suspend button, press the power button to put
the system in a very low power state (standby). Press the button again to bring the system out of
suspend to full power status quickly. To completely turn off all power to the system, press and
hold the power button for four seconds.
CAUTION: Do not use the power button to turn off the computer unless the system is not responding;
turning off the power without operating system interaction could cause damage to or loss of data on the
hard drive.
Page 42
When making the transition to new or revised operating systems, it is important to implement the
support software designed for that operating system. If you plan to run a version of Microsoft
Windows that is different from the version included with the computer, you must install
corresponding device drivers and utilities to ensure that all features are supported and
functioning properly.
HP has made the task of locating, accessing, evaluating, and installing the latest support software
easier. You can download the software from
http://www.hp.com/support. The Web site contains
the latest device drivers, utilities, and flashable ROM images needed to run the latest Microsoft
Windows operating system on the HP computer.
HP management solutions integrate with other systems management applications, and are based
on industry standards, such as:
Web-Based Enterprise Management (WBEM)
Windows Management Interface (WMI)
Wake on LAN Technology
ACPI
SMBIOS
Pre-boot Execution (PXE) support
Page 43
Desktop Management
Asset Tracking and Security
Asset tracking features incorporated into the computer provide key asset tracking data that can be
managed using HP Insight Manager, HP Client Manager or other system management
applications. Seamless, automatic integration between asset tracking features and these products
enables you to choose the management tool that is best suited to your environment and to
leverage your investment in existing tools.
HP also offers several solutions for controlling access to valuable components and information.
ProtectTools Embedded Security, if installed, p
system integrity and authenticates third-party users attempting system access. (Refer to HP ProtectTools Embedded Security Guide, on the Documentation CD for more information.)
Security features such as ProtectTools, the Smart Cover Sensor and the Smart Cover Lock,
available on select models, help to prevent unauthorized access to the internal components of the
personal computer. By disabling parallel, serial, or USB ports, or by disabling removable media
boot capability, you can protect valuable data assets. Memory Change and Smart Cover Sensor
alerts can be automatically forwarded to system management applications to deliver proactive
notification of tampering with a computer’s internal components.
ProtectTools, the Smart Cover Sensor, and the Smart Cover Lock are available as options on
select systems.
revents unauthorizedaccess to data and checks
Use the following utilities to manage security settings on your HP computer:
Locally, using the Computer Setup Utilities. See the Computer Setup (F10) Utility Guide
included with the computer for additional information and instructions on using the
Computer Setup Utilities.
Remotely, using HP Client Manager Software or System Software Manager. This software
enables the secure, consistent deployment and control of security settings from a simple
command-line utility.
Computer Setup Utilities (F10) Security Features
Troubleshooting GuideDocumentation CD
Troubleshooting GuideDocumentation CD
++).
See the Desktop Management Guide on the Documentation CD for more information.
For more information about Computer Setup, see the Computer Setup (F10) Utility Guide
Service Reference Guide, dx2100 ST376226-0013–13
Page 44
Desktop Management
(Continued)
Notify User
Setup Password
Desktop Management GuideDocumentation CD
HP ProtectTools Embedded Security Guide
Documentation CD
Computer Setup (F10) Utility Guide
3–14376226-001Service Reference Guide, dx2100 ST
Page 45
Desktop Management Guide
Documentation CD
Desktop Management
(Continued)
CD
Desktop Management GuideDocumentation
Computer Setup (F10) Utility Guide
Service Reference Guide, dx2100 ST376226-0013–15
Page 46
Desktop Management
Desktop
Management Guide
The power-on password prevents unauthorized use of the computer by requiring entry of a
password to access applications or data each time the computer is turned on or restarted. The
setup password specifically prevents unauthorized access to Computer Setup, and can also be
used as an override to the power-on password. That is, when prompted for the power-on
password, entering the setup password instead will allow access to the computer.
A network-wide setup password can be established to enable the system administrator to log in to
all network systems to perform maintenance without having to know the power-on password,
even if one has been established.
If the system is equipped with an embedded security device, refer to HP ProtectTools Embedded Security Guide, on the Documentation CD. Establishing a setup password through Computer
Setup prevents reconfiguration of the computer (use of the Computer Setup (F10) utility) until
the password is entered.
1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart.
2. As soon as the computer is turned on, press and hold the key until you enter Computer
Setup. Press
to bypass the title screen, if necessary.
If you do not press the key at the appropriate time, you must restart the computer and press
and hold the
key again to access the utility.
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
3. Select Security, then select Setup Password and follow the instructions on the screen.
3–16376226-001Service Reference Guide, dx2100 ST
Page 47
Desktop Management
4. Before exiting, select File > Save Changes and Exit.
Establishing a power-on password through Computer Setup prevents access to the computer
when power is turned on, unless the password is entered. When a power-on password is set,
Computer Setup presents Password Options under the Security menu. Password options include
Password Prompt on Warm Boot. When Password Prompt on Warm Boot is enabled, the
password must also be entered each time the computer is rebooted.
1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart.
2. As soon as the computer is turned on, press and hold the key until you enter Computer
Setup. Press
to bypass the title screen, if necessary.
If you do not press the key at the appropriate time, you must restart the computer and press
and hold the
key again to access the utility.
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
3. Select Security, then Power-On Password and follow the instructions on the screen.
4. Before exiting, select File > Save Changes and Exit.
Entering a Power-On Password
To enter a power-on password, complete the following steps:
1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart.
2. When the key icon appears on the monitor, type your current password, then press Enter.
Type carefully; for security reasons, the characters you type do not appear on the screen.
If you enter the password incorrectly, a broken key icon appears. Try again. After three
unsuccessful tries, you must turn off the computer, then turn it on again before you can continue.
Entering a Setup Password
If the system is equipped with an embedded security device, refer to HP ProtectTools Embedded
Security Guide, on the Documentation CD.
If a setup password has been established on the computer, you will be prompted to enter it each
time you run Computer Setup.
1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart.
2. As soon as the computer is turned on, press and hold the F10 key until you enter Computer
Setup. Press
If you do not press the F10 key at the appropriate time, you must restart the computer and press
and hold the
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
Enter to bypass the title screen, if necessary.
F10 key again to access the utility.
3. When the key icon appears on the monitor, type the setup password, then press Enter.
Service Reference Guide, dx2100 ST376226-0013–17
Page 48
Type carefully; for security reasons, the characters you type do not appear on the screen.
If you enter the password incorrectly, a broken key icon appears. Try again. After three
unsuccessful tries, you must turn off the computer, then turn it on again before you can continue.
Changing a Power-On or Setup Password
If the system is equipped with an embedded security device, refer to HP ProtectTools Embedded
Security Guide, on the Documentation CD.
1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart
the Computer.
2. To change the Power-On password, go to step 3.
To change the Setup password, as soon as the computer is turned on, press and hold the F10
key until you enter Computer Setup. Press
If you do not press the F10 key at the appropriate time, you must restart the computer and press
and hold the
F10 key again to access the utility.
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
3. When the key icon appears, type the current password, a slash (/) or alternate delimiter
character, the new password, another slash (/) or alternate delimiter character, and the new
password again as
current password/new password/new password
shown:
Enter to bypass the title screen, if necessary.
Type carefully; for security reasons, the characters you type do not appear on the screen.
4. Press Enter.
5. The new password takes effect the next time you turn on the computer.
Refer to “National Keyboard Delimiter Characters” for information about the alternate delimiter
characters. The power-on password and setup password may also be changed using the Security
options in Computer Setup.
Deleting a Power-On or Setup Password
If the system is equipped with an embedded security device, refer to HP ProtectTools Embedded
Security Guide, on the Documentation CD.
1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart
the Computer.
2. To delete the Power-On password, go to step 3.
To delete the Setup password, as soon as the computer is turned on, press and hold the F10
key until you enter Computer Setup. Press
If you do not press the F10 key at the appropriate time, you must restart the computer and press
and hold the
F10 key again to access the utility.
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
Enter to bypass the title screen, if necessary.
Page 49
3. When the key icon appears, type the current password followed by a slash (/) or alternate
delimiter character as shown:
4. Press .
Refer to “National Keyboard Delimiter Characters” on page 19 for information about the
alternate delimiter characters. The power-on password and setup password may also be changed
using the Security options in Computer Setup.
National Keyboard Delimiter Characters
Each keyboard is designed to meet country-specific requirements. The syntax and keys that you
use for changing or deleting your password depend on the keyboard that came with your
computer.
National Keyboard Delimiter Characters
Japanese/SwissCzech-Korean/Taiwanese/
Danish-Latin American -Thai/
French!Norwegian-Turkish.
French CanadianéPolish-U.K. English/
German-Portuguese-U.S. English/
* For Bosnia-Herzegovina, Croatia, Slovenia, and Yugoslavia
Clearing Passwords
If you forget the password, you cannot access the computer. Refer to the Troubleshooting Guide
on the Documentation CD for instructions on clearing passwords.
If the system is equiped with an embedded security device, refer to HP ProtectTools Embedded Security Guide, on the Documentation CD.
DriveLock is an industry-standard security feature that prevents unauthorized access to the data
on specific hard drives. DriveLock has been implemented as an extension to Computer Setup. It
is only available on certain systems and only when DriveLock-capable hard drives are detected.
DriveLock is intended for HP customers for whom data security is the paramount concern. For
such customers, the cost of the hard drive and the loss of the data stored on it is inconsequential
when compared with the damage that could result from unauthorized access to its contents. In
order to balance this level of security with the practical need to accommodate a forgotten
password, the HP implementation of DriveLock employs a two-password security scheme. One
password is intended to be set and used by a system administrator while the other is typically set
Page 50
and used by the end-user. There is no “back-door” that can be used to unlock the drive if both
passwords are lost. Therefore, DriveLock is most safely used when the data contained on the
hard drive is replicated on a corporate information system or is regularly backed up.
In the event that both DriveLock passwords are lost, the hard drive is rendered unusable. For
users who do not fit the previously defined customer profile, this may be an unacceptable risk.
For users who do fit the customer profile, it may be a tolerable risk given the nature of the data
stored on the hard drive.
Using DriveLock
The DriveLock option appears under the Security menu in Computer Setup. The user is
presented with options to set the master password or to enable DriveLock. A user password must
be provided in order to enable DriveLock. Since the initial configuration of DriveLock is
typically performed by a system administrator, a master password should be set first. HP
encourages system administrators to set a master password whether they plan to enable
DriveLock or keep it disabled. This will give the administrator the ability to modify DriveLock
settings if the drive is locked in the future. Once the master password is set, the system
administrator may enable DriveLock or choose to keep it disabled.
If a locked hard drive is present, POST will require a password to unlock the device. If a
power-on password is set and it matches the device’s user password, POST will not prompt the
user to re-enter the password. Otherwise, the user will be prompted to enter a DriveLock
password. Either the master or the user password may be used. Users will have two attempts to
enter a correct password. If neither attempt succeeds, POST will continue but the drive will
remain inaccessible.
DriveLock Applications
The most practical use of the DriveLock security feature is in a corporate environment where a
system administrator provides users with multibay hard drives for use in some computers. The
system administrator would be responsible for configuring the multibay hard drive which would
involve, among other things, setting the DriveLock master password. In the event that the user
forgets the user password or the equipment is passed on to another employee, the master
password can always be used to reset the user password and regain access to the hard drive.
HP recommends that corporate system administrators who choose to enable DriveLock also
establish a corporate policy for setting and maintaining master passwords. This should be done to
prevent a situation where an employee intentionally or unintentionally sets both DriveLock
passwords before leaving the company. In such a scenario, the hard drive would be rendered
unusable and require replacement. Likewise, by not setting a master password, system
administrators may find themselves locked out of a hard drive and unable to perform routine
checks for unauthorized software, other asset control functions, and support.
For users with less stringent security requirements, HP does not recommend enabling DriveLock.
Users in this category include personal users or users who do not maintain sensitive data on their
hard drives as a common practice. For these users, the potential loss of a hard drive resulting
from forgetting both passwords is much greater than the value of the data DriveLock has been
designed to protect. Access to Computer Setup and DriveLock can be restricted through the
Setup password. By specifying a Setup password and not giving it to end users, system
administrators are able to restrict users from enabling DriveLock.
Page 51
3.4.5 Smart Cover Sensor
Cover Removal Sensor, available on some models, is a combination of hardware and software
technology that can alert you when the computer cover or side panel has been removed. There are
three levels of protection, as described in the following table.
Smart Cover Sensor Protection Levels
LevelSettingDescription
Setting the Smart Cover Sensor Protection Level
To set the Smart Cover Sensor protection level, complete the following steps:
1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart.
2. As soon as the computer is turned on, press and hold the F10 key until you enter Computer
Setup. Press
If you do not press the F10 key at the appropriate time, you must restart the computer and press
and hold the
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
3. Select Security > Smart Cover > Cover Removal Sensor, and select the desired security
level.
4. Before exiting, select File > Save Changes and Exit.
Enter to bypass the title screen, if necessary.
F10 key again to access the utility.
Smart Cover Lock
The Smart Cover Lock is a software-controllable cover lock featured on select HP computers.
This lock prevents unauthorized access to the internal components. Computers ship with the
Smart Cover Lock in the unlocked position.
CAUTION:
The Smart Cover Lock is available as an option on select systems.
Page 52
Locking the Smart Cover Lock
To activate and lock the Smart Cover Lock, complete the following steps:
1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart.
2. As soon as the computer is turned on, press and hold the F10 key until you enter Computer
Setup. Press
Enter to bypass the title screen, if necessary.
If you do not press the F10 key at the appropriate time, you must restart the computer and press
and hold the
F10 key again to access the utility.
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
4. Before exiting, select File > Save Changes and Exit.
Using the Smart Cover FailSafe Key
If you enable the Smart Cover Lock and cannot enter your password to disable the lock, you will
need a Smart Cover FailSafe Key to open the computer cover. You will need the key in any of the
following circumstances:
Power outage
Startup failure
PC component failure (such as processor or power supply)
Forgotten password
CAUTION: The Smart Cover FailSafe Key is a specialized tool available from HP. Be prepared; order
this key before you need one (Tamper-resistant wrench PN 166527-001 or tamper-resistant bits PN
166527-002).
To obtain the FailSafe Key, do any one of the following:
Contact an authorized HP reseller or service provider.
Call the appropriate number listed in the warranty.
For more information about using the Smart Cover FailSafe Key, consult the Hardware
Reference Guide.
Page 53
The rear panel of the computer accommodates a cable lock so that the computer can be
physically secured to a work area.
For illustrated instructions, please see the Removal and Replacement Chapter for the specific
chassis.
Eliminating the need to enter user passwords, HP Fingerprint Identification Technology tightens
network security, simplifies the login process, and reduces the costs associated with managing
corporate networks. Affordably priced, it is not just for high-tech, high-security organizations
anymore.
Support for Fingerprint Identification Technology varies by model.
For more information, visit http://h18004.www1.hp.com/products/security.
Fault Notification and Recovery features combine innovative hardware and software technology
to prevent the loss of critical data and minimize unplanned downtime.
If the computer is connected to a network managed by HP Client Manager, the computer sends a
fault notice to the network management application. With HP Client Manager Software, you can
also remotely schedule diagnostics to automatically run on all managed PCs and create a
summary report of failed tests.
The Drive Protection System (DPS) is a diagnostic tool built into the hard drives installed in
select HP computers. DPS is designed to help diagnose problems that might result in
unwarranted hard drive replacement.
When HP computers are built, each installed hard drive is tested using DPS, and a permanent
record of key information is written onto the drive. Each time DPS is run, test results are written
to the hard drive. Your service provider can use this information to help diagnose conditions that
caused you to run the DPS software. Refer to the Troubleshooting Guide for instructions on using
DPS.
An integrated surge-tolerant power supply provides greater reliability when the computer is hit
with an unpredictable power surge. This power supply is rated to withstand a power surge of up
to 2000 volts without incurring any system downtime or data loss.
The thermal sensor is a hardware and software feature that tracks the internal temperature of the
computer. This feature displays a warning message when the normal range is exceeded, which
gives you time to take action before internal components are damaged or data is lost.
Page 54
Page 55
Serial and Parallel ATA Drive Guidelines and Features
4
Serial and Parallel ATA Drive Guidelines and
Features
Serial ATA = SATA
Parallel ATA = PATA
4.1 SATA and PATA Device Information
CharacteristicSATAPATA
3.3 V, 12 V5 V, 12 V
N/ARequired
150 MB/sup to 100 MB/s
SATA connectors on the system board are color coded to make identification easier.
Page 56
ATA Cables
4.2.1 SATA Data Cable
The SATA data cable is a thin, 7-pin cable designed to transmit data for only a single drive. As
shown in the table, each cable has 3 grounds, and 4 transmit/receive pins.
SATA data cables are susceptible to damage if overflexed. Never crease a SATA data cable and
never bend it tighter than a 30 mm (1.18 in) radius.
Pin NumberUsageDevice PlugHost Plug
Receive data
Receive data
B-Receive data
B+Receive data
4.2.2 SATA Power Cable
V5P15V12
P10
P11Reserved
Page 57
Page 58
The faces of industry-standard cable connectors are color-coded for easy recognition:
System board connector = blue face
Device 0 connector = black face
Device 1 connector = gray face
The color code of an industry-standard cable is applicable only if the drive’s jumper is in the
cable-select position.
System
Board
Blue
Face
System
Board
Blue
Face
On a two-drive cable, the Drive/Device 0 connector is always the farthest one from the system
board connector and the Drive/Device 1 connector is always the closest to the system board
connector.
Some cables may be labeled “Drive 0” instead of “Device 0” and “Drive 1” instead of
“Device 1”.
Device 1
Gray
Face
Device 0
Black
Face
Device 0
Black
Face
Page 59
PATA Drive Installation Guidelines
Most computer system boards have two or fewer Parallel ATA (PATA) channels with a dedicated
connector for each channel. When two channels are present, one is designated as the Primary and
the other as the Secondary Channel.
Each of the two channels can have up to two devices attached to it. All drives are connected to a
channel using an industry-standard 80-conductor cable.
The industry standard 1.44 MB diskette drive has its own separate channel and is not included as
a part of the maximum four drives.
HP does not support the use of PATA (IDE) hard drives when SATA hard drives are installed on
the computer.
Each drive attached to a channel must have a drive designation. If a drive is attached to the
Device 0 cable position and its cable-select jumper is present, the drive is designated as Device 0.
Similarly, if a drive is attached to the Device 1 cable position and its cable-select jumper is
present, the drive is designated as Device 1.
For optimal performance of a computer system, all drives need to be attached to the PATA
channel(s) in a specified sequence. This sequence is determined by the device class of the drives
and by specific attach sequence rules.
4.3.1 PATA Device Classes
In order to determine the best drive attach sequence, ATA/ATAPI drives are segregated into four
different classes based upon the bandwidth demands they place on an ATA channel. The most
demanding devices are in Class 1 and the least demanding are in Class 4.
Class 3
Optical Storage
Drives
Class 4
Magnetic
Storage Drives
General Attach Guidelines
The lower the device class number, the faster the device and the more bandwidth required.
Drives installed in the Device 0 positions on both the primary and secondary channels
receive the greatest possible bandwidth.
The bootable ATA hard drive should always be installed on the primary channel in the
Device 0 position.
Page 60
4.3.2 PATA Attach Sequence Rules by Class Priority
Drives should be attached in the sequence shown for optimum performance starting at
position 1.
4
3
Primary
Channel*
Secondary
Channel
*If there are three or more devices, two or more of which are hard drives, two hard drives should
be attached to the primary channel first before following the General Attach Sequence Rule.
The attach sequence rule may also be stated in table format:
General Attach Sequence Rule*
SequenceDescription
1
2
41
32
Device 1Device 0
Cable lengths may restrict drive usage.
The rules allow for:
Keeping the hard drive on a separate channel to maximize drive performance until a fourth
device is added.
Keeping the hard drives and removable media drives on separate channels to maximize
compatibility.
Keeping the hard drive and the writable optical drive on separate channels to maximize
optical drive reliability.
Page 61
Use the worksheet below for obtaining optimum system performance when setting up a computer
with multiple drives. Use the General Attach Sequence Rule to determine the best drive
installation sequence.
Attach Sequence Worksheet
Device NameDevice Class
Two examples of how to use the worksheet are:
Three-device installation
Four-device installation
Position
Number
Channel
Name
Device
Number
Page 62
Example 1: Three-Device Installation Sample
A system has three devices: Ultra ATA-100 hard drive, CD-ROM drive, and a DVD drive. Using
the Device Class Table in Section 4.3.1, the devices may be identified as:
A system has four devices: two Ultra ATA-100 hard drives, one DVD-CDR/W drive, and a
ZIP-250 drive. Using the Device Class Table in Section 4.3.1, the devices may be reidentified as:
Ultra ATA-100 hard drive = Class 1
Ultra ATA-100 hard drive = Class 1
DVD-CDR/W drive = Class 2
ZIP-250 drive = Class 4
4
*If there are three or more devices, two or more of which are hard drives, two hard drives should
be attached to the primary channel first before following the General Attach Sequence Rule.
4
3
Primary
Channel*
Secondary
Channel
Cable lengths may restrict drive usage.
When replacing a hard drive, the replacement should be of the same type (Ultra ATA -33,
-66, or -100) as that being removed to retain the same level of performance.
1
2
41
32
Device 1Device 0
When Ultra ATA and SCSI hard drives are mixed in the same system, the Ultra ATA drive
will become the boot drive unless the boot order is changed in Computer (F10) Setup.
Page 64
The Self Monitoring Analysis and Recording Technology (SMART) ATA drives for the HP
Personal Computers have built-in drive failure prediction that warns the user or network
administrator of an impending failure or crash of the hard drive. The SMART drive tracks fault
prediction and failure indication parameters such as reallocated sector count, spin retry count,
and calibration retry count. If the drive determines that a failure is imminent, it generates a fault
alert.
The combination of the file system and the operating system used in the computer determines the
maximum usable size of a drive partition. A drive partition is the largest segment of a drive that
may be properly accessed by the operating system. A single hard drive may therefore be
subdivided into a number of unique drive partitions in order to make use of all of its space.
Because of the differences in the way that drive sizes are calculated, the size reported by the
operating system may differ from that marked on the hard drive or listed in the computer
specification. Drive size calculations by drive manufacturers are bytes to the base 10 while
calculations by Microsoft are bytes to the base 2.
Maximum Size
File
System
Controller
TypeOperating System
Partition Drive
Page 65
4.6 SATA BIOS
Windows 2000 and XPWindows 9x, NT, and Linux
4.6.1 Legacy Mode
The Legacy mode is used to access devices attached to the embedded IDE controllers. Each
channel requires two fixed I/O address ranges and an IRQ for each.
Primary Channel
Command block: 1F0h - 1F7h
Control block: 3F6h
IRQ: 14
Secondary Channel
Command block: 170h - 177h
Control block: 376h
IRQ: 15
4.6.2 Native Mode
The native mode is used to access devices attached to add-in cards and is not supported by many
legacy operating systems. Addresses are assigned by PCI Plug-n-Play BIOS and the IRQ is
shared with multiple controllers. Base Address Registers for the Command and Control Block
are found in the PCI Configuration Space.
Offset 10h—Primary Command base address
Offset 14h—Primary Control base address
Offset 18h—Secondary Command base address
Offset 1Ch—Secondary Control base address
Page 66
4.7 Mixed Devices Boot and Drive Letter Ordering
HDD Boot and Drive
SATA Emulation*Hard Drive Order
Letter Ordering
*Refer to section 4.3.2 for PATA attach sequence rules.
Page 67
Identifying the Chassis, Routine Care, and Disassembly Preparation
Identifying the Chassis, Routine Care, and
Disassembly Preparation
This chapter provides general service information for the computer. Adherence to the procedures
and precautions described in this chapter is essential for proper service.
CAUTION:
system board. You must disconnect the power cord from the power source before opening the computer
to prevent system board or component damage.
5.1 Chassis Designations
5
5.1.1 Slim Tower (ST)
Page 68
Electrostatic Discharge Information
A sudden discharge of static electricity from your finger or other conductor can destroy
static-sensitive devices or microcircuitry. Often the spark is neither felt nor heard, but damage
occurs. An electronic device exposed to electrostatic discharge (ESD) may not appear to be
affected at all and can work perfectly throughout a normal cycle. The device may function
normally for a while, but it has been degraded in the internal layers, reducing its life expectancy.
Networks built into many integrated circuits provide some protection, but in many cases, the
discharge contains enough power to alter device parameters or melt silicon junctions.
5.2.1 Generating Static
The following table shows that:
Different activities generate different amounts of static electricity.
Static electricity increases as humidity decreases.
Event55%40%10%
Relative Humidity
700 volts can degrade a product.
5.2.2 Preventing Electrostatic Damage to Equipment
Many electronic components are sensitive to ESD. Circuitry design and structure determine the
degree of sensitivity. The following packaging and grounding precautions are necessary to
prevent damage to electric components and accessories.
To avoid hand contact, transport products in static-safe containers such as tubes, bags, or
boxes.
Protect all electrostatic parts and assemblies with conductive or approved containers or
packaging.
Keep electrostatic sensitive parts in their containers until they arrive at static-free stations.
Place items on a grounded surface before removing them from their container.
Always be properly grounded when touching a sensitive component or assembly.
Avoid contact with pins, leads, or circuitry.
Place reusable electrostatic-sensitive parts from assemblies in protective packaging or
conductive foam.
Page 69
5.2.3 Personal Grounding Methods and Equipment
Use the following equipment to prevent static electricity damage to equipment:
Wrist straps are flexible straps with a maximum of one-megohm ± 10% resistance in the
ground cords. To provide proper ground, a strap must be worn snug against bare skin. The
ground cord must be connected and fit snugly into the banana plug connector on the
grounding mat or workstation.
Heel straps/Toe straps/Boot straps can be used at standing workstations and are
compatible with most types of shoes or boots. On conductive floors or dissipative floor mats,
use them on both feet with a maximum of one-megohm ± 10% resistance between the
operator and ground.
To prevent static damage at the work area, use the following precautions:
Cover the work surface with approved static-dissipative material. Provide a wrist strap
connected to the work surface and properly grounded tools and equipment.
Use static-dissipative mats, foot straps, or air ionizers to give added protection.
Handle electrostatic sensitive components, parts, and assemblies by the case or PCB
laminate. Handle them only at static-free work areas.
Turn off power and input signals before inserting and removing connectors or test
equipment.
Use fixtures made of static-safe materials when fixtures must directly contact dissipative
surfaces.
Keep work area free of nonconductive materials such as ordinary plastic assembly aids and
Styrofoam.
Use field service tools, such as cutters, screwdrivers, and vacuums, that are conductive.
Materials and equipment that are recommended for use in preventing static electricity include:
Antistatic tape
Antistatic smocks, aprons, or sleeve protectors
Conductive bins and other assembly or soldering aids
Conductive foam
Conductive tabletop workstations with ground cord of one-megohm +/- 10% resistance
Static-dissipative table or floor mats with hard tie to ground
Field service kits
Page 70
Static awareness labels
Wrist straps and footwear straps providing one-megohm +/- 10% resistance
Material handling packages
Conductive plastic bags
Conductive plastic tubes
Conductive tote boxes
Opaque shielding bags
Transparent metallized shielding bags
Transparent shielding tubes
To prevent overheating and to help prolong the life of the computer:
Keep the computer away from excessive moisture, direct sunlight, and extremes of heat and
cold.
Operate the computer on a sturdy, level surface. Leave a 10.2-cm (4-inch) clearance on all
vented sides of the computer and above the monitor to permit the required airflow.
Never restrict the airflow into the computer by blocking any vents or air intakes. Do not place
the keyboard, with the keyboard feet down, directly against the front of the desktop unit as
this also restricts airflow.
Occasionally clean the air vents on all vented sides of the computer. Lint, dust, and other
foreign matter can block the vents and limit the airflow.
Never operate the computer with the cover or side panel removed.
Do not stack computers on top of each other or place computers so near each other that they
are subject to each other’s re-circulated or preheated air.
If the computer is to be operated within a separate enclosure, intake and exhaust ventilation
must be provided on the enclosure, and the same operating guidelines listed above will still
apply.
The computer is designed to operate continuously (24x7), provided that the operating
guidelines listed above are met.
Install or enable power management functions of the operating system or other software,
including sleep states.
1. Never use solvents or flammable solutions to clean the computer.
2. Never immerse any parts in water or cleaning solutions; apply any liquids to a clean cloth
and then use the cloth on the component.
3. Always unplug the computer when cleaning with liquids or damp cloths.
4. Always unplug the computer before cleaning the keyboard, mouse, or air vents.
Page 71
5. Disconnect the keyboard before cleaning it.
6. Wear safety glasses equipped with side shields when cleaning the keyboard.
Follow all safety precautions in Section 5.4.1 before cleaning the computer.
To clean the computer case, follow the procedures described below:
To remove light stains or dirt, use plain water with a clean, lint-free cloth or swab.
For stronger stains, use a mild dishwashing liquid diluted with water. Rinse well by wiping it
with a cloth or swab dampened with clear water.
For stubborn stains, use isopropyl (rubbing) alcohol. No rinsing is needed as the alcohol will
evaporate quickly and not leave a residue.
After cleaning, always wipe the unit with a clean, lint-free cloth.
Occasionally clean the air vents on the computer. Lint and other foreign matter can block the
vents and limit the airflow.
Cleaning the Keyboard
Follow all safety precautions in Section 5.4.1 before cleaning the keyboard.
To clean the tops of the keys or the keyboard body, follow the procedures described in Section
5.4.2.
When cleaning debris from under the keys, review all rules in Section 5.4.1 before following
these procedures:
CAUTION:
Visible debris underneath or between the keys may be removed by vacuuming or shaking.
Canned, pressurized air may be used to clean debris from under the keys. Caution should be
used as too much air pressure can dislodge lubricants applied under the wide keys.
If you remove a key, use a specially designed key puller to prevent damage to the keys. This
tool is available through many electronic supply outlets.
CAUTION:
Cleaning under a key may be done with a swab moistened with isopropyl alcohol and
squeezed out. Be careful not to wipe away lubricants necessary for proper key functions. Use
tweezers to remove any fibers or dirt in confined areas. Allow the parts to air dry before
reassembly.
Page 72
5.4.4 Cleaning the Monitor
Wipe the monitor screen with a clean cloth moistened with water or with a towelette
designed for cleaning monitors. Do not use sprays or aerosols directly on the screen; the
liquid may seep into the housing and damage a component. Never use solvents or flammable
liquids on the monitor.
To clean the monitor body follow the procedures in Section 5.4.2.
5.4.5 Cleaning the Mouse
Before cleaning the mouse, ensure that the power to the computer is turned off.
Clean the mouse ball by first removing the retaining plate and the ball from the housing. Pull
out any debris from the ball socket and wipe the ball with a clean, dry cloth before
reassembly.
To clean the mouse body, follow the procedures in Section 5.4.2.
5.5 Service Considerations
Listed below are some of the considerations that you should keep in mind during the disassembly
and assembly of the computer.
5.5.1 Power Supply Fan
The power supply fan is a variable-speed fan based on the temperature in the power supply.
CAUTION:
5.5.2 Tools and Software Requirements
To service the computer, you need the following:
Torx T-15 screwdriver (Compaq screwdriver with bits, PN 161946-001)
Torx T-15 screwdriver with small diameter shank (for certain front bezel removal)
Flat-bladed screwdriver (may sometimes be used in place of the Torx screwdriver)
The screws used in the computer are not interchangeable. They may have standard or metric
threads and may be of different lengths. If an incorrect screw is used during the reassembly
process, it can damage the unit. HP strongly recommends that all screws removed during
disassembly be kept with the part that was removed, then returned to their proper locations.
Metric screws have a black finish.
U.S. screws have a silver finish and are only used for hard drives.
As each subassembly is removed from the computer, it should be placed away from the work
area to prevent damage.
Most cables used throughout the unit are flat, flexible cables. These cables must be handled with
care to avoid damage. Apply only the tension required to seat or unseat the cables during
insertion or removal from the connector. Handle cables by the connector whenever possible. In
all cases, avoid bending or twisting the cables, and ensure that the cables are routed in such a way
that they cannot be caught or snagged by parts being removed or replaced.
Handle hard drives as delicate, precision components, avoiding all physical shock and vibration.
This applies to failed drives as well as replacement spares.
If a drive must be mailed, place the drive in a bubble-pack mailer or other suitable protective
packaging and label the package “Fragile: Handle With Care.”
Do not remove hard drives from the shipping package for storage. Keep hard drives in their
protective packaging until they are actually mounted in the CPU.
Avoid dropping drives from any height onto any surface.
If you are inserting or removing a hard drive, turn off the computer. Do not remove a hard
drive while the computer is on or in standby mode.
Before handling a drive, ensure that you are discharged of static electricity. While handling a
drive, avoid touching the connector. For more information about preventing electrostatic
damage, refer to Section
Do not use excessive force when inserting a drive.
Avoid exposing a hard drive to liquids, temperature extremes, or products that have magnetic
fields such as monitors or speakers.
5.2, “Electrostatic Discharge Information.”
Page 74
The battery that comes with the computer provides power to the real-time clock and has a
lifetime of about three years.
See the appropriate removal and replacement chapter for the chassis you are working on in this
guide for instructions on the replacement procedures.
water or fire, or expose it to temperatures higher than 140ºF (60ºC).
Batteries, battery packs, and accumulators should not be disposed of together with the
general household waste.
Page 75
Removal and Replacement Procedures—
Slim Tower (ST) Chassis
Adherence to the procedures and precautions described in this chapter is essential for proper
service. After completing all necessary removal and replacement procedures, run the Diagnostics
utility to verify that all components operate properly.
Not all features listed in this guide are available on all computers.
6.1 Preparation for Disassembly
See Chapter 5, “Identifying the Chassis, Routine Care, and Disassembly Preparation,”for initial
safety procedures.
1. Remove/disengage any security devices that prohibit opening the computer (Section 6.2,
“External Security Devices”).
2. Close any open software applications.
6
3. Exit the operating system.
4. Remove any diskette or compact disc from the computer.
5. Turn off the computer and any peripheral devices that are connected to it.
CAUTION:
CAUTION:
6. Disconnect the power cord from the electrical outlet and then from the computer.
7. Disconnect all peripheral device cables from the computer.
During disassembly, label each cable as you remove it, noting its position and routing. Keep all
screws with the units removed.
CAUTION:
Page 76
Removal and Replacement Procedures— Slim Tower (ST) Chassis
8. Lift the computer off the stand.
9. Lay the computer on its side (with the computer cover facing up) before removing the
computer cover and installing hardware.
Page 77
Removal and Replacement Procedures— Slim Tower (ST) Chassis
6.2 External Security Devices
6.2.1 Security Clip
A special clip is required to secure the computer from intrusion. This clip must be installed
before installing the computer cover.
6.2.2 Cable Lock
The cable lock may be used to secure the computer cover to the chassis and, at the same time,
secure the computer to a fixed object.
Insert the cable lock in the location shown below.
Service Reference Guide, dx2100 ST376226-0016–3
Page 78
Removal and Replacement Procedures— Slim Tower (ST) Chassis
6.2.3 Padlock
A padlock may be used by itself to secure the computer cover to the computer chassis. A padlock
may also be used with a security cable to secure the computer to a fixed object.
I
Without Security Cable
1. Thread the keyboard and mouse cables through the lock.
6–4376226-001Service Reference Guide, dx2100 ST
Page 79
2. Screw the lock to the chassis using the screw provided.
3. Insert the plug into the lock and push the button in to engage the lock. Use the key
provided to disengage the lock.
Page 80
With Security Cable
1. Fasten the cable by looping it around a stationary object.
2. Thread the keyboard and mouse cables through the lock.
Page 81
3. Screw the lock to the chassis using the screw provided.
4. Insert the plug end of the security cable into the lock and push the button in to engage
the lock. Use the key provided to disengage the lock.
Page 82
6.3 Computer Cover
1. Prepare the computer for disassembly (Section 6.1).
CAUTION:
1. Press the buttons on the left and right sides of the computer .
2. Slide the computer cover towards the front of the computer until it stops , then lift it up and
off the chassis.
To install the computer cover, reverse the removal procedure.
Page 83
6.4 Front Drive Bezels
1. Prepare the computer for disassembly (Section 6.1).
2. Remove the computer cover (Section 6.3).
3. Remove the drive bezel by pushing the top tab on the right side of the larger front bezel as
shown and rotating the drive bezel away from the larger front bezel .
The drive bezel will vary depending on the computer configuration.
4. Install a bezel or a bezel blank by pushing the bezel into place.
Page 84
There are three drive bezel inserts that are available.
ItemDescription
Page 85
6.5 Cable Management
The Slim Tower chassis is a very compact computer and proper routing of the internal cables is
critical to the operation of the computer. Follow good cable management practices when working
inside the computer.
Keep cables away from major heat sources like the heatsink.
Do not jam cables on top of expansion cards or memory modules. Printed circuit cards like
these are not designed to take excessive pressure on them.
Keep cables clear of movable or rotating parts like the power supply and drive cage to
prevent them from being cut or crimped when the component is lowered into its normal
position.
When folding a flat ribbon cable, never fold to a sharp crease. Sharp creases may damage the
wires.
Some flat ribbon cables come prefolded. Never change the folds on these cables.
Do not bend any cable sharply. A sharp bend can break the internal wires.
Never bend a SATA data cable tighter than a 30 mm (1.18 in) radius.
Never crease a SATA data cable.
Do not rely on components like the drive cage, power supply, or computer cover to push
cables down into the chassis. Always position the cables to lay properly by themselves.
When removing the power supply power cables from the P1 or P3 connectors on the system
board, always follow these steps:
1. Squeeze on the top of the retaining latch attached to the cable end of the connector .
2. Grasp the cable end of the connector and pull it straight up .
CAUTION:
Page 86
6.6 Memory
CAUTION:
CAUTION:
a grounded metal object. Refer to Section 5.2, “Electrostatic Discharge Information” for more information.
CAUTION: When handling a memory module, be careful not to touch any of the contacts. Doing so
may damage the module.
1. Prepare the computer for disassembly (Section 6.1).
2. Remove the computer cover (Section 6.3).
WARNING: To reduce risk of personal injury from hot surfaces, allow the internal system components to
cool before touching.
3. Open both latches of the memory module socket , and insert the memory module into the
socket . Refer to
modules to get optimal performance.
Appendix F, “Memory” for the correct sequence for installing memory
A memory module can be installed in only one way. Match the notch on the module with the tab
on the memory socket.
4. Push the module down into the socket, ensuring that the module is fully inserted and
properly seated. Make sure the latches are in the closed position .
5. Repeat steps 3 and 4 for any additional modules that you want to install.
Page 87
The computer automatically recognizes the additional memory when the computer is turned on.
To reassemble the computer, reverse the removal procedure.
Page 88
6.7 Vertically Oriented Expansion Card
6.7.1 Expansion Card Retainer
1. Prepare the computer for disassembly (Section 6.1).
2. Remove the computer cover (Section 6.3).
3. Release the slot cover retention latch that secures the PCI slot covers by lifting the green tab
on the latch and rotating the latch to the full open position .
4. Remove the single screw that keeps the card retainer in place and slide the retainer to the
left to remove it from the chassis .
To install the card retainer, reverse the removal procedure.
Page 89
6.7.2 PCI Expansion Card
1. Prepare the computer for disassembly (Section 6.1).
2. Remove the computer cover (Section 6.3).
3. Identify the slot into which you want to insert the expansion card.
4. Release the slot cover retention latch that secures the PCI slot covers by lifting the green tab
on the latch and rotating the latch to the full open position .
5. Remove the slot cover by sliding it up and out of the computer .
Page 90
6. Install the expansion card by sliding the card under the slot cover retention latch then
pressing the card down into the slot on the system board.
Be sure not to scrape other components in the chassis when installing an expansion card.
7. Rotate the slot cover retention latch back in place to secure the expansion card.
When you install an expansion card, make sure the metal bracket on the card slides into the slot
on the back of the computer then press down firmly on the card so that the whole connector seats
properly in the expansion card slot.
CAUTION:
Page 91
6.8 Drives
A Torx T-15 screwdriver is needed to remove and install the guide screws on a drive.
CAUTION:
6.8.1 Drive Positions
Restore Plus!
Drive Positions
ItemDescription
To verify the type and size of the storage device installed in the computer, run Computer Setup.
Page 92
Removal and Replacement Procedures— Slim Tower (ST) Chassis
6.8.2 Optical Drive
An optical drive is a CD-ROM, CD-R/RW, DVD-ROM, DVD+R/RW, or CD-RW/DVD Combo
drive.
1. Remove any removable media, such as a CD or DVD, from the drive.
2. Prepare the computer for disassembly (Section 6.1).
3. Remove the computer cover (Section 6.3).
4. Rotate the drive cage to its upright position by pulling on the green-tabbed lip.
5. Disconnect the power and data cables from the rear of the optical drive.
6–18376226-001Service Reference Guide, dx2100 ST
Page 93
Removal and Replacement Procedures— Slim Tower (ST) Chassis
6. Rotate the drive cage down to its normal position before trying to remove the drive.
7. Press the green drive retainer latch and slide the drive forward and lift it from the drive cage.
To replace the drive, reverse the removal procedure.
When replacing the drive, transfer the four screws from the old drive to the new one. The screws
take the place of drive rails.
CAUTION:
Service Reference Guide, dx2100 ST376226-0016–19
Page 94
Removal and Replacement Procedures— Slim Tower (ST) Chassis
6.8.3 External 3.5-inch Drive
1. Remove any removable media, such as a diskette, from the drive.
2. Prepare the computer for disassembly (Section 6.1).
3. Remove the computer cover (Section 6.3).
4. Remove the optical drive (Section 6.8.2).
5. Rotate the drive cage to its upright position by pulling on the green-tabbed lip.
6. Disconnect the signal and power cables from the drive. The other end of the cables should
remain connected to the system board. (Diskette drive is shown.)
7. Rotate the drive cage down to its normal position before trying to remove the drive.
6–20376226-001Service Reference Guide, dx2100 ST
Page 95
Removal and Replacement Procedures— Slim Tower (ST) Chassis
8. Press the green drive retention latch located on the side of the diskette drive to disengage
the drive from the drive cage and slide the diskette drive forward approximately 6mm
inch) .
(1/4
9. Lift the rear of the drive up so that the rear guide screws clear the top of the drive cage .
the drive rises it automatically slides forward until it is free from the drive cage .
As
To replace the drive, reverse the removal procedure making sure you rotate the rear of the drive
down, pivoting on the front screws.
When replacing the drive, transfer the four metric screws from the old drive to the new one. The
screws take the place of drive rails.
Service Reference Guide, dx2100 ST376226-0016–21
Page 96
Removal and Replacement Procedures— Slim Tower (ST) Chassis
6.8.4 Primary Hard Drive
A Torx T-15 screwdriver is needed to remove and install the guide screws on a hard drive.
CAUTION:
Restore Plus!
CAUTION: To prevent loss of work and damage to the computer or drive:
If you are inserting or removing a hard drive, shut down the operating system properly, then turn off
the computer. Do not remove a hard drive while the computer is on or in standby mode.
Before handling a drive, ensure that you are discharged of static electricity. While handling a drive,
avoid touching the connector. Refer to
information about preventing electrostatic damage.
Handle a drive carefully; do not drop it.
Do not use excessive force when inserting a drive.
Avoid exposing a hard drive to liquids, temperature extremes, or products that have magnetic fields
such as monitors or speakers.
1. Prepare the computer for disassembly (Section 6.1).
Section 5.2, “Electrostatic Discharge Information”for more
2. Remove the computer cover (Section 6.3).
3. Rotate the drive cage to its upright position by pulling on the green-tabbed lip.
It is not necessary to remove the drives from the drive cage.
6–22376226-001Service Reference Guide, dx2100 ST
Page 97
4. Remove the security clip that secures the backwall to the power supply.
5. Rotate the power supply to its full upright position.
Page 98
6. Disconnect the power and data cables from the back of the hard drive.
7. Pull the tab that locks the drive in place away from the drive , slide the hard drive toward
the front of the computer, then lift it up and out of the bay .
To install a hard drive, reverse the above procedure.
The replacement hard drive kit includes several data cables. Make sure to use the cable that is
exactly the same as the factory-installed cable.
If the system has only one SATA hard drive, the data cable must be connected to the blue
connector labeled P60 SATA 0 first to avoid any hard drive performance problems.
Page 99
When replacing the hard drive, transfer the four screws from the old drive to the new one. The
screws take the place of drive rails. You will need a Torx T-15 screwdriver to remove and
re-install the guide screws. HP has provided four extra 6-32 standard guide screws on the front of
the chassis, under the computer cover. The 6-32 standard guide screws are silver and are used
only for the hard drive.
If you replaced the primary hard drive, insert the Restore Plus! CD to restore the operating
system, software drivers, and any software applications that were preinstalled on the computer.
Follow the instructions in the guide included with the Restore Plus! CD. When the restore
process has completed, reinstall any personal files that you backed up before replacing the hard
drive.
Page 100
6.9 Fan Shroud
1. Prepare the computer for disassembly (Section 6.1).
2. Remove the computer cover (Section 6.3).
3. Lift up on the fan shroud to remove it from the computer.
When replacing the shroud, make sure that it does not get caught on the wires from either the fan
or the speaker.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.