This document provides information on the removal and replacement of all
parts as well as information on troubleshooting, Desktop Management, setup
utilities, SATA drives, safety, routine care, connector pin assignments, POST
error messages, and diagnostic indicator lights.
Microsoft, MS-DOS, Windows, and Windows NT are trademarks of Microsoft Corporation in the U.S. and other
countries.
Intel is a trademark of Intel Corporation in the U.S. and other countries.
The only warranties for HP products and services are set forth in the express warranty statements accompanying
such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall
not be liable for technical or editorial errors or omissions contained herein.
This document contains proprietary information that is protected by copyright. No part of this document may be
photocopied, reproduced, or translated to another language without the prior written consent of Hewlett-Packard
Company.
WARNING: Text set off in this manner indicates that failure to follow directions could result in bodily
Å
harm or loss of life.
CAUTION: Text set off in this manner indicates that failure to follow directions could result in damage to
Ä
equipment or loss of information.
Service Reference Guide
HP Compaq Business Desktop dx6100 Series
First Edition (July 2004)
Third Edition (June 2006)
ESystem Board and Riser Board Reference Designators
FMemory
Index
Contents
Service Reference Guide, dx6100361293-003vii
Contents
viii361293-003Service Reference Guide, dx6100
Installing the Operating System
CAUTION: Do not add optional hardware or third-party devices to your computer until the operating
Ä
system is successfully installed. Doing so may cause errors and may prevent the operating system from
installing properly.
CAUTION: Once the automatic installation has begun, DO NOT TURN OFF THE COMPUTER UNTIL
Ä
THE PROCESS IS COMPLETE. Turning off the computer during the installation process might damage the
software that runs the computer or prevent its proper installation.
The first time the computer is turned on, the operating system is automatically installed. This
takes approximately 10 minutes, depending on the system hardware configuration. At the
beginning of the installation process, you are prompted to select the appropriate language for the
operating system. Read and follow the instructions that appear on the screen to complete the
installation.
If the computer shipped with more than one operating system language on the hard drive, the
✎
installation process could take up to 60 minutes.
During this process, do not turn off your computer unless you are directed to do so.
1
1.1 Installing or Upgrading Device Drivers
To install hardware devices such as a printer, a display adapter, or network adapter after the
operating system installation is completed, the operating system needs access to the appropriate
software drivers for the devices.
If prompted for the I386 directory, replace the path specification with C:\i386, or use the Browse
button in the dialog box to locate the i386 folder. This action points the operating system to the
appropriate drivers.
Obtain the latest support software, including support software for the operating system from
www.hp.com. Click Support & Drivers, select Download drivers and software, enter the
model number of the computer, and press
You can also obtain the latest support software on CDs. The following Web site provides
information on how to purchase a support software CD subscription:
If the computer has an optical CD-RW drive, install the appropriate application to be able to
✎
write to the drive. To install the application, double-click the Setup Software icon on the desktop
or the application launcher and select the Easy CD Creator and Direct CD option when
prompted.
Enter.
Service Reference Guide, dx6100361293-0031–1
Installing the Operating System
1.2 Transferring Files and Settings
Use the Microsoft Windows XP Files and Settings Transfer Wizard to move files and settings
from an old computer to a new one. Click Start > All Programs > Accessories > System Tools > Files and Settings Transfer Wizard.
1.3 Backing Up and Restoring Files
1.3.1 Creating a Backup File—Windows XP Professional
1. Click Start > All Programs > Accessories > System Tools > Backup.
2. Use the Backup or Restore Wizard to create a backup file or tape.
A backup file can be saved to a hard disk, a floppy disk, CD, USB flash media device, tape drive,
✎
or to any other removable or nonremovable media.
1.3.2 Restoring from the Backup File—Windows XP Professional
1. Click Start > All Programs > Accessories > System Tools > Backup.
2. Use the Backup or Restore Wizard to restore files from a backup file.
A backup file can be on a hard disk, a floppy disk, CD, USB flash media device, tape drive, or
2. Type convert drive_letter: /fs:ntfs (where drive_letter is the volume to be converted) and
Enter.
press
1.5 HP Software
The Microsoft Windows XP Professional operating system is preinstalled on the computer and
will be configured automatically the first time the computer is turned on. The following HP
software may also be installed at that time on selected models:
■ Computer Setup Utilities
■ HP Support Software including device drivers
■ Configuration Record
■ Online Safety & Comfort Guide
■ Power Management with energy saver features
■ Security Management tools
1–2361293-003Service Reference Guide, dx6100
Installing the Operating System
■ Software Support Management tools
Certain drivers and utilities are available only in selected languages. You can obtain the latest
version of these files, in English and selected other languages, in one of three ways:
■ Support Software CD
■ HP Web site at www.hp.com
■ Restore Plus! CD, which is supplied with many HP models
Additional HP software may be required in certain situations.
✎
Service Reference Guide, dx6100361293-0031–3
Installing the Operating System
1–4361293-003Service Reference Guide, dx6100
Setup Utilities and Diagnostics Features
Setup Utilities (F10) and diagnostic features provide information needed about the computer
system when contacting Customer Support. These tools can also be used to:
■ Change factory default settings and to set or change the system configuration, which may be
necessary when you add or remove hardware.
■ Determine if all of the devices installed on the computer are recognized by the system and
functioning properly.
■ Determine information about the operating environment of the computer.
■ Solve system configuration errors detected but not automatically fixed during the Power-On
Self-Test (POST).
■ Establish and manage passwords and other security features.
■ Establish and manage energy-saving timeouts.
All features identified in this chapter may not be available on all HP products.
✎
2
2.1 Power-On Self-Test (POST)
POST is a series of diagnostic tests that runs automatically when the system is turned on. POST
checks the following items to ensure that the computer system is functioning properly:
■ Keyboard
■ Memory modules
■ All mass storage devices
■ Processors
■ Controllers
If the Power-On Password is set, a key icon appears on the screen while POST is running. You
✎
will need to enter the password before continuing. Refer to
Configuration and Deployment” for information on setting, deleting, or bypassing the password.
If POST finds an error in the system, an audible and/or visual message occurs. For POST error
messages and their solutions refer to Appendix C, “POST Error Messages.”
Chapter 3, in section “Initial
Service Reference Guide, dx6100361293-0032–1
Setup Utilities and Diagnostics Features
2.2 Computer Setup Utilities
Use Computer Setup Utilities (F10) to:
■ Change factory default settings.
■ Set the system date and time.
■ Set, view, change, or verify the system configuration, including settings for processor,
graphics, memory, audio, storage, communications, and input devices.
■ Modify the boot order of bootable devices such as hard drives, diskette drives, optical drives,
or USB flash media devices.
■ Enable Quick Boot, which is faster than Full Boot but does not run all of the diagnostic tests
run during a Full Boot. You can set the system to:
❏ always Quick Boot (default);
❏ periodically Full Boot (from every 1 to 30 days); or
❏ always Full Boot.
■ Select Post Messages Enabled or Disabled to change the display status of Power-On
Self-Test (POST) messages. Post Messages Disabled suppresses most POST messages, such
as memory count, product name, and other non-error text messages. If a POST error occurs,
the error is displayed regardless of the mode selected. To manually switch to Post Messages
Enabled during POST, press any key (except
F1 through F12).
■ Establish an Ownership Tag, the text of which is displayed each time the system is turned on
or restarted.
■ Enter the Asset Tag or property identification number assigned by the company to this
computer.
■ Enable the power-on password prompt during system restarts (warm boots) as well as during
power-on.
■ Establish a setup password that controls access to Computer Setup (F10) Utility and the
settings described in this section.
■ To secure integrated I/O functionality, including the serial, USB, or parallel ports, audio, or
embedded NIC, so that they cannot be used until they are unsecured.
■ Enable or disable Master Boot Record (MBR) Security.
■ Enable or disable removable media boot ability.
■ Enable or disable legacy diskette write ability (when supported by hardware).
■ Solve system configuration errors detected but not automatically fixed during the Power-On
Self-Test (POST).
■ Replicate the system setup by saving system configuration information on diskette and
restoring it on one or more computers.
■ Execute self-tests on a specified ATA hard drive (when supported by drive).
■ Enable or disable DriveLock security (when supported by MultiBay drive).
2–2361293-003Service Reference Guide, dx6100
2.2.1 Using Computer Setup (F10) Utilities
Computer Setup can be accessed only by turning on the computer or restarting the system. To
access the Computer Setup Utilities menu, complete the following steps:
1. Turn on or restart the computer. If you are in Windows, click Start >Shut Down >Restart.
2. As soon as the computer is turned on, press and hold the F10 key until you enter Computer
Setup. Press
If you do not press the F10 key at the appropriate time, you must restart the computer and press
✎
and hold the
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
3. Select your language from the list and press the Enter key.
4. A choice of five headings appears in the Computer Setup Utilities menu: File, Storage,
Security, Power, and Advanced.
5. Use the arrow (left and right) keys to select the appropriate heading. Use the arrow (up and
down) keys to select the option you want, then press
Utilities menu, press
Enter to bypass the title screen, if necessary.
F10 key again to access the utility.
Enter. To return to the Computer Setup
Esc.
Setup Utilities and Diagnostics Features
6. To apply and save changes, select File > Save Changes and Exit.
❏ If you have made changes that you do not want applied, select Ignore Changes and
Exit.
❏ To reset to factory settings, select Set Defaults and Exit. This option will restore the
original factory system defaults.
CAUTION: Do NOT turn the computer power OFF while the ROM is saving your F10 Computer Setup
Ä
changes because the CMOS could become corrupted. It is safe to turn off all power to the computer
after you exit the F10 Setup screen.
Service Reference Guide, dx6100361293-0032–3
Setup Utilities and Diagnostics Features
2.2.2 Computer Setup Menu
.
HeadingOptionDescription
File System InformationLists:
• Product name
• Processor type/speed/stepping
• Cache size (L1/L2)
• Installed memory size/speed, number of channels (single or
dual) (if applicable)
• Integrated MAC address for embedded, enabled NIC (if
applicable)
• System ROM (includes family name and version)
• Chassis serial number
• Asset tracking number
AboutDisplays copyright information.
Set Time and DateAllows you to set system time and date.
Replicated SetupSave to Removable Media
Default SetupSave Current Settings as Default
Apply Defaults
and Exit
Ignore Changes
and Exit
Save Changes
and Exit
Storage Device
Configuration
Saves system configuration, including CMOS, to a formatted
1.44-MB diskette, a USB flash media device, or a diskette-like
device (a storage device set to emulate a diskette drive).
Restore from Removable Media
Restores system configuration from a diskette, a USB flash media
device, or a diskette-like device.
Saves the current system configuration settings as the default.
Restore Factory Settings as Default
Restores the factory system configuration settings as the default.
Applies the currently selected default settings and clears any
established passwords.
Exits Computer Setup without applying or saving any changes.
Saves changes to system configuration or default settings and exits
Computer Setup.
Lists all installed BIOS-controlled storage devices.
When a device is selected, detailed information and options are
displayed. The following options may be presented.
Diskette Type
Identifies the highest capacity media type accepted by the diskette
drive.
Legacy Diskette Drives
Options are 3.5" 1.44 MB, and 5.25" 1.2 MB.
Support for specific Computer Setup options may vary depending on the hardware configuration.
✎
2–4361293-003Service Reference Guide, dx6100
Setup Utilities and Diagnostics Features
HeadingOptionDescription
Storage
(continued)
Device
Configuration
(continued)
Drive Emulation
Allows you to select a drive emulation type for a certain storage
device. (For example, a Zip drive can be made bootable by
selecting diskette emulation.)
Drive TypeEmulation Options
ATAPI Zip driveNone (treated as Other)
Diskette (treated as diskette drive)
ATA Hard diskNone (treated as Other)
Hard disk (treated as hard drive)
Legacy disketteNo emulation options available
CD-ROM driveNo emulation options available
ATAPI LS-120None (treated as Other).
Diskette (treated as diskette drive).
Default Values IDE/SATA
Multisector Transfers (ATA disks only)
Specifies how many sectors are transferred per multi-sector PIO
operation. Options (subject to device capabilities) are Disabled, 8,
and 16.
Transfer Mode(ATA devices only)
Specifies the active data transfer mode. Options (subject to device
capabilities) are PIO 0, Max PIO, Enhanced DMA, Ultra DMA 0,
and Max UDMA.
Translation Mode(ATA disks only)
Lets you select the translation mode to be used for the device. This
enables the BIOS to access disks partitioned and formatted on
other systems and may be necessary for users of older versions of
UNIX (e.g., SCO UNIX version 3.2). Options are Automatic,
Bit-Shift, LBA Assisted, User, and None
CAUTION: Ordinarily, the translation mode selected
Ä
automatically by the BIOS should not be changed. If the selected
translation mode is not compatible with the translation mode that
was active when the disk was partitioned and formatted, the data
on the disk will be inaccessible.
Translation Parameters (ATA disks only)
This feature appears only when User translation mode is selected.
✎
Allows you to specify the parameters (logical cylinders, heads, and
sectors per track) used by the BIOS to translate disk I/O requests
(from the operating system or an application) into terms the hard
drive can accept. Logical cylinders may not exceed 1024. The
number of heads may not exceed 256. The number of sectors per
track may not exceed 63. These fields are only visible and
changeable when the drive translation mode is set to User.
Support for specific Computer Setup options may vary depending on the hardware configuration.
✎
Service Reference Guide, dx6100361293-0032–5
Setup Utilities and Diagnostics Features
HeadingOptionDescription
Storage
(continued)
Storage OptionsRemovable Media Boot
Enables/disables ability to boot the system from removable media.
Legacy Diskette Write
Enables/disables ability to write data to legacy diskettes.
After saving changes to Removable Media Write, the computer
✎
will restart. Turn the computer off, then on, manually.
BIOS DMA Data Transfers
Allows you to control how BIOS device I/O requests are serviced.
When “Enable” is selected, the BIOS will service ATA device read
and write requests with DMA data transfers. When “Disable” is
selected, the BIOS will service ATA device read and write requests
with PIO data transfers.
SATA Emulation
Allows you to choose how the SATA controller and devices are
accessed by the operating system.
“Separate IDE Controller
2 PATA devices may be accessed in this mode. The SATA and
PATA controllers appear as two separate IDE controllers. Use this
option with Microsoft Windows 2000 and Windows XP.
• SATA 0 is seen as SATA Primary Device 0
• SATA 1 (if present) is seen as SATA Secondary Device 0
“Combined IDE Controller
SATA devices may be accessed in this mode. The SATA and PATA
controllers appear as one combined IDE controller. Use this option
with Microsoft Windows 98 and earlier operating systems.
• PATA Primary Device 0 replaces SATA 1
• PATA Primary Device 1 replaces SATA 3
” is the default option. Up to 4 SATA and
” is the other option. Up to 2 PATA and 2
IDE Controller
Allows you to enable or disable the primary IDE controller. This
feature is supported on select models only.
Primary SATA Controller
Allows you to enable or disable the Primary SATA controller.
Secondary SATA Controller
Allows you to enable or disable the Secondary SATA controller.
This feature is supported on select models only.
DPS Self-TestAllows you to execute self-tests on ATA hard drives capable of
performing the Drive Protection System (DPS) self-tests.
This selection will only appear when at least one drive capable of
✎
performing the DPS self-tests is attached to the system.
Support for specific Computer Setup options may vary depending on the hardware configuration.
✎
2–6361293-003Service Reference Guide, dx6100
Setup Utilities and Diagnostics Features
HeadingOptionDescription
Storage
(continued)
Security Setup PasswordAllows you to set and enables setup (administrator) password.
Boot OrderAllows you to:
• Specify the order in which attached devices (such as a USB
flash media device, diskette drive, hard drive, optical drive, or
network interface card) are checked for a bootable operating
system image. Each device on the list may be individually
excluded from or included for consideration as a bootable
operating system source.
• Specify the order of attached hard drives. The first hard drive
in the order will have priority in the boot sequence and will be
recognized as drive C (if any devices are attached).
MS-DOS drive lettering assignments may not apply after a
✎
non-MS-DOS operating system has started.
Shortcut to Temporarily Override Boot Order
To boot one time from a device other than the default device
specified in Boot Order, restart the computer and press F9 when
the monitor light turns green. After POST is completed, a list of
bootable devices is displayed. Use the arrow keys to select the
preferred bootable device and press Enter. The computer then
boots from the selected non-default device for this one time.
If the setup password is set, it is required to change Computer
✎
Setup options, flash the ROM, and make changes to certain plug
and play settings under Windows.
See the Troubleshooting Guide on the Documentation CD for more
information.
Power-On
Password
Password Options
(This selection will
appear only if a
power-on
password is set.)
Smart CoverAllows you to:
Support for specific Computer Setup options may vary depending on the hardware configuration.
✎
Allows you to set and enable power-on password.
See the Troubleshooting Guide for more information.
Allows you to specify whether the password is required for warm
boot (CTRL+ALT+DEL).
See the Desktop Management Guide for more information.
• Lock/unlock the Cover Lock.
• Set the Cover Removal Sensor to Disable/Notify User/Setup
Password.
Notify User alerts the user that the sensor has detected that the
✎
cover has been removed. Setup Password requires that the setup
password be entered to boot the computer if the sensor detects
that the cover has been removed.
This feature is supported on select models only. See the Desktop Management Guide on the Documentation CD for more
information.
Service Reference Guide, dx6100361293-0032–7
Setup Utilities and Diagnostics Features
HeadingOptionDescription
Security
(continued)
Embedded
Security
Device SecurityEnables/disables serial ports, parallel port, front USB ports, system
Network Service
Boot
System IDsAllows you to set:
Allows you to:
• Enable/disable the Embedded Security device.
• Reset the device to Factory Settings.
This feature is supported on select models only. See the Desktop Management Guide on the Documentation CD for more
information.
Enables/disables the computer’s ability to boot from an operating
system installed on a network server. (Feature available on NIC
models only; the network controller must reside on the PCI bus or
be embedded on the system board.)
• Asset tag (18-byte identifier) and ownership Tag (80-byte
identifier displayed during POST).
See the Desktop Management Guide on the Documentation CD
for more information.
• Chassis serial number or Universal Unique Identifier (UUID)
number. The UUID can only be updated if the current chassis
serial number is invalid. (These ID numbers are normally set in
the factory and are used to uniquely identify the system.)
• Keyboard locale setting (for example, English or German) for
System ID entry.
DriveLock SecurityAllows you to assign or modify a master or user password for
MultiBay hard drives. When this feature is enabled, the user is
prompted to provide one of the DriveLock passwords during POST.
If neither is successfully entered, the hard drive will remain
inaccessible until one of the passwords is successfully provided
during a subsequent cold-boot sequence.
This selection will only appear when at least one MultiBay drive
✎
that supports the DriveLock feature is attached to the system.
See the Desktop Management Guide on the Documentation CD for
more information.
Data Execution
Prevention
Support for specific Computer Setup options may vary depending on the hardware configuration.
✎
2–8361293-003Service Reference Guide, dx6100
Enable/Disable.
Data Execution Prevention Mode help prevent OS security
breaches.
This selection is in effect only if the processor and operating
✎
system being used comprehend and utilize the function.
Setup Utilities and Diagnostics Features
HeadingOptionDescription
Security
(continued)
Master Boot
Record Security*
Save Master Boot
Record*
Restore Master
Boot Record*
Allows you to enable or disable Master Boot Record (MBR)
Security.
When enabled, the BIOS rejects all requests to write to the MBR on
the current bootable disk. Each time the computer is powered on or
rebooted, the BIOS compares the MBR of the bootable disk to the
previously saved MBR. If changes are detected, you are given the
option of saving the MBR on the current bootable disk, restoring the
previously-saved MBR, or disabling MBR security. You must know
the setup password if one is set.
Disable MBR Security before intentionally changing the formatting
✎
or partitioning of the current bootable disk. Several disk utilities
(such as FDISK and FORMAT) attempt to update the MBR.
If MBR Security is enabled and disk accesses are being serviced
by the BIOS, write requests to the MBR are rejected, causing the
utilities to report errors.
If MBR Security is enabled and disk accesses are being serviced
by the operating system, any MBR change will be detected by the
BIOS during the next reboot, and an MBR Security warning
message will be displayed.
Saves a backup copy of the Master Boot Record of the current
bootable disk.
Only appears if MBR Security is enabled.
✎
Restores the backup Master Boot Record to the current bootable
disk.
Only appears if all of the following conditions are true:
✎
MBR Security is enabled.
A backup copy of the MBR has been previously saved.
The current bootable disk is the same disk from which the
backup copy of the MBR was saved.
CAUTION: Restoring a previously saved MBR after a disk utility
Ä
or operating system has modified the MBR may cause the data on
the disk to become inaccessible. Only restore a previously saved
MBR ifyou are confident that the current bootable disk’s MBR has
been corrupted or infected with a virus.
Support for specific Computer Setup options may vary depending on the hardware configuration.
✎
Service Reference Guide, dx6100361293-0032–9
Setup Utilities and Diagnostics Features
HeadingOptionDescription
PowerOS Power
Management
Hardware Power
Management
ThermalFan idle mode - This bar graph controls the minimum permitted fan
Support for specific Computer Setup options may vary depending on the hardware configuration.
✎
• Runtime Power Management - Enable/Disable. Allows certain
operating systems to reduce processor voltage and frequency
when the current software load does not require the full
capabilities of the processor.
• Idle Power Savings - Extended/Normal. Allows certain
operating systems to decrease the processors power
consumption when the processor is idle.
• ACPI S3 Support - Enables or disables ACPI S3 support.
• ACPI S3 Hard Disk Reset - Enabling this causes the BIOS to
ensure hard disks are ready to accept commands after
resuming from S3 before returning control to the operating
system.
• ACPI S3 PS2 Mouse Wakeup - Enables or disables waking
from S3 due to PS2 mouse activity.
SATA power management enables or disables SATA bus and/or
device power management.
speed.
2–10361293-003Service Reference Guide, dx6100
Setup Utilities and Diagnostics Features
HeadingOptionDescription
Advanced*
*For
advanced
users only
Power-On OptionsAllows you to set:
• POST mode (QuickBoot, FullBoot, or FullBoot every 1-30 days).
• POST messages (enable/disable).
• F9 prompt (enable/disable). Enabling this feature will display
the text F9=Boot Menu during POST. Disabling this feature
prevents the text from being displayed but pressing F9 will still
access the Shortcut Boot (Order) Menu screen. See Storage > Boot Order for more information.
• F10 prompt (enable/disable). Enabling this feature will
display the text F10=Setup during POST. Disabling this
feature prevents the text from being displayed but pressing
F10 will still access the Setup screen.
• F12 prompt (enable/disable). Enabling this feature will
display the text F12=Network Service Boot during POST.
Disabling this feature prevents the text from being displayed
but pressing F12 will still force the system to attempt booting
from the network.
• Option ROM* prompt (enable/disable). Enabling this feature
will cause the system to display a message before loading
options ROMs. (This feature is supported on select models
only.)
• Remote wakeup boot source (remote server/local hard drive).
• After Power Loss (off/on/previous state): After power loss, if
you connect your computer to an electric power strip and
would like to turn on power to the computer using the switch on
the power strip, set this option to ON.
If you turn off power to your computer using the switch on a
✎
power strip, you will not be able to use the suspend/sleep feature
or the Remote Management features.
• POST Delay (in seconds) (enable/disable). Enabling this
feature will add a user-specified delay to the POST process.
This delay is sometimes needed for hard disks on some PCI
cards that spin up very slowly; so slowly that they are not ready
to boot by the time POST is finished. The POST delay also gives
you more time to press F10 to enter Computer (F10) Setup.
• I/O APIC Mode (enable/disable). Enabling this feature will
allow Microsoft Windows Operating Systems to run optimally.
This feature must be disabled for certain non-Microsoft
Operating Systems to work properly.
Support for specific Computer Setup options may vary depending on the hardware configuration.
✎
Service Reference Guide, dx6100361293-0032–11
Setup Utilities and Diagnostics Features
HeadingOptionDescription
Advanced*
(continued)
*For
advanced
users only
Power-On Options
(continued)
BIOS Power-OnAllows you to set the computer to turn on automatically at a time
Onboard DevicesAllows you to set resources for or disable onboard system devices
PCI Devices• Lists currently installed PCI devices and their IRQ settings.
Bus Options*On select models, allows you to enable or disable:
Allows you to set: (continued)
• ACPI/USB Buffers @ Top of Memory (enable/disable).
Enabling this feature places USB memory buffers at the top
of memory. The advantage is that some amount of memory
below 1 MB is freed up for use by option ROMs. The
disadvantage is that a popular memory manager, HIMEM.SYS,
does not work properly when USB buffers are at top of memory
AND the system has 64 MB or less of RAM.
• Hyper-threading (enable/disable).
• Limit CPUID Maximum Value to 3 - Restricts the number of
CPUID functions reported by the microprocessor. Enable this
feature if booting to WinNT.
you specify.
(diskette controller, serial port, or parallel port).
• Allows you to reconfigure IRQ settings for these devices or to
disable them entirely. These settings have no effect under an
APIC-based operating system.
• PCI SERR# Generation.
• PCI VGA palette snooping, which sets the VGA palette
snooping bit in PCI configuration space; only needed when
more than one graphics controller is installed.
Support for specific Computer Setup options may vary depending on the hardware configuration.
• To disable Wake on LAN during the off state (S5), use the arrow
(left and right) keys to select the Advanced > Device Options
menu and set the S5 Wake on Lan feature to “Disable.” This
obtains the lowest power consumption available on the computer
during S5. It does not affect the ability of the computer to Wake on
LAN from suspend or hibernation, but will prevent it from waking
from S5 via the network. It does not affect operation of the network
connection while the computer is on.
• If a network connection is not required, completely disable the
network controller (NIC) by using the arrow (left and right) keys to
select the Security > Device Security menu. Set the Network
Controller option to “Device Hidden.” This prevents the network
controller from being used by the operating system and reduces
the power used by the computer in S5.
• Processor cache (enable/disable).
• Unique Sleep State Blink Patterns. Allows you to choose an LED
blink pattern that uniquely identifies each sleep state.
• Integrated Video (enable/disable) Allows you to use integrated
video and PCI Up Solution video at the same time (available on
select models only).
Inserting a PCI or PCI Express video card automatically disables
✎
Integrated Video. When PCI Express video is on, Integrated
Video must remain disabled.
• Monitor Tracking (enable/disable). Allows ROM to save
monitor asset information.
Allows you to set:
• NIC PXE Option ROM Download (enable/disable). The BIOS
contains an embedded NIC option ROM to allow the unit to
boot through the network to a PXE server. This is typically used
to download a corporate image to a hard drive. The NIC
option ROM takes up memory space below 1MB commonly
referred to as DOS Compatibility Hole (DCH) space. This
space is limited. This F10 option will allow users to disable the
downloading of this embedded NIC option ROM thus giving
more DCH space for additional PCI cards which may need
option ROM space. The default will be to have the NIC option
ROM enabled.
PCI VGA
Configuration
Displayed only if there are multiple PCI video adapters in the
system. Allows you to specify which VGA controller will be the
“boot” or primary VGA controller.
Support for specific Computer Setup options may vary depending on the hardware configuration.
✎
Service Reference Guide, dx6100361293-0032–13
Setup Utilities and Diagnostics Features
2.3 Diagnostics for Windows
The Diagnostics for Windows (DFW) utility is a component of HP Client Management Solutions
that allows you to view information about the hardware and software configuration of the
computer while running Microsoft Windows (Microsoft Windows 2000 and Microsoft Windows
XP). It also allows you to perform hardware and software tests on the subsystems of the
computer.
When you invoke Diagnostics for Windows, the current configuration of the computer is shown
on the Overview screen. There is access from this screen to several categories of information
about the computer and the Test tab. The information in every screen of the utility can be saved
to a file or printed.
To test all subsystems, you must log in as the administrator. If you do not log in as the
✎
administrator, you will be unable to test some subsystems. The inability to test a subsystem will
be indicated by an error message under the subsystem name in the Test window or by shaded
check boxes that cannot be selected.
Use Diagnostics for Windows to determine if all the devices installed on the computer are
recognized by the system and functioning properly. Running tests is optional but recommended
after installing or connecting a new device.
Third party devices not supported by HP may not be detected by Diagnostics for Windows. Save,
print, or display the information generated by the utility.
2–14361293-003Service Reference Guide, dx6100
2.3.1 Detecting Diagnostics for Windows
Some computers ship with the Diagnostics for Windows preloaded, but not preinstalled.
To determine whether Diagnostics for Windows is installed:
1. Access the location of the Diagnostics icons:
❏ In Windows 2000 Professional, select Start > Settings > Control Panel.
❏ In Windows XP Home or Windows XP Professional, select Start > Control Panel >
Performance and Maintenance.
2. If icons for Configuration Record and Diagnostics for Windows are present, the Diagnostics
for Windows utility is installed. If the icons are not present, the utility is either not preloaded
or not installed.
2.3.2 Installing Diagnostics for Windows
If Diagnostics for Windows is not preloaded, you can download the Diagnostics for Windows
SoftPaq from the following Web site:
http://www.hp.com/support/files
Once the software has been downloaded onto the hard drive it may be installed by performing
these steps:
Setup Utilities and Diagnostics Features
1. Close all Windows applications.
2. Install the Diagnostics for Windows utility:
❏ In Windows XP, select Start > Software Setup icon. Select Diagnostics for Windows
> Next button, then follow the instructions on the screen.
❏ In Windows 2000, select the Setup Software iconon the Desktop > Diagnostics for
Windows > Next button, then follow the instructions on the screen.
❏ In either Windows XP or Windows 2000, if the Setup Software/Software Setup icon is
not on the Desktop or in the Start menu, run the Setup program from the
C:\CPQAPPS\DIAGS directory or select Start > Run and type the following in the
command line:
3. Click Next to install Diagnostics for Windows.
4. After the program has finished installing, you may be prompted to restart the computer, or it
may automatically restart. If prompted, click Finish to restart the computer or Cancel to exit
the program. You must restart the computer to complete the installation of Diagnostics for
Windows.
If you want to upgrade an existing version of Diagnostics for Windows installed on the
✎
computer, visit
desired software and download the latest version. Execute the downloaded file and select Repair
to update the installed version. This will cause the new version to overwrite the old version.
http://www.hp.com/support/files and click on an applicable product. Locate the
C:\CPQAPPS\DIAGS\SETUP.
Service Reference Guide, dx6100361293-0032–15
Setup Utilities and Diagnostics Features
2.3.3 Using Categories in Diagnostics for Windows
To use categories:
1. Click Start > HP Information Center > Diagnostics for Windows. You can also select the Diagnostics for Windows icon, located in the Control Panel.
The screen displays the overview of the computer hardware and software.
❏ In Windows 2000 Professional, select Start > Settings > Control Panel, then select
Diagnostics for Windows.
❏ In Windows XP Home and Windows XP Professional, select Start > Control Panel >
Performance and Maintenance, then select Diagnostics for Windows.
2. For specific hardware and software information, select a category from the Categories
pull-down menu or the appropriate icon on the toolbar.
As the cursor moves over the toolbar icons, the corresponding category name is displayed.
✎
3. To display more detailed information in a selected category, click More in the Information
Level box in the lower left corner of the window or click Level at the top of the screen and
select More.
4. Review, print, and/or save this information as desired.
❏ To print the information, click File > Print. Select one of the following options:
Detailed Report (All Categories), Summary Report (All Categories), or Current
Category. Click OK to print the report you selected.
❏ To save the information, click File > Save As. Select one of the following options:
Detailed Report (All Categories), Summary Report (All Categories), or Current
Category. Click OK to save the report you selected.
5. To exit Diagnostics for Windows, click File, and then click Exit.
Menu Bar—File, Categories, Navigation, Level, Tab, Help
At the top of the Diagnostics for Windows screen is the Menu Bar consisting of six pull-down
menus. Selecting an item will provide the following information on the system:
■ File—Save As, Print, Printer Setup, Exit
■ Categories
❏ System—System board, ROM, date, and time
❏ Asset Control—Asset tag, system serial number, and processor
❏ Input Devices—Keyboard, mouse, and joystick(s)
❏ Communication—Ports
❏ Storage—Storage drives
❏ Graphics—Graphics
❏ Memory—System board and Windows memory
❏ Multimedia—Optical storage (CD, DVD, and so on) and audio
❏ Windows—Windows
❏ Architecture—PCI Device
2–16361293-003Service Reference Guide, dx6100
Setup Utilities and Diagnostics Features
❏ Resources—IRQ, I/O, and Memory Map
❏ Health—Status of system temperature and hard drives
❏ Miscellaneous—CMOS, DMI, BIOS, System, Product Name, and Serial Number
■ Navigation—Previous Category (F5), Next Category (F6)
■ Level—Less (F7), More (F8) <information on the screen>
■ Ta b
❏ Overview—Displays general information about the computer. This window is displayed
when first starting the utility. The left side of the window shows hardware information,
while the right side shows software information.
❏ Test—Allows you to choose various parts of the system to test. You can also choose the
type of test and testing
❏ Status—Displays the status of each test in progress. You can cancel testing by clicking
mode.
the Cancel Testing button.
❏ Log—Displays a log of tests for each device.
❏ Error—Displays any errors that occurred during device testing. The window lists the
device being tested, the type and number of errors, and the error code.
■ Help—Contents, How to use Help, About
2.3.4 Running Diagnostic Tests in Diagnostics for Windows
To run diagnostic tests:
1. Click Start > HP Information Center > Diagnostics for Windows.
Alternately, you can access Diagnostics for Windows via the control panel.
The screen displays the overview of the computer hardware and software. Five tabs are
displayed below the row of icons: Overview, Test, Status, Log, and Error.
2. Click the Test tab, or click Tab at the top of the screen and select Test.
3. Select one of the following options:
❏ Quick Test—Runs a quick, general test on each device. Requires no user intervention if
Unattended Mode is selected.
❏ Complete Test—Runs maximum testing of each device. The user can select Interactive
Mode or Unattended Mode.
❏ Custom Test—Runs only the tests you select. To select specific devices or tests, find the
device in the list, then select the check box beside each test. When selected, a red check
mark is displayed in the box. Some tests selected may require user intervention.
To test all subsystems, you must log in as the administrator. If you do not log in as the
✎
administrator, you will be unable to test some subsystems. The inability to test a subsystem will
be indicated by an error message under the subsystem name in the Test window or by shaded
boxes that cannot be checked.
Service Reference Guide, dx6100361293-0032–17
Setup Utilities and Diagnostics Features
4. Select Interactive Mode or Unattended Mode. In Interactive Mode, the diagnostic software
will prompt you for input during tests that require it. Some tests require interaction and will
display errors or halt testing if selected in conjunction with Unattended Mode.
❏ Interactive Mode provides maximum control over the testing process. You determine
whether the test passed or failed and may be prompted to insert or remove devices.
❏ Unattended Mode does not display prompts. If errors are found, they are displayed when
testing is complete.
5. Click the Begin Testing button at the bottom of the window. Test Status is displayed,
showing the progress and result of each test. For more details on the tests run, click the Log
tab or click Tab at the top of the screen and select Log.
6. To view a test report, select one of three tabs:
❏ Status—Summarizes the tests run, passed, and failed during the current testing session.
❏ Log—Lists tests run on the system, the numbers of times each test has run, the number
of errors found on each test, and the total run time of each test.
❏ Error—Lists all errors found on the computer with their error codes.
7. To save a test report:
❏ Select the Log tab Save button to save a Log tab report.
❏ Select the Error tab Save button to save an Error tab report.
8. To print a test report:
❏ If the report is on the Log tab, select File > Save As, then print the file from the selected
folder.
❏ If the report is on the Error tab, select the Error tab Print button.
9. If errors are found, click the Error tab to display more detailed information and
recommended actions.
10. Click Print or save the error information for future reference.
11. To exit Diagnostics for Windows, click File > Exit.
2.4 Configuration Record
The Configuration Record utility is a windows-based information-gathering tool that gathers
critical hardware and software information from various computer subsystems. The information
includes such things as the ROM, asset tag, processor, physical drives, PCI devices, memory,
graphics, operating system version number, operating system parameters, and the operating
system startup files to give a complete view of the computer. Configuration Record provides a
means for automatically identifying and comparing configuration changes, and has the ability to
maintain a configuration history. The information can be saved as a history of multiple sessions.
This utility allows the resolution of problems without taking the computer offline and assists in
maximizing the computer availability. The information obtained by the utility is useful in
troubleshooting system problems, and streamlines the service process by enabling quick and
easy identification of system configurations.
The utility displays it findings in a Now.log file. If the original Base.log file is present in the cpqdiags directory, the Base.log file is displayed next to the Now.log file in a split window with
the differences between the two highlighted in the color red.
2–18361293-003Service Reference Guide, dx6100
2.4.1 Installing Configuration Record
The Configuration Record is part of Diagnostics for Windows and is automatically installed at
the same time as Diagnostics for Windows.
2.4.2 Running Configuration Record
To run this program:
1. Click Start > HP Information Center > Configuration Record.
Alternately, you can access Diagnostics for Windows via the control panel.
The Configuration Record utility has two view options: Show Changed Items Only and Show
✎
All. The default view is Show
color red since it shows only the differences. Switching to Show All displays the complete,
comprehensive view of the system.
2. The default view is Show Changed Items Only. To view all the information gathered by
Configuration Record, click View at the top of the window and select Show All, or click the
Show All Items icon.
3. To save the information in the left or right window, select File > Save Window File and
then select Left Window File or Right Window File.
Changed Items Only, therefore all the text is displayed in the
Setup Utilities and Diagnostics Features
Saving the configuration of the computer periodically allows the user to keep a history of the
✎
configuration. This history may be useful to you in the future if the system ever encounters a
problem that needs debugging.
4. To exit Configuration Record, click File, then click Exit.
Service Reference Guide, dx6100361293-0032–19
Setup Utilities and Diagnostics Features
2–20361293-003Service Reference Guide, dx6100
Desktop Management
HP Client Management Solutions provides standards-based solutions for managing and
controlling desktops, workstations, and notebook PCs in a networked environment.
The key capabilities and features of desktop management are:
■ Initial configuration and deployment
■ Remote system installation
■ Software updating and management
■ ROM flash
■ Asset tracking and security
■ Fault notification and recovery
Support for specific features described in this guide may vary by model or software version.
✎
3
3.1 Initial Configuration and Deployment
HP computers come with a preinstalled system software image. After a brief software
“unbundling” process, the computer is ready to be used.
A customized software image may be deployed by:
■ Installing additional software applications after unbundling the preinstalled software image.
■ Using software deployment tools, such as Altiris Deployment Solution, to replace the
preinstalled software with a customized software image.
■ Using a disk cloning process to copy the contents from one hard drive to another.
The best deployment method depends on your information technology environment and
processes. The PC Deployment section of the Solutions and Services Web site
The Restore Plus! CD, ROM-based setup, and ACPI hardware provide further assistance with
recovery of system software, configuration management and troubleshooting, and power
management.
provides information to help
Service Reference Guide, dx6100361293-0033–1
Desktop Management
3.2 Remote System Installation
Remote System Installation allows you to start and set up your system using the software and
configuration information located on a network server by initiating the Preboot Execution
Environment (PXE). The Remote System Installation feature is usually used as a system setup
and configuration tool, and can be used for the following tasks:
■ Formatting a hard drive.
■ Deploying a software image on one or more new PCs.
■ Remotely updating the system BIOS in flash ROM. See Section 3.3.7, “Remote ROM
Flash.”
■ Configuring the system BIOS settings.
To initiate Remote System Installation, press F12 when the F12 = Network Service Boot
message appears in the lower-right corner of the HP logo screen. Follow the instructions on the
screen to continue the process. The default boot order is a BIOS configuration setting that can be
changed to always attempt to PXE boot.
HP and Altiris have partnered to provide tools designed to make the task of corporate PC
deployment and management easier and less time-consuming, ultimately lowering the total cost
of ownership and making HP PCs the most manageable client PCs in the enterprise environment.
3.3 Software Updating and Management
HP provides several tools for managing and updating software on desktops and
workstations—HP Client Manager Software, Altiris Client Management Solutions, System
Software Manager; Proactive Change Notification; and Subscriber's Choice.
3.3.1 HP Client Manager Software
HP Client Manager Software (HP CMS) assists HP customers in managing the hardware aspects
of their client computers with features that include:
■ Detailed views of hardware inventory for asset management
■ PC health check monitoring and diagnostics
■ Proactive notification of changes in the hardware environment
■ Web-accessible reporting of business critical details such as machines with thermal
warnings, memory alerts, and more
■ Remote updating of system software such as device drivers and ROM BIOS
■ Remote changing of boot order
For more information on the HP Client Manager, visit
http://h18000.www1.hp.com/im/client_mgr.html.
3–2361293-003Service Reference Guide, dx6100
3.3.2 Altiris Client Management Solutions
HP and Altiris have partnered to provide comprehensive, tightly integrated systems management
solutions to reduce the cost of owning HP client PCs. HP Client Manager Software is the
foundation for additional Altiris Client Management Solutions that address:
■ Inventory and Asset Management
❏ SW license compliance
❏ PC tracking and reporting
❏ Lease contract, fixing asset tracking
■ Deployment and Migration
❏ Windows XP Professional migration
❏ System deployment
❏ Personality migrations
■ Help Desk and Problem Resolution
❏ Managing help desk tickets
❏ Remote troubleshooting
Desktop Management
❏ Remote problem resolution
❏ Client disaster recovery
■ Software and Operations Management
❏ Ongoing desktop management
❏ HP system SW deployment
❏ Application self-healing
For more information and details on how to download a fully-functional 30-day evaluation
version of the Altiris solutions, visit
On selected desktop and notebook models, an Altiris management agent is included as part of the
factory loaded image. This agent enables communication with the Altiris development Solution
which can be used to complete new hardware deployment or personality migration to a new OS
using easy-to-follow wizards. Altiris solutions provide easy-to-use software distribution
capabilities. When used in conjunction with System Software Manager (Section 3.3.3), or HP
Client Manager Software, administrators can also update ROM BIOS and device driver software
from a central console.
For more information, visit
http://h18000.www1.hp.com/im/index.html.
3.3.3 System Software Manager
System Software Manager (SSM) is a utility that lets you update system-level software on
multiple systems simultaneously. When executed on a PC client system, SSM detects both
hardware and software versions, then updates the appropriate software from a central repository,
also known as a file store. Driver versions that are supported by SSM are denoted with a special
icon on the driver download Web site and on the Support Software CD. To download the utility
or to obtain more information on SSM, visit
http://www.hp.com/go/ssm.
Service Reference Guide, dx6100361293-0033–3
Desktop Management
3.3.4 Proactive Change Notification (PCN)
The Proactive Change Notification program uses the Subscriber's Choice Web site in order to
proactively and automatically:
■ Send you Proactive Change Notification (PCN) e-mails informing you of hardware and
software changes to most commercial computers and servers, up to 60 days in advance.
Security Bulletins, and Driver alerts for most commercial computers and servers.
You create your own profile to ensure that you only receive the information relevant to a specific
IT environment. To learn more about the Proactive Change Notification program and create a
custom profile, visit
Subscriber’s Choice is a client-based service from HP. Based on your profile, HP will supply
you with personalized product tips, feature articles, and/or driver and support
alerts/notifications. Subscriber’s Choice Driver and Support Alerts/Notifications will deliver
e-mails notifying you that the information you subscribed to in your profile is available for
review and retrieval. To learn more about Subscriber’s Choice and create a custom profile, visit
http://h30046.www3.hp.com/subhub.php.
3.3.6 ROM Flash
The computer comes with a reprogrammable flash ROM (read only memory). By establishing a
setup password in Computer Setup (F10) Utility, you can protect the ROM from being
unintentionally updated or overwritten. This is important to ensure the operating integrity of the
computer. Should you need or want to upgrade your ROM, you may:
■ Order an upgraded ROMPaq™ diskette from HP.
■ Download the latest ROMPaq images the HP driver and support page,
http://www.hp.com/support/files.
CAUTION: For maximum ROM protection, be sure to establish a setup password. The setup password
prevents unauthorized ROM upgrades. System Software Manager allows the system administrator to set
the setup password on one or more PCs simultaneously. For more information, visit
http://www.hp.com/go/ssm.
3.3.7 Remote ROM Flash
Remote ROM Flash allows the system administrator to safely upgrade the ROM on remote HP
computers directly from the centralized network management console. Enabling the system
administrator to perform this task remotely, on multiple computers and personal computers,
results in a consistent deployment of and greater control over HP PC ROM images over the
network. It also results in greater productivity and lower total cost of ownership.
The computer must be powered on, or turned on through Remote Wakeup, to take advantage of
✎
Remote ROM Flash.
For more information on Remote ROM Flash, refer to the HP Client Manager Software or
System Software Manager at
3–4361293-003Service Reference Guide, dx6100
http://h18000.www1.hp.com/im/prodinfo.html.
3.3.8 HPQFlash
The HPQFlash utility is used to locally update or restore the system ROM on individual PCs
through a Windows operating system.
Desktop Management
For more information on HPQFlash, visit
of the computer when prompted.
3.3.9 FailSafe Boot Block ROM
The FailSafe Boot Block ROM allows for system recovery in the unlikely event of a ROM flash
failure, for example, if a power failure were to occur during a ROM upgrade. The Boot Block is
a flash-protected section of the ROM that checks for a valid system ROM flash when power to
the system is turned on.
■ If the system ROM is valid, the system starts normally.
■ If the system ROM fails the validation check, the FailSafe Boot Block ROM provides
enough support to start the system from a ROMPaq diskette, which will program the system
ROM with a valid image.
Some models also support recovery from a ROMPaq CD. ISO ROMPaq images are included
✎
with selected models in the downloadable ROM softpaqs.
When the boot block detects an invalid system ROM, the System Power LED blinks RED 8
times, one every second, followed by a 2-second pause. Also 8 simultaneous beeps will be heard.
A Boot Block recovery mode message is displayed on the screen (some models).
To recover the system after it enters Boot Block recovery mode, complete the following steps:
1. If there is a diskette in the diskette drive or a CD in the CD drive, remove the diskette and
CD and turn off the power.
http://www.hp.com/support/files and enter the name
2. Insert a ROMPaq diskette into the diskette drive or, if permitted on this computer, a
ROMPaq CD into the CD drive.
3. Turn on the computer.
If no ROMPaq diskette or ROMPaq CD is found, you will be prompted to insert one and
restart the computer.
If a setup password has been established, the Caps Lock light will turn on and you will be
prompted to enter the password.
4. Enter the setup password.
If the system successfully starts from the diskette and successfully reprograms the ROM,
then the three keyboard lights will turn on. A rising tone series of beeps also signals
successful completion.
5. Remove the diskette or CD and turn the power off.
6. Turn the power on again to restart the computer.
Service Reference Guide, dx6100361293-0033–5
Desktop Management
The following table lists the various keyboard light combinations used by the Boot Block ROM
(when a PS/2 keyboard is attached to the computer), and explains the meaning and action
associated with each combination.
Keyboard Light Combinations Used by Boot Block ROM
Failsafe Boot
Block Mode
Num LockGreenOnROMPaq diskette or ROMPaq CD not
Caps LockGreenOnEnter password.
Num, Caps,
Scroll Lock
Num, Caps,
Scroll Lock
Diagnostic lights do not flash on USB keyboards.
✎
Keyboard
LED Color
GreenBlink on in
GreenOnBoot Block ROM Flash successful. Turn
3.3.10 Replicating the Setup
The following procedures give an administrator the ability to easily copy one setup configuration
to other computers of the same model. This allows for faster, more consistent configuration of
multiple computers.
Both procedures require a diskette drive or a supported USB flash media device, such as an HP
✎
Drive Key.
Keyboard
LED ActivityState/Message
present, is bad, or drive not ready.
Keyboard locked in network mode.
sequence,
one-at-a-time—
N, C, SL
power off, then on to reboot.
Copying to Single Computer
CAUTION: A setup configuration is model-specific. File system corruption may result if source and
Ä
target computers are not the same model. For example, do not copy the setup configuration from a
dc7100 Ultra-Slim Desktop to a dx6100 Slim Tower.
1. Select a setup configuration to copy. Turn off the computer. If you are in Windows, click
> Shut Down > Shut Down.
Start
2. If you are using a USB flash media device, insert it now.
3. Turn on the computer.
4. As soon as the computer is turned on, press and hold the F10 key until you enter Computer
Setup. Press
If you do not press the F10 key at the appropriate time, you must restart the computer and press
✎
and hold the
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
5. If you are using a a diskette, insert it now.
3–6361293-003Service Reference Guide, dx6100
Enter to bypass the title screen, if necessary.
F10 key again to access the utility.
Desktop Management
6. Select File > Replicated Setup > Save to Removable Media. Follow the instructions on the
screen to create the configuration diskette or USB flash media device.
7. Turn off the computer to be configured and insert the configuration diskette or USB flash
media device.
8. Turn on the computer to be configured.
9. As soon as the computer is turned on, press and hold the F10 key until you enter Computer
Setup. Press
10. Select File> Replicated Setup > Restore from Removable Media, and follow the
instructions on the screen.
11. Restart the computer when the configuration is complete.
Enter to bypass the title screen, if necessary.
Copying to Multiple Computers
CAUTION: A setup configuration is model-specific. File system corruption may result if source and
Ä
target computers are not the same model. For example, do not copy the setup configuration from a
dc7100 Ultra-Slim Desktop to a dx6100 Slim Tower.
This method takes a little longer to prepare the configuration diskette or USB flash media device,
but copying the configuration to target computers is significantly faster.
A bootable diskette is required for this procedure or to create a bootable USB flash media device.
✎
If Windows XP is not available to use to create a bootable diskette, use the method for copying to
a single computer instead (see “Copying to Single Computer” on page 6).
1. Create a bootable diskette or USB flash media device. See “Supported USB Flash Media
Device” on page 8 or “Unsupported USB Flash Media Device” on page 10.
CAUTION: Not all computers can be booted from a USB flash media device. If the default boot order
Ä
in the Computer Setup (F10) Utility lists the USB device before the hard drive, the computer can be
booted from a USB flash media device. Otherwise, a bootable diskette must be used.
2. Select a setup configuration to copy. Turn off the computer. If you are in Windows, click
> Shut Down > Shut Down.
Start
3. If you are using a USB flash media device, insert it now.
4. Turn on the computer.
5. As soon as the computer is turned on, press and hold the F10 key until you enter Computer
Setup. Press
If you do not press the F10 key at the appropriate time, you must restart the computer and press
✎
and hold the
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
Enter to bypass the title screen, if necessary.
F10 key again to access the utility.
6. If you are using a a diskette, insert it now.
7. Select File > Replicated Setup > Save to Removable Media. Follow the instructions on the
screen to create the configuration diskette or USB flash media device.
Service Reference Guide, dx6100361293-0033–7
Desktop Management
8. Download a BIOS utility for replicating setup (repset.exe) and copy it onto the configuration
diskette or USB flash media device. To obtain this utility, go to
http://welcome.hp.com/support/files and enter the model number of the computer.
9. On the configuration diskette or USB flash media device, create an autoexec.bat file
containing the following command:
repset.exe
10. Turn off the computer to be configured. Insert the configuration diskette or USB flash media
device and turn the computer on. The configuration utility will run automatically.
11. Restart the computer when the configuration is complete.
Creating a Bootable Device
Supported USB Flash Media Device
Supported devices, such as an HP Drive Key or a Disk On Key, have a preinstalled image to
simplify the process of making them bootable. If the USB flash media device being used does
not have this image, use the procedure later in this section (see “Unsupported USB Flash Media
Device” on page 10).
CAUTION: Not all computers can be booted from a USB flash media device. If the default boot order
Ä
in the Computer Setup (F10) Utility lists the USB device before the hard drive, the computer can be
booted from a USB flash media device. Otherwise, a bootable diskette must be used.
To create a bootable USB flash media device, you must have:
■ One of the following systems:
❏ HP Compaq Business Desktop dc7100 series
❏ HP Compaq Business Desktop dx6100 series
❏ HP Compaq Business Desktop d530 Series - Ultra-Slim Desktop, Small Form Factor, or
Convertible Minitower
❏ Compaq Evo D510 Ultra-slim Desktop
❏ Compaq Evo D510 Convertible Minitower/Small Form Factor
Depending on the individual BIOS, future systems may also support booting to a USB flash
media device.
CAUTION: If you are using a computer other than one named above, make sure the default boot order
Ä
in the Computer Setup (F10) Utility lists the USB device before the hard drive.
■ One of the following storage modules:
❏ 16MB HP Drive Key
❏ 32MB HP Drive Key
❏ 32MB Disk On Key
❏ 64MB HP Drive Key
❏ 64MB Disk On Key
❏ 128MB HP Drive Key
❏ 128MB Disk On Key
3–8361293-003Service Reference Guide, dx6100
Desktop Management
❏ 256MB HP Drive Key
❏ 256MB Disk On Key
■ A bootable DOS diskette with the FDISK and SYS programs. If SYS is not available,
FORMAT may be used, but all existing files on the USB flash media device will be lost.
1. Turn off the computer.
2. Insert the USB flash media device into one of the computer’s USB ports and remove all other
USB storage devices except USB diskette drives.
3. Insert a bootable DOS diskette with FDISK.COM and either SYS.COM or FORMAT.COM
into a diskette drive and turn on the computer to boot to the DOS diskette.
4. Run FDISK from the A:\ prompt by typing FDISK and pressing Enter. If prompted, click
Yes ( Y ) to enable large disk support.
5. Enter Choice [5] to display the drives in the system. The USB flash media device will be the
drive that closely matches the size of one of the drives listed. It will usually be the last drive
in the list. Note the letter of the drive.
USB flash media device drive: __________
CAUTION: If a drive does not match the USB flash media device, do not proceed. Data loss can
Ä
occur. Check all USB ports for additional storage devices. If any are found, remove them, reboot the
computer, and proceed from step 4. If none are found, either the system does not support the USB flash
media device or the USB flash media device is defective. DO NOT proceed in attempting to make the
USB flash media device bootable.
6. Exit FDISK by pressing the Esc key to return to the A:\ prompt.
7. If your bootable DOS diskette contains SYS.COM, go to step 8. Otherwise, go to step 9.
8. At the A:\ prompt, type SYS x: where x represents the drive letter noted above.
CAUTION: Be sure that you have entered the correct drive letter for the USB flash media device.
Ä
After the system files have been transferred, SYS will return to the A:\ prompt. Go to
13.
step
9. Copy any files you want to keep from your USB flash media device to a temporary directory
on another drive (for example, the system’s internal hard drive).
10. At the A:\ prompt, enter FORMAT /S X: where X represents the drive letter noted before.
CAUTION: Be sure that you have entered the correct drive letter for the USB flash media device.
Ä
FORMAT will display one or more warnings and ask you each time whether you want to
proceed. Type
system files, and ask for a Volume Label.
11. Press Enter for no label or enter one if desired.
12. Copy any files you saved in step 9 back to your USB flash media device.
13. Remove the diskette and reboot the computer. The computer will boot to the USB flash
media device as drive C.
Y each time. FORMAT will format the USB flash media device, add the
Service Reference Guide, dx6100361293-0033–9
Desktop Management
The default boot order varies from computer to computer, and it can be changed in the Computer
✎
Setup (F10) Utility.
If you have used a DOS version from Windows 9x, you may see a brief Windows logo screen. If
you do not want this screen, add a zero-length file named LOGO.SYS to the root directory of the
USB flash media device.
Return to “Copying to Multiple Computers” on page 7.
Unsupported USB Flash Media Device
CAUTION: Not all computers can be booted from a USB flash media device. If the default boot order
Ä
in the Computer Setup (F10) Utility lists the USB device before the hard drive, the computer can be
booted from a USB flash media device. Otherwise, a bootable diskette must be used.
To create a bootable USB flash media device, you must have:
■ One of the following systems:
❏ HP Compaq Business Desktop dc7100 series
❏ HP Compaq Business Desktop dx6100 series
❏ HP Compaq Business Desktop d530 Series—Ultra-Slim Desktop, Small Form Factor, or
Convertible Minitower
❏ Compaq Evo D510 Ultra-Slim Desktop
❏ Compaq Evo D510 Convertible Minitower/Small Form Factor
Depending on the individual BIOS, future systems may also support booting to a USB flash
media device.
CAUTION: If you are using a computer other than one named above, make sure the default boot order
Ä
in the Computer Setup (F10) Utility lists the USB device before the hard drive.
■ A bootable DOS diskette with the FDISK and SYS programs. If SYS is not available,
FORMAT may be used, but all existing files on the USB flash media device will be lost.
1. If there are any PCI cards in the system that have SCSI, ATA RAID or SATA drives
attached, turn off the computer and unplug the power cord.
CAUTION: The power cord MUST be unplugged.
Ä
2. Open the computer and remove the PCI cards.
3. Insert the USB flash media device into one of the computer’s USB ports and remove all other
USB storage devices except USB diskette drives. Close the computer cover.
4. Plug in the power cord and turn on the computer.
3–10361293-003Service Reference Guide, dx6100
Desktop Management
5. As soon as the computer is turned on, press and hold the F10 key until you enter Computer
Setup. Press
If you do not press the F10 key at the appropriate time, you must restart the computer and press
✎
and hold the
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
6. Go to Advanced > PCI Devices to disable both the PATA and SATA controllers. When
disabling the SATA controller, note the IRQ to which the controller is assigned. You will
need to reassign the IRQ later. Exit setup, confirming the changes.
SATA IRQ: __________
7. Insert a bootable DOS diskette with FDISK.COM and either SYS.COM or FORMAT.COM
into a diskette drive and turn on the computer to boot to the DOS diskette.
8. Run FDISK and delete any existing partitions on the USB flash media device. Create a new
partition and mark it active. Exit FDISK by pressing the
9. If the system did not automatically restart when exiting FDISK, press Ctrl+Alt+Del to
reboot to the DOS diskette.
10. At the A:\ prompt, type FORMAT C: /S and press Enter. Format will format the USB flash
media device, add the system files, and ask for a Volume Label.
Enter to bypass the title screen, if necessary.
F10 key again to access the utility.
Esc key.
11. Press Enter for no label or enter one if desired.
12. Turn off the computer and unplug the power cord. Open the computer and re-install any PCI
cards that were previously removed. Close the computer cover.
13. Plug in the power cord, remove the diskette, and turn on the computer.
14. As soon as the computer is turned on, press and hold the F10 key until you enter Computer
Setup. Press
15. Go to Advanced > PCI Devices and re-enable the PATA and SATA controllers that were
disabled in step 6. Put the SATA controller on its original IRQ.
16. Save the changes and exit. The computer will boot to the USB flash media device as drive C.
The default boot order varies from computer to computer, and it can be changed in the Computer
✎
Setup (F10) Utility. Refer to the Computer Setup Guide on the Documentation CD for
instructions.
If you have used a DOS version from Windows 9x, you may see a brief Windows logo screen. If
you do not want this screen, add a zero-length file named LOGO.SYS to the root directory of the
USB flash media device.
Return to “Copying to Multiple Computers” on page 7.
Enter to bypass the title screen, if necessary.
Service Reference Guide, dx6100361293-0033–11
Desktop Management
3.3.11 Dual-State Power Button
With Advanced Configuration and Power Interface (ACPI) enabled, the power button can
function either as an on/off switch or as a suspend button. The suspend feature does not
completely turn off power, but instead causes the computer to enter a low-power standby. This
allows you to power down quickly without closing applications and to return quickly to the same
operational state without any data loss.
To change the power button’s configuration, complete the following steps:
1. Left click on the Start Button, then select Control Panel > Power Options.
2. In the Power Options Properties, select the Advanced tab.
3. In the Power Button section, select Stand by.
After configuring the power button to function as a suspend button, press the power button to put
the system in a very low power state (standby). Press the button again to bring the system out of
suspend to full power status quickly. To completely turn off all power to the system, press and
hold the power button for four seconds.
CAUTION: Do not use the power button to turn off the computer unless the system is not responding;
Ä
turning off the power without operating system interaction could cause damage to or loss of data on the
hard drive.
3.3.12 World Wide Web Site
When making the transition to new or revised operating systems, it is important to implement the
support software designed for that operating system. If you plan to run a version of Microsoft
Windows that is different from the version included with the computer, you must install
corresponding device drivers and utilities to ensure that all features are supported and
functioning properly.
HP has made the task of locating, accessing, evaluating, and installing the latest support software
easier. You can download the software from
the latest device drivers, utilities, and flashable ROM images needed to run the latest Microsoft
Windows operating system on the HP computer.
http://www.hp.com/support. The Web site contains
3.3.13 Building Blocks and Partners
HP management solutions integrate with other systems management applications, and are based
on industry standards, such as:
■ Web-Based Enterprise Management (WBEM)
■ Windows Management Interface (WMI)
■ Wake on LAN Technology
■ ACPI
■ SMBIOS
■ Pre-boot Execution (PXE) support
3–12361293-003Service Reference Guide, dx6100
3.4 Asset Tracking and Security
Asset tracking features incorporated into the computer provide key asset tracking data that can be
managed using HP Insight Manager, HP Client Manager or other system management
applications. Seamless, automatic integration between asset tracking features and these products
enables you to choose the management tool that is best suited to your environment and to
leverage your investment in existing tools.
HP also offers several solutions for controlling access to valuable components and information.
ProtectTools Embedded Security, if installed, p
system integrity and authenticates third-party users attempting system access. (Refer to HP ProtectTools Embedded Security Guide, on the Documentation CD for more information.)
Security features such as ProtectTools, the Smart Cover Sensor and the Smart Cover Lock,
available on select models, help to prevent unauthorized access to the internal components of the
personal computer. By disabling parallel, serial, or USB ports, or by disabling removable media
boot capability, you can protect valuable data assets. Memory Change and Smart Cover Sensor
alerts can be automatically forwarded to system management applications to deliver proactive
notification of tampering with a computer’s internal components.
ProtectTools, the Smart Cover Sensor, and the Smart Cover Lock are available as options on
✎
select systems.
revents unauthorizedaccess to data and checks
Desktop Management
Use the following utilities to manage security settings on your HP computer:
■ Locally, using the Computer Setup Utilities. See the Computer Setup (F10) Utility Guide
included with the computer for additional information and instructions on using the
Computer Setup Utilities.
■ Remotely, using HP Client Manager Software or System Software Manager. This software
enables the secure, consistent deployment and control of security settings from a simple
command-line utility.
Computer Setup Utilities (F10) Security Features
FeatureDescription
Setup PasswordAllows you to set and enable setup (administrator) password.
If the setup password is set, it is required to change
✎
Computer Setup options, flash the ROM, and make changes
to certain plug and play settings under Windows.
See the Troubleshooting Guide on the Documentation CD for
more information.
Power-On PasswordAllows you to set and enable power-on password.
See the Troubleshooting Guide on the Documentation CD for
more information.
Password Options
(This selection will appear
only if a power-on password
is set.)
Allows you to specify whether the password is required for
warm boot (CTRL+ALT+DEL).
See the Desktop Management Guide on the Documentation CD for more information.
For more information about Computer Setup, see the Computer Setup (F10) Utility Guide.
✎
Support for security features may vary depending on your specific computer configuration.
Service Reference Guide, dx6100361293-0033–13
Desktop Management
Computer Setup Utilities (F10) Security Features (Continued)
Pre-Boot AuthorizationAllows you to enable/disable the Smart Card to be used in
Smart CoverAllows you to:
Embedded SecurityAllows you to:
FeatureDescription
place of the Power-On Password.
• Enable/disable the Cover Lock.
• Enable/disable the Cover Removal Sensor.
Notify User alerts the user that the sensor has detected that
✎
the cover has been removed. Setup Password requires that
the setup password be entered to boot the computer if the
sensor detects that the cover has been removed.
This feature is supported on select models only. See the
Desktop Management Guide on the Documentation CD for
more information.
• Enable/disable the Embedded Security device.
• Reset the device to Factory Settings.
This feature is supported on select models only.
See HP ProtectTools Embedded Security Guide, on the Documentation CD for more information.
Device SecurityEnables/disables serial ports, parallel port, front USB ports,
system audio, network controllers (some models), MultiBay
devices (some models), and SCSI controllers (some models).
Network Service BootEnables/disables the computer’s ability to boot from an
operating system installed on a network server. (Feature
available on NIC models only; the network controller must
reside on the PCI bus or be embedded on the system board.)
System IDsAllows you to set:
• Asset tag (18-byte identifier) and ownership Tag (80-byte
identifier displayed during POST).
See the Desktop Management Guide on the
Documentation CD for more information.
• Chassis serial number or Universal Unique Identifier
(UUID) number. The UUID can only be updated if the
current chassis serial number is invalid. (These ID numbers
are normally set in the factory and are used to uniquely
identify the system.)
Keyboard locale setting (for example, English or German) for
System ID entry.
For more information about Computer Setup, see the Computer Setup (F10) Utility Guide.
✎
Support for security features may vary depending on your specific computer configuration.
3–14361293-003Service Reference Guide, dx6100
Desktop Management
Computer Setup Utilities (F10) Security Features (Continued)
FeatureDescription
DriveLockAllows you to assign or modify a master or user password for
MultiBay hard drives (not supported on SCSI hard drives).
When this feature is enabled, the user is prompted to provide
one of the DriveLock passwords during POST. If neither is
successfully entered, the hard drive will remain inaccessible
until one of the passwords is successfully provided during a
subsequent cold-boot sequence.
This selection will only appear when at least one MultiBay
✎
drive that supports the DriveLock feature is attached to the
system.
See the Desktop Management Guide on the Documentation CD for more information.
Master Boot Record SecurityAllows you to enable or disable Master Boot Record (MBR)
Security.
When enabled, the BIOS rejects all requests to write to the
MBR on the current bootable disk. Each time the computer is
powered on or rebooted, the BIOS compares the MBR of the
current bootable disk to the previously-saved MBR. If changes
are detected, you are given the option of saving the MBR on
the current bootable disk, restoring the previously-saved MBR,
or disabling MBR Security. You must know the setup
password, if one is set.
Disable MBR Security before intentionally changing the
✎
formatting or partitioning of the current bootable disk.
Several disk utilities (such as FDISK and FORMAT) attempt
to update the MBR.
If MBR Security is enabled and disk accesses are being
serviced by the BIOS, write requests to the MBR are
rejected, causing the utilities to report errors.
If MBR Security is enabled and disk accesses are being
serviced by the operating system, any MBR change will be
detected by the BIOS during the next reboot, and an MBR
Security warning message will be displayed.
For more information about Computer Setup, see the Computer Setup (F10) Utility Guide.
✎
Support for security features may vary depending on your specific computer configuration.
Service Reference Guide, dx6100361293-0033–15
Desktop Management
Computer Setup Utilities (F10) Security Features (Continued)
Save Master Boot RecordSaves a backup copy of the Master Boot Record of the current
Restore Master Boot RecordRestores the backup Master Boot Record to the current
FeatureDescription
bootable disk.
Only appears if MBR Security is enabled.
bootable disk.
Only appears if all of the following conditions are true:
✎
•MBR Security is enabled.
•A backup copy of the MBR has been previously saved.
•The current bootable disk is the same disk from which
the backup copy of the MBR was saved.
CAUTION: Restoring a previously saved MBR after a disk
Ä
utility or the operating system has modified the MBR may
cause the data on the disk to become inaccessible. Only
restore a previously saved MBR if you are confident that the
current bootable disk’s MBR has been corrupted or infected
with a virus.
For more information about Computer Setup, see the Computer Setup (F10) Utility Guide.
✎
Support for security features may vary depending on your specific computer configuration.
Mechanical Security Features
FeaturePurposeHow It Is Established
Memory Change AlertsDetects when memory
modules have been added,
moved, or removed; notifies
user and system administrator.
Cable Lock ProvisionInhibits access to the interior
of the computer to prevent
unwanted configuration
changes or component
removal. Can also be used to
secure the computer to a fixed
object to prevent theft.
Security Loop ProvisionInhibits access to the interior
of the computer to prevent
unwanted configuration
changes or component
removal.
For information on enabling
Memory Change Alerts,
refer to the online Desktop Management Guide on the
Documentation CD.
Install a cable lock to secure
the computer to a fixed
object.
Install a lock in the security
loop to prevent unwanted
configuration changes or
component removal.
3–16361293-003Service Reference Guide, dx6100
Desktop Management
3.4.1 Password Security
The power-on password prevents unauthorized use of the computer by requiring entry of a
password to access applications or data each time the computer is turned on or restarted. The
setup password specifically prevents unauthorized access to Computer Setup, and can also be
used as an override to the power-on password. That is, when prompted for the power-on
password, entering the setup password instead will allow access to the computer.
A network-wide setup password can be established to enable the system administrator to log in to
all network systems to perform maintenance without having to know the power-on password,
even if one has been established.
3.4.2 Establishing a Setup Password Using Computer Setup
If the system is equipped with an embedded security device, refer to HP ProtectTools Embedded
Security Guide, on the Documentation CD. Establishing a setup password through Computer
Setup prevents reconfiguration of the computer (use of the Computer Setup (F10) utility) until
the password is entered.
1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart.
2. As soon as the computer is turned on, press and hold the F10 key until you enter Computer
Setup. Press
Enter to bypass the title screen, if necessary.
If you do not press the F10 key at the appropriate time, you must restart the computer and press
✎
and hold the
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
3. Select Security, then select Setup Password and follow the instructions on the screen.
4. Before exiting, Select File > Save Changes and Exit.
F10 key again to access the utility.
3.4.3 Establishing a Power-On Password Using Computer Setup
Establishing a power-on password through Computer Setup prevents access to the computer
when power is turned on, unless the password is entered. When a power-on password is set,
Computer Setup presents Password Options under the Security menu. Password options include
Password Prompt on Warm Boot. When Password Prompt on Warm Boot is enabled, the
password must also be entered each time the computer is rebooted.
1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart.
2. As soon as the computer is turned on, press and hold the F10 key until you enter Computer
Setup. Press
If you do not press the F10 key at the appropriate time, you must restart the computer and press
✎
and hold the
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
Enter to bypass the title screen, if necessary.
F10 key again to access the utility.
3. Select Security, then Power-On Password and follow the instructions on the screen.
4. Before exiting, select File > Save Changes and Exit.
Service Reference Guide, dx6100361293-0033–17
Desktop Management
Entering a Power-On Password
To enter a power-on password, complete the following steps:
1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart.
2. When the key icon appears on the monitor, type your current password, then press Enter.
Type carefully; for security reasons, the characters you type do not appear on the screen.
✎
If you enter the password incorrectly, a broken key icon appears. Try again. After three
unsuccessful tries, you must turn off the computer, then turn it on again before you can continue.
Entering a Setup Password
If the system is equipped with an embedded security device, refer to HP ProtectTools Embedded
Security Guide, on the Documentation CD.
If a setup password has been established on the computer, you will be prompted to enter it each
time you run Computer Setup.
1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart.
2. As soon as the computer is turned on, press and hold the F10 key until you enter Computer
Setup. Press
Enter to bypass the title screen, if necessary.
If you do not press the F10 key at the appropriate time, you must restart the computer and press
✎
and hold the
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
3. When the key icon appears on the monitor, type the setup password, then press Enter.
Type carefully; for security reasons, the characters you type do not appear on the screen.
F10 key again to access the utility.
✎
If you enter the password incorrectly, a broken key icon appears. Try again. After three
unsuccessful tries, you must turn off the computer, then turn it on again before you can continue.
Changing a Power-On or Setup Password
If the system is equipped with an embedded security device, refer to HP ProtectTools Embedded
Security Guide, on the Documentation CD.
1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart
the Computer.
2. To change the Power-On password, go to step 3.
To change the Setup password, as soon as the computer is turned on, press and hold the F10
key until you enter Computer Setup. Press
If you do not press the F10 key at the appropriate time, you must restart the computer and press
✎
and hold the
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
F10 key again to access the utility.
Enter to bypass the title screen, if necessary.
3–18361293-003Service Reference Guide, dx6100
Desktop Management
3. When the key icon appears, type the current password, a slash (/) or alternate delimiter
character, the new password, another slash (/) or alternate delimiter character, and the new
password again as
current password/new password/new password
Type carefully; for security reasons, the characters you type do not appear on the screen.
shown:
✎
4. Press Enter.
5. The new password takes effect the next time you turn on the computer.
Refer to “National Keyboard Delimiter Characters” for information about the alternate delimiter
✎
characters. The power-on password and setup password may also be changed using the Security
options in Computer Setup.
Deleting a Power-On or Setup Password
If the system is equipped with an embedded security device, refer to HP ProtectTools Embedded
Security Guide, on the Documentation CD.
1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart
the Computer.
2. To delete the Power-On password, go to step 3.
To delete the Setup password, as soon as the computer is turned on, press and hold the F10
key until you enter Computer Setup. Press
If you do not press the F10 key at the appropriate time, you must restart the computer and press
✎
and hold the
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
3. When the key icon appears, type the current password followed by a slash (/) or alternate
delimiter character as shown:
current password/
4. Press Enter.
Refer to “National Keyboard Delimiter Characters” on page 20 for information about the
✎
alternate delimiter characters. The power-on password and setup password may also be changed
using the Security options in Computer Setup.
F10 key again to access the utility.
Enter to bypass the title screen, if necessary.
Service Reference Guide, dx6100361293-0033–19
Desktop Management
National Keyboard Delimiter Characters
Each keyboard is designed to meet country-specific requirements. The syntax and keys that you
use for changing or deleting your password depend on the keyboard that came with your
computer.
Arabic/Greek-Russian/
Belgian=Hebrew.SlovakianBHCSY* -Hungarian-SpanishBrazilian/Italian-Swedish/Finnish/
Chinese/Japanese/SwissCzech-Korean/Taiwanese/
Danish-Latin American -Thai/
French!Norwegian-Turkish.
French CanadianéPolish-U.K. English/
German-Portuguese-U.S. English/
* For Bosnia-Herzegovina, Croatia, Slovenia, and Yugoslavia
National Keyboard Delimiter Characters
Clearing Passwords
If you forget the password, you cannot access the computer. Refer to the Troubleshooting Guide
on the Documentation CD for instructions on clearing passwords.
If the system is equiped with an embedded security device, refer to HP ProtectTools Embedded Security Guide, on the Documentation CD.
3.4.4 DriveLock
DriveLock is an industry-standard security feature that prevents unauthorized access to the data
on specific hard drives. DriveLock has been implemented as an extension to Computer Setup. It
is only available on certain systems and only when DriveLock-capable hard drives are detected.
DriveLock is intended for HP customers for whom data security is the paramount concern. For
such customers, the cost of the hard drive and the loss of the data stored on it is inconsequential
when compared with the damage that could result from unauthorized access to its contents. In
order to balance this level of security with the practical need to accommodate a forgotten
password, the HP implementation of DriveLock employs a two-password security scheme. One
password is intended to be set and used by a system administrator while the other is typically set
and used by the end-user. There is no “back-door” that you can use to unlock the drive if both
passwords are lost. Therefore, DriveLock is most safely used when the data contained on the
hard drive is replicated on a corporate information system or is regularly backed up.
In the event that both DriveLock passwords are lost, the hard drive is rendered unusable. For
users who do not fit the previously defined customer profile, this may be an unacceptable risk.
For users who do fit the customer profile, it may be a tolerable risk given the nature of the data
stored on the hard drive.
3–20361293-003Service Reference Guide, dx6100
Desktop Management
Using DriveLock
The DriveLock option appears under the Security menu in Computer Setup. The user is
presented with options to set the master password or to enable DriveLock. A user password must
be provided in order to enable DriveLock. Since the initial configuration of DriveLock is
typically performed by a system administrator, a master password should be set first. HP
encourages system administrators to set a master password whether they plan to enable
DriveLock or keep it disabled. This will give the administrator the ability to modify DriveLock
settings if the drive is locked in the future. Once the master password is set, the system
administrator may enable DriveLock or choose to keep it disabled.
If a locked hard drive is present, POST will require a password to unlock the device. If a
power-on password is set and it matches the device’s user password, POST will not prompt the
user to re-enter the password. Otherwise, the user will be prompted to enter a DriveLock
password. Either the master or the user password may be used. Users will have two attempts to
enter a correct password. If neither attempt succeeds, POST will continue but the drive will
remain inaccessible.
DriveLock Applications
The most practical use of the DriveLock security feature is in a corporate environment where a
system administrator provides users with multibay hard drives for use in some computers. The
system administrator would be responsible for configuring the multibay hard drive which would
involve, among other things, setting the DriveLock master password. In the event that the user
forgets the user password or the equipment is passed on to another employee, the master
password can always be used to reset the user password and regain access to the hard drive.
HP recommends that corporate system administrators who choose to enable DriveLock also
establish a corporate policy for setting and maintaining master passwords. This should be done to
prevent a situation where an employee intentionally or unintentionally sets both DriveLock
passwords before leaving the company. In such a scenario, the hard drive would be rendered
unusable and require replacement. Likewise, by not setting a master password, system
administrators may find themselves locked out of a hard drive and unable to perform routine
checks for unauthorized software, other asset control functions, and support.
For users with less stringent security requirements, HP does not recommend enabling
DriveLock. Users in this category include personal users or users who do not maintain sensitive
data on their hard drives as a common practice. For these users, the potential loss of a hard drive
resulting from forgetting both passwords is much greater than the value of the data DriveLock
has been designed to protect. Access to Computer Setup and DriveLock can be restricted through
the Setup password. By specifying a Setup password and not giving it to end users, system
administrators are able to restrict users from enabling DriveLock.
Service Reference Guide, dx6100361293-0033–21
Desktop Management
3.4.5 Smart Cover Sensor
Cover Removal Sensor, available on select models, is a combination of hardware and software
technology that can alert you when the computer cover or side panel has been removed. There
are three levels of protection, as described in the following table.
Smart Cover Sensor Protection Levels
LevelSettingDescription
Level 0DisabledSmart Cover Sensor is disabled (default).
Level 1Notify UserWhen the computer is restarted, the screen
Level 2Setup PasswordWhen the computer is restarted, the screen
These settings can be changed using Computer Setup. For more information about Computer
✎
Setup, see the Computer Setup (F10) Utility Guide.
displays a message indicating that the
computer cover or side panel has been
removed.
displays a message indicating that the
computer cover or side panel has been
removed. You must enter the setup
password to continue.
Setting the Smart Cover Sensor Protection Level
To set the Smart Cover Sensor protection level, complete the following steps:
1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart.
2. As soon as the computer is turned on, press and hold the F10 key until you enter Computer
Setup. Press
If you do not press the F10 key at the appropriate time, you must restart the computer and press
✎
and hold the
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
3. Select Security > Smart Cover > Cover Removal Sensor, and select the desired security
level.
4. Before exiting, select File > Save Changes and Exit.
Enter to bypass the title screen, if necessary.
F10 key again to access the utility.
Smart Cover Lock
The Smart Cover Lock is a software-controllable cover lock featured on select HP computers.
This lock prevents unauthorized access to the internal components. Computers ship with the
Smart Cover Lock in the unlocked position.
CAUTION: For maximum cover lock security, be sure to establish a setup password. The setup
Ä
password prevents unauthorized access to the Computer Setup utility.
The Smart Cover Lock is available as an option on select systems.
✎
3–22361293-003Service Reference Guide, dx6100
Desktop Management
Locking the Smart Cover Lock
To activate and lock the Smart Cover Lock, complete the following steps:
1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart.
2. As soon as the computer is turned on, press and hold the F10 key until you enter Computer
Setup. Press
If you do not press the F10 key at the appropriate time, you must restart the computer and press
✎
and hold the
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
4. Before exiting, select File > Save Changes and Exit.
F10 key again to access the utility.
Using the Smart Cover FailSafe Key
If you enable the Smart Cover Lock and cannot enter your password to disable the lock, you will
need a Smart Cover FailSafe Key to open the computer cover. You will need the key in any of
the following circumstances:
■ Power outage
■ Startup failure
■ PC component failure (such as processor or power supply)
■ Forgotten password
CAUTION: The Smart Cover FailSafe Key is a specialized tool available from HP. Be prepared; order
Ä
this key before you need one (Tamper-resistant wrench PN 166527-001 or tamper-resistant bits PN
166527-002).
To obtain the FailSafe Key, do any one of the following:
■ Contact an authorized HP reseller or service provider.
■ Call the appropriate number listed in the warranty.
For more information about using the Smart Cover FailSafe Key, consult the Hardware
Reference Guide.
Service Reference Guide, dx6100361293-0033–23
Desktop Management
3.4.6 Master Boot Record Security
The Master Boot Record (MBR) contains information needed to successfully boot from a disk
and to access the data stored on the disk. Master Boot Record Security may prevent unintentional
or malicious changes to the MBR, such as those caused by some computer viruses or by the
incorrect use of certain disk utilities. It also allows you to recover the “last known good” MBR,
should changes to the MBR be detected when the system is restarted.
To enable MBR Security, complete the following steps:
1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart.
2. As soon as the computer is turned on, press and hold the F10 key until you enter Computer
Setup. Press
If you do not press the F10 key at the appropriate time, you must restart the computer and press
✎
and hold the
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
3. Select Security > Master Boot Record Security > Enabled.
4. Select Security > Save Master Boot Record.
Enter to bypass the title screen, if necessary.
F10 key again to access the utility.
5. Before exiting, select File > Save Changes and Exit.
When MBR Security is enabled, the BIOS prevents any changes being made to the MBR of the
current bootable disk while in MS-DOS or Windows Safe Mode.
Most operating systems control access to the MBR of the current bootable disk; the BIOS cannot
✎
prevent changes that may occur while the operating system is running.
Each time the computer is turned on or restarted, the BIOS compares the MBR of the current
bootable disk to the previously saved MBR. If changes are detected and if the current bootable
disk is the same disk from which the MBR was previously saved, the following message is
displayed:
1999—Master Boot Record has changed.
Press any key to enter Setup to configure MBR Security.
Upon entering Computer Setup, you must
■ Save the MBR of the current bootable disk;
■ Restore the previously saved MBR; or
■ Disable the MBR Security feature.
You must know the setup password, if one exists.
If changes are detected and if the current bootable disk is not the same disk from which the MBR
was previously saved, the following message is displayed:
2000—Master Boot Record Hard Drive has changed.
Press any key to enter Setup to configure MBR Security.
Upon entering Computer Setup, you must
■ Save the MBR of the current bootable disk; or
■ Disable the MBR Security feature.
3–24361293-003Service Reference Guide, dx6100
Desktop Management
You must know the setup password, if one exists.
In the unlikely event that the previously saved MBR has been corrupted, the following message
is displayed:
1998—Master Boot Record has been lost.
Press any key to enter Setup to configure MBR Security.
Upon entering Computer Setup, you must
■ Save the MBR of the current bootable disk; or
■ Disable the MBR Security feature.
You must know the setup password, if one exists.
3.4.7 Before You Partition or Format the Current Bootable Disk
Ensure that MBR Security is disabled before you change partitioning or formatting of the current
bootable disk. Some disk utilities, such as FDISK and FORMAT, attempt to update the MBR. If
MBR Security is enabled when you change partitioning or formatting of the disk, you may
receive error messages from the disk utility or a warning from MBR Security the next time the
computer is turned on or restarted. To disable MBR Security, complete the following steps:
1. Turn on or restart the computer. If you are in Windows, click Start > Shut Down > Restart.
2. As soon as the computer is turned on, press and hold the F10 key until you enter Computer
Setup. Press
If you do not press the F10 key at the appropriate time, you must restart the computer and press
✎
and hold the
If you are using a PS/2 keyboard, you may see a Keyboard Error message—disregard it.
3. Select Security > Master Boot Record Security > Disabled.
4. Before exiting, select File > Save Changes and Exit.
Enter to bypass the title screen, if necessary.
F10 key again to access the utility.
3.4.8 Cable Lock Provision
The rear panel of the computer accommodates a cable lock so that the computer can be
physically secured to a work area.
For illustrated instructions, please see the Removal and Replacement Chapter for the specific
chassis.
3.4.9 Fingerprint Identification Technology
Eliminating the need to enter user passwords, HP Fingerprint Identification Technology tightens
network security, simplifies the login process, and reduces the costs associated with managing
corporate networks. Affordably priced, it is not just for high-tech, high-security organizations
anymore.
Support for Fingerprint Identification Technology varies by model.
✎
For more information, visit http://h18004.www1.hp.com/products/security.
Service Reference Guide, dx6100361293-0033–25
Desktop Management
3.5 Fault Notification and Recovery
Fault Notification and Recovery features combine innovative hardware and software technology
to prevent the loss of critical data and minimize unplanned downtime.
If the computer is connected to a network managed by HP Client Manager, the computer sends a
fault notice to the network management application. With HP Client Manager Software, you can
also remotely schedule diagnostics to automatically run on all managed PCs and create a
summary report of failed tests.
3.5.1 Drive Protection System
The Drive Protection System (DPS) is a diagnostic tool built into the hard drives installed in
select HP computers. DPS is designed to help diagnose problems that might result in
unwarranted hard drive replacement.
When HP computers are built, each installed hard drive is tested using DPS, and a permanent
record of key information is written onto the drive. Each time DPS is run, test results are written
to the hard drive. Your service provider can use this information to help diagnose conditions that
caused you to run the DPS software. Refer to the Troubleshooting Guide for instructions on
using DPS.
3.5.2 Surge-Tolerant Power Supply
An integrated surge-tolerant power supply provides greater reliability when the computer is hit
with an unpredictable power surge. This power supply is rated to withstand a power surge of up
to 2000 volts without incurring any system downtime or data loss.
3.5.3 Thermal Sensor
The thermal sensor is a hardware and software feature that tracks the internal temperature of the
computer. This feature displays a warning message when the normal range is exceeded, which
gives you time to take action before internal components are damaged or data is lost.
3–26361293-003Service Reference Guide, dx6100
Serial and Parallel ATA Drive Guidelines and Features
4
Serial and Parallel ATA Drive Guidelines and
Features
Serial ATA = SATA
✎
Parallel ATA = PATA
HP does not support the use of PATA (IDE) hard drives when SATA hard drives are installed on
the computer.
4.1 SATA and PATA Device Information
CharacteristicSATAPATA
Number of pins/conductors in data cable7/740/80
Number of pins in power cable154
Maximum data cable length39.37 in (100 cm)18 in (45.7 cm)
Data interface voltage differential600 mV5 V
Drive motor voltages3.3 V, 12 V5 V, 12 V
Jumpers for configuring driveN/ARequired
Data transfer rate150 MB/sup to 100 MB/s
SATA connectors on the system board are color coded to make identification easier.
SATA IdentificationColor
Primary channel, device 0Dark blue
Primary channel, device 1Light Blue
Secondary channel, device 0White
Secondary channel, device 1Orange
Service Reference Guide, dx6100361293-0034–1
Serial and Parallel ATA Drive Guidelines and Features
4.2 ATA Cables
4.2.1 SATA Data Cable
The SATA data cable is a thin, 7-pin cable designed to transmit data for only a single drive. As
shown in the table, each cable has 3 grounds, and 4 transmit/receive pins.
SATA data cables are susceptible to damage if overflexed. Never crease a SATA data cable and
never bend it tighter than a 30 mm (1.18 in) radius.
Pin NumberUsageDevice PlugHost Plug
P1GroundGroundGround
P2*A+Transmit dataReceive data
P3*A-Transmit dataReceive data
P4GroundGroundGround
P5**B-Receive dataTransmit data
P6**B+Receive dataTransmit data
P7GroundGroundGround
*P2 and P3 differential signal pair
**P5 and P6 differential signal pair
4.2.2 SATA Power Cable
PinUsageNotesPinUsageNotes
P1V3.33.3 V powerP9V55 V power
P2V3.33.3 V powerP10Ground
P3V3.33.3 V powerP11Reserved
P4GroundP12Ground
P5GroundP13V 1212 V power
P6GroundP14V1212 V power
P7V55 V powerP15V1212 V power
P8V55 V power
4–2361293-003Service Reference Guide, dx6100
4.2.3 PATA Data Cable
PinSignalPinSignalPinSignal
Serial and Parallel ATA Drive Guidelines and Features
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Reset
Ground
DD7
DD8
DD6
DD9
DD5
DD10
DD4
DD11
DD3
DD12
DD2
DD13
4.2.4 PATA Power Cable
PinUsage
1+12 V
2Ground
15
16
17
18
19
20
21
22
23
24
25
26
27
28
DD1
DD14
DD0
DD15
Ground
(Key)
DMARQ
Ground
DIOW
Ground
DIOR
Ground
IORDY
CSEL
29
30
31
32
33
34
35
36
37
38
39
40
DMAK
Ground
INTRQ
IOCS16
DA1
PDIAG (cable detect)
DA0
DA2
CS1FX
CS3FX
DASP
Ground
3Ground
4+5 V
Service Reference Guide, dx6100361293-0034–3
Serial and Parallel ATA Drive Guidelines and Features
4.2.5 PATA Cable Layout
The faces of industry-standard cable connectors are color-coded for easy recognition:
■ System board connector = blue face
■ Device 0 connector = black face
■ Device 1 connector = gray face
The color code of an industry-standard cable is applicable only if the drive’s jumper is in the
✎
cable-select position.
Single-Drive Cable
System
Board
Blue
Face
Device 0
Black
Face
Two-Drive Cable
System
Board
Blue
Face
On a two-drive cable, the Drive/Device 0 connector is always the farthest one from the system
board connector and the Drive/Device 1 connector is always the closest to the system board
connector.
Some cables may be labeled “Drive 0” instead of “Device 0” and “Drive 1” instead of
✎
“Device 1”.
Device 1
Gray
Face
Device 0
Black
Face
4.3 PATA Drive Installation Guidelines
Most computer system boards have two or fewer Parallel ATA (PATA) channels with a
dedicated connector for each channel. When two channels are present, one is designated as the
Primary and the other as the Secondary Channel.
Each of the two channels can have up to two devices attached to it. All drives are connected to a
channel using an industry-standard 80-conductor cable.
The industry standard 1.44 MB diskette drive has its own separate channel and is not included as
✎
a part of the maximum four drives.
4–4361293-003Service Reference Guide, dx6100
Each drive attached to a channel must have a drive designation. If a drive is attached to the
Device 0 cable position and its cable-select jumper is present, the drive is designated as Device
0. Similarly, if a drive is attached to the Device 1 cable position and its cable-select jumper is
present, the drive is designated as Device 1.
For optimal performance of a computer system, all drives need to be attached to the PATA
channel(s) in a specified sequence. This sequence is determined by the device class of the drives
and by specific attach sequence rules.
4.3.1 PATA Device Classes
In order to determine the best drive attach sequence, ATA/ATAPI drives are segregated into four
different classes based upon the bandwidth demands they place on an ATA channel. The most
demanding devices are in Class 1 and the least demanding are in Class 4.
Serial and Parallel ATA Drive Guidelines and Features
Class 1
Hard
Drives
ATA-100
ATA-66
ATA-33
Class 2
High Speed
Optical Drives
DVD
DVD-CD R/W
Class 3
Optical Storage
Drives
R/W CD-ROM
CD-ROM
Class 4
Magnetic
Storage Drives
LS-120
Tape
Zip
General Attach Guidelines
■ The lower the device class number, the faster the device and the more bandwidth required.
■ Drives installed in the Device 0 positions on both the primary and secondary channels
receive the greatest possible bandwidth.
■ The bootable ATA hard drive should always be installed on the primary channel in the
Device 0 position.
Service Reference Guide, dx6100361293-0034–5
Serial and Parallel ATA Drive Guidelines and Features
4.3.2 PATA Attach Sequence Rules by Class Priority
Drives should be attached in the sequence shown for optimum performance starting at
position 1.
4
3
Primary
1
2
41
Channel*
Secondary
32
Channel
Device 1Device 0
*If there are three or more devices, two or more of which are hard drives, two hard drives should
be attached to the primary channel first before following the General Attach Sequence Rule.
The attach sequence rule may also be stated in table format:
General Attach Sequence Rule*
SequenceDescription
1The lowest class drive—bootable hard drive recommended.
2If only two drives, the last drive goes here; otherwise the lowest class of the
remaining drives.
3If only three drives, attach the final drive here. If a fourth drive exists, attach the
lowest class drive here.
4If there is a fourth drive, attach the final drive here—the drive with the highest
class number of all devices.
*If there are three or more devices, two or more of which are hard drives, two hard drives
should be attached to the primary controller first before following the General Attach Sequence
Rule.
Cable lengths may restrict drive usage.
✎
The rules allow for:
■ Keeping the hard drive on a separate channel to maximize drive performance until a fourth
device is added.
■ Keeping the hard drives and removable media drives on separate channels to maximize
compatibility.
■ Keeping the hard drive and the writable optical drive on separate channels to maximize
optical drive reliability.
4–6361293-003Service Reference Guide, dx6100
Serial and Parallel ATA Drive Guidelines and Features
4.3.3 PATA Attach Sequence Worksheet
Use the worksheet below for obtaining optimum system performance when setting up a
computer with multiple drives. Use the General Attach Sequence Rule to determine the best
drive installation sequence.
Attach Sequence Worksheet
Device NameDevice Class
Two examples of how to use the worksheet are:
■ Three-device installation
■ Four-device installation
Position
Number
Channel
Name
Device
Number
Service Reference Guide, dx6100361293-0034–7
Serial and Parallel ATA Drive Guidelines and Features
Example 1: Three-Device Installation Sample
A system has three devices: Ultra ATA-100 hard drive, CD-ROM drive, and a DVD drive. Using
the Device Class Table in Section 4.3.1, the devices may be identified as:
Serial and Parallel ATA Drive Guidelines and Features
Example 2: Four-Device Installation Sample
A system has four devices: two Ultra ATA-100 hard drives, one DVD-CDR/W drive, and a
ZIP-250 drive. Using the Device Class Table in Section 4.3.1, the devices may be reidentified as:
*If there are three or more devices, two or more of which are hard drives, two hard drives should
be attached to the primary channel first before following the General Attach Sequence Rule.
4
3
Primary
1
2
41
Channel*
Secondary
32
Channel
Device 1Device 0
Cable lengths may restrict drive usage.
✎
4.3.4 PATA Additional Drive Application Notes
■ When replacing a hard drive, the replacement should be of the same type (Ultra ATA -33,
-66, or -100) as that being removed to retain the same level of performance.
■ When Ultra ATA and SCSI hard drives are mixed in the same system, the Ultra ATA drive
will become the boot drive unless the boot order is changed in Computer (F10) Setup.
Service Reference Guide, dx6100361293-0034–9
Serial and Parallel ATA Drive Guidelines and Features
4.4 ATA SMART Drives
The Self Monitoring Analysis and Recording Technology (SMART) ATA drives for the HP
Personal Computers have built-in drive failure prediction that warns the user or network
administrator of an impending failure or crash of the hard drive. The SMART drive tracks fault
prediction and failure indication parameters such as reallocated sector count, spin retry count,
and calibration retry count. If the drive determines that a failure is imminent, it generates a fault
alert.
4.5 Drive Capacities
The combination of the file system and the operating system used in the computer determines the
maximum usable size of a drive partition. A drive partition is the largest segment of a drive that
may be properly accessed by the operating system. A single hard drive may therefore be
subdivided into a number of unique drive partitions in order to make use of all of its space.
Because of the differences in the way that drive sizes are calculated, the size reported by the
operating system may differ from that marked on the hard drive or listed in the computer
specification. Drive size calculations by drive manufacturers are bytes to the base 10 while
calculations by Microsoft are bytes to the base 2.
Drive/Partition Capacity Limits
Maximum Size
File
System
FAT 32ATAWindows 2000/ XP32 GB128 PB
FAT 32SCSIWindows 2000/ XP32 GB2 TB
NTFSATAWindows NT/2000/XP2 TB128 PB
NTFSSCSIWindows NT/2000/XP2 TB2 TB
Controller
TypeOperating System
Partition Drive
4–10361293-003Service Reference Guide, dx6100
4.6 SATA BIOS
Windows 2000 and XPWindows 9x, NT, and Linux
Serial and Parallel ATA Drive Guidelines and Features
Enhanced Mode (default BIOS Setting)
—Separate IDE controller
•PATA Controller in Legacy Mode
- Device 0 is accessible as Device 0 of
PATA controller’s Primary Channel
- Device 1 is accessible as Device 1of
PATA controller’s Primary Channel
•SATA Controller in Native Mode
- SATA 0 is accessible as Device 0 of
SATA controller’s Primary Channel
- SATA 1 is accessible as Device 0 of
SATA controller’s Secondary Channel
SATA 2 is accessible as Device 1of
SATA controller’s Primary Channel
- SATA 3 is accessible as Device 1 of
SATA controller’s Secondary Channel
4.6.1 Legacy Mode
The Legacy mode is used to access devices attached to the embedded IDE controllers. Each
channel requires two fixed I/O address ranges and an IRQ for each.
■ Primary Channel
Compatibility Mode (non-default BIOS Setting)
—Combined IDE controller
•PATA Controller in Legacy Mode
- Device 0 is accessible as Device 0 of
the combined controller’s Secondary
Channel
- Device 1 is accessible as Device 1of the
combined controller’s Secondary
Channel
•SATA Controller in Legacy Mode
- SATA 0 is accessible as Device 0 of the
combined controller’s Primary Channel
- SATA 1 is inaccessible
- SATA 2 is accessible as device 1 of the
combined controller’s Primary Channel
- SATA 3 is inaccessible
❏ Command block: 1F0h - 1F7h
❏ Control block: 3F6h
❏ IRQ: 14
■ Secondary Channel
❏ Command block: 170h - 177h
❏ Control block: 376h
❏ IRQ: 15
4.6.2 Native Mode
The native mode is used to access devices attached to add-in cards and is not supported by many
legacy operating systems. Addresses are assigned by PCI Plug-n-Play BIOS and the IRQ is
shared with multiple controllers. Base Address Registers for the Command and Control Block
are found in the PCI Configuration Space.
■ Offset 10h—Primary Command base address
■ Offset 14h—Primary Control base address
■ Offset 18h—Secondary Command base address
■ Offset 1Ch—Secondary Control base address
Service Reference Guide, dx6100361293-0034–11
Serial and Parallel ATA Drive Guidelines and Features
4.7 Mixed Devices Boot and Drive Letter Ordering
HDD Boot and Drive
SATA Emulation*Hard Drive Order
Letter Ordering
Separate IDE Controller
(default). Used with Windows
2000 and XP.
Separate IDE Controller.
Used with Windows 2000
and XP.
Combined with IDE
Controller. Used with
Windows 9x, NT, and Linux.
Combined with IDE
Controller. Used with
Windows 9x, NT, and Linux.
A. Integrated SATA
B. Integrated IDE
A. Integrated IDE
B. Integrated SATA
A. Integrated SATA
B. Integrated IDE
A. Integrated IDE
B. Integrated SATA
A1. SATA 0
A2. SATA 2
A3. SATA 1
A4. SATA 3
B1. IDE Device 0
B2. IDE Device 1
A1. IDE Device 0
A2. IDE Device 1
B1. SATA 0
B2. SATA 2
B3. SATA 1
B4. SATA 3
A1. SATA 0
A2. SATA 2
B1. IDE Device 0
B2. IDE Device 1
A1. IDE Device 0
A2. IDE Device 1
B1. SATA 0
B2. SATA 2
*Refer to section 4.3.2 for PATA attach sequence rules.
4–12361293-003Service Reference Guide, dx6100
Identifying the Chassis, Routine Care, and Disassembly Preparation
Identifying the Chassis, Routine Care, and
Disassembly Preparation
This chapter provides general service information for the computer. Adherence to the procedures
and precautions described in this chapter is essential for proper service.
CAUTION: When the computer is plugged into an AC power source voltage is always applied to the
Ä
system board. You must disconnect the power cord from the power source before opening the computer
to prevent system board or component damage.
5.1 Chassis Designations
5
5.1.1 Microtower (MT)
Service Reference Guide, dx6100361293-0035–1
Identifying the Chassis, Routine Care, and Disassembly Preparation
5.1.2 Slim Tower (ST)
5.2 Electrostatic Discharge Information
A sudden discharge of static electricity from your finger or other conductor can destroy
static-sensitive devices or microcircuitry. Often the spark is neither felt nor heard, but damage
occurs. An electronic device exposed to electrostatic discharge (ESD) may not appear to be
affected at all and can work perfectly throughout a normal cycle. The device may function
normally for a while, but it has been degraded in the internal layers, reducing its life expectancy.
Networks built into many integrated circuits provide some protection, but in many cases, the
discharge contains enough power to alter device parameters or melt silicon junctions.
5.2.1 Generating Static
The following table shows that:
■ Different activities generate different amounts of static electricity.
5–2361293-003Service Reference Guide, dx6100
Identifying the Chassis, Routine Care, and Disassembly Preparation
■ Static electricity increases as humidity decreases.
Event55%40%10%
Relative Humidity
Walking across carpet
Walking across vinyl floor
Motions of bench worker
Removing DIPs* from plastic tube
Removing DIPs* from vinyl tray
Removing DIPs* from Styrofoam
Removing bubble pack from PCB
Packing PCBs in foam-lined box
*These are then multi-packaged inside plastic tubes, trays, or Styrofoam.
7, 5 0 0 V
3,000 V
400 V
400 V
2,000 V
3,500 V
7,000 V
5,000 V
15,000 V
5,000 V
800 V
700 V
4,000 V
5,000 V
20,000 V
11,000 V
700 volts can degrade a product.
✎
5.2.2 Preventing Electrostatic Damage to Equipment
Many electronic components are sensitive to ESD. Circuitry design and structure determine the
degree of sensitivity. The following packaging and grounding precautions are necessary to
prevent damage to electric components and accessories.
■ To avoid hand contact, transport products in static-safe containers such as tubes, bags, or
boxes.
■ Protect all electrostatic parts and assemblies with conductive or approved containers or
packaging.
35,000 V
12,000 V
6,000 V
2,000 V
11,500 V
14,500 V
26,500 V
21,000 V
■ Keep electrostatic sensitive parts in their containers until they arrive at static-free stations.
■ Place items on a grounded surface before removing them from their container.
■ Always be properly grounded when touching a sensitive component or assembly.
■ Avoid contact with pins, leads, or circuitry.
■ Place reusable electrostatic-sensitive parts from assemblies in protective packaging or
conductive foam.
5.2.3 Personal Grounding Methods and Equipment
Use the following equipment to prevent static electricity damage to equipment:
■ Wrist straps are flexible straps with a maximum of one-megohm ± 10% resistance in the
ground cords. To provide proper ground, a strap must be worn snug against bare skin. The
ground cord must be connected and fit snugly into the banana plug connector on the
grounding mat or workstation.
Service Reference Guide, dx6100361293-0035–3
Identifying the Chassis, Routine Care, and Disassembly Preparation
■ Heel straps/Toe straps/Boot straps can be used at standing workstations and are
compatible with most types of shoes or boots. On conductive floors or dissipative floor mats,
use them on both feet with a maximum of one-megohm ± 10% resistance between the
operator and ground.
Identifying the Chassis, Routine Care, and Disassembly Preparation
■ Conductive tote boxes
■ Opaque shielding bags
■ Transparent metallized shielding bags
■ Transparent shielding tubes
5.3 Operating Guidelines
To prevent overheating and to help prolong the life of the computer:
■ Keep the computer away from excessive moisture, direct sunlight, and extremes of heat and
cold.
■ Operate the computer on a sturdy, level surface. Leave a 10.2-cm (4-inch) clearance on all
vented sides of the computer and above the monitor to permit the required airflow.
■ Never restrict the airflow into the computer by blocking any vents or air intakes. Do not
place the keyboard, with the keyboard feet down, directly against the front of the desktop
unit as this also restricts airflow.
■ Occasionally clean the air vents on all vented sides of the computer. Lint, dust, and other
foreign matter can block the vents and limit the airflow.
■ Never operate the computer with the cover or side panel removed.
■ Do not stack computers on top of each other or place computers so near each other that they
are subject to each other’s re-circulated or preheated air.
■ If the computer is to be operated within a separate enclosure, intake and exhaust ventilation
must be provided on the enclosure, and the same operating guidelines listed above will still
apply.
■ The computer is designed to operate continuously (24x7), provided that the operating
guidelines listed above are met.
■ Install or enable power management functions of the operating system or other software,
including sleep states.
5.4 Routine Care
5.4.1 General Cleaning Safety Precautions
1. Never use solvents or flammable solutions to clean the computer.
2. Never immerse any parts in water or cleaning solutions; apply any liquids to a clean cloth
and then use the cloth on the component.
3. Always unplug the computer when cleaning with liquids or damp cloths.
4. Always unplug the computer before cleaning the keyboard, mouse, or air vents.
5. Disconnect the keyboard before cleaning it.
6. Wear safety glasses equipped with side shields when cleaning the keyboard.
Service Reference Guide, dx6100361293-0035–5
Identifying the Chassis, Routine Care, and Disassembly Preparation
5.4.2 Cleaning the Computer Case
Follow all safety precautions in Section 5.4.1 before cleaning the computer.
To clean the computer case, follow the procedures described below:
■ To remove light stains or dirt, use plain water with a clean, lint-free cloth or swab.
■ For stronger stains, use a mild dishwashing liquid diluted with water. Rinse well by wiping it
with a cloth or swab dampened with clear water.
■ For stubborn stains, use isopropyl (rubbing) alcohol. No rinsing is needed as the alcohol will
evaporate quickly and not leave a residue.
■ After cleaning, always wipe the unit with a clean, lint-free cloth.
■ Occasionally clean the air vents on the computer. Lint and other foreign matter can block the
vents and limit the airflow.
5.4.3 Cleaning the Keyboard
Follow all safety precautions in Section 5.4.1 before cleaning the keyboard.
To clean the tops of the keys or the keyboard body, follow the procedures described in Section
5.4.2.
When cleaning debris from under the keys, review all rules in Section 5.4.1 before following
these procedures:
CAUTION: Use safety glasses equipped with side shields before attempting to clean debris from under
Ä
the keys.
■ Visible debris underneath or between the keys may be removed by vacuuming or shaking.
■ Canned, pressurized air may be used to clean debris from under the keys. Caution should be
used as too much air pressure can dislodge lubricants applied under the wide keys.
■ If you remove a key, use a specially designed key puller to prevent damage to the keys. This
tool is available through many electronic supply outlets.
CAUTION: Never remove a wide leveled key (like the space bar) from the keyboard. If these keys are
Ä
improperly removed or installed, the keyboard may not function properly.
■ Cleaning under a key may be done with a swab moistened with isopropyl alcohol and
squeezed out. Be careful not to wipe away lubricants necessary for proper key functions. Use
tweezers to remove any fibers or dirt in confined areas. Allow the parts to air dry before
reassembly.
5.4.4 Cleaning the Monitor
■ Wipe the monitor screen with a clean cloth moistened with water or with a towelette
designed for cleaning monitors. Do not use sprays or aerosols directly on the screen; the
liquid may seep into the housing and damage a component. Never use solvents or flammable
liquids on the monitor.
■ To clean the monitor body follow the procedures in Section 5.4.2.
5–6361293-003Service Reference Guide, dx6100
Identifying the Chassis, Routine Care, and Disassembly Preparation
5.4.5 Cleaning the Mouse
Before cleaning the mouse, ensure that the power to the computer is turned off.
■ Clean the mouse ball by first removing the retaining plate and the ball from the housing. Pull
out any debris from the ball socket and wipe the ball with a clean, dry cloth before
reassembly.
■ To clean the mouse body, follow the procedures in Section 5.4.2.
5.5 Service Considerations
Listed below are some of the considerations that you should keep in mind during the disassembly
and assembly of the computer.
5.5.1 Power Supply Fan
The power supply fan is a variable-speed fan based on the temperature in the power supply.
CAUTION: The cooling fan is always on when the computer is in the “On” mode. The cooling fan is off
Ä
when the computer is in “Standby,” “Suspend,” or “Off” modes.
You must disconnect the power cord from the power source before opening the computer to prevent
system board or component damage.
5.5.2 Tools and Software Requirements
To service the computer, you need the following:
■ Torx T-15 screwdriver (Compaq screwdriver with bits, PN 161946-001)
■ Torx T-15 screwdriver with small diameter shank (for certain front bezel removal)
■ Flat-bladed screwdriver (may sometimes be used in place of the Torx screwdriver)
The screws used in the computer are not interchangeable. They may have standard or metric
threads and may be of different lengths. If an incorrect screw is used during the reassembly
process, it can damage the unit. HP strongly recommends that all screws removed during
disassembly be kept with the part that was removed, then returned to their proper locations.
Metric screws have a black finish.
✎
U.S. screws have a silver finish.
As each subassembly is removed from the computer, it should be placed away from the work
✎
area to prevent damage.
Service Reference Guide, dx6100361293-0035–7
Identifying the Chassis, Routine Care, and Disassembly Preparation
5.5.4 Cables and Connectors
Most cables used throughout the unit are flat, flexible cables. These cables must be handled with
care to avoid damage. Apply only the tension required to seat or unseat the cables during
insertion or removal from the connector. Handle cables by the connector whenever possible. In
all cases, avoid bending or twisting the cables, and ensure that the cables are routed in such a way
that they cannot be caught or snagged by parts being removed or replaced.
CAUTION: When servicing this computer, ensure that cables are placed in their proper location during
Ä
the reassembly process. Improper cable placement can damage the computer.
5.5.5 Hard Drives
Handle hard drives as delicate, precision components, avoiding all physical shock and vibration.
This applies to failed drives as well as replacement spares.
■ If a drive must be mailed, place the drive in a bubble-pack mailer or other suitable protective
packaging and label the package “Fragile: Handle With Care.”
■ Do not remove hard drives from the shipping package for storage. Keep hard drives in their
protective packaging until they are actually mounted in the CPU.
■ Avoid dropping drives from any height onto any surface.
■ If you are inserting or removing a hard drive, turn off the computer. Do not remove a hard
drive while the computer is on or in standby mode.
■ Before handling a drive, ensure that you are discharged of static electricity. While handling a
drive, avoid touching the connector. For more information about preventing electrostatic
damage, refer to Section
■ Do not use excessive force when inserting a drive.
■ Avoid exposing a hard drive to liquids, temperature extremes, or products that have
magnetic fields such as monitors or speakers.
5.2, “Electrostatic Discharge Information.”
5.5.6 Lithium Coin Cell Battery
The battery that comes with the computer provides power to the real-time clock and has a
minimum lifetime of about three years.
See the appropriate removal and replacement chapter for the chassis you are working on in this
guide for instructions on the replacement procedures.
WARNING: This computer contains a lithium battery. There is a risk of fire and chemical burn if the
Å
battery is handled improperly. Do not disassemble, crush, puncture, short external contacts, dispose in
water or fire, or expose it to temperatures higher than 140ºF (60ºC).
CAUTION: Batteries, battery packs, and accumulators should not be disposed of together with the
Ä
general household waste.
5–8361293-003Service Reference Guide, dx6100
Removal and Replacement Procedures—
Microtower (MT) Chassis
Adherence to the procedures and precautions described in this chapter is essential for proper
service. After completing all necessary removal and replacement procedures, run the Diagnostics
utility to verify that all components operate properly.
Not all features listed in this guide are available on all computers.
✎
6.1 Preparation for Disassembly
See Chapter 5, “Identifying the Chassis, Routine Care, and Disassembly Preparation,” for initial
procedures.
1. Remove/disengage any security devices that prohibit opening the computer (Section 6.2,
“External Security Devices,” Section 6.2.1, “Installing a Cable Lock,” and Section 6.2.2,
“Installing a Padlock”).
6
2. Close any open software applications.
3. Exit the operating system.
4. Remove any diskette or compact disc from the computer.
5. Turn off the computer and any peripheral devices that are connected to it.
CAUTION: Turn off the computer before disconnecting any cables.
Ä
CAUTION: Regardless of the power-on state, voltage is always present on the system board as long as
Ä
the system is plugged into an active AC outlet. In some systems the cooling fan is on even when the
computer is in the “Standby,” or “Suspend” modes. The power cord should always be disconnected
before servicing a unit.
6. Disconnect the power cord from the electrical outlet and then from the computer.
7. Disconnect all peripheral device cables from the computer.
During disassembly, label each cable as you remove it, noting its position and routing. Keep all
✎
screws with the units removed.
CAUTION: The screws used in the computer are of different thread sizes and lengths; using the wrong
Ä
screw in an application may damage the unit.
Service Reference Guide, dx6100361293-0026–1
Removal and Replacement Procedures— Microtower (MT) Chassis
6.2 External Security Devices
6.2.1 Installing a Cable Lock
The cable lock may be used to secure the computer access panel to the chassis and, at the same
time, secure the computer to a fixed object.
6–2361293-002Service Reference Guide, dx6100
6.2.2 Installing a Padlock
A padlock may be used by itself to secure the access panel to the computer chassis. A padlock
may also be used with a security cable to secure the computer to a fixed object.
I
Removal and Replacement Procedures— Microtower (MT) Chassis
Service Reference Guide, dx6100361293-0026–3
Removal and Replacement Procedures— Microtower (MT) Chassis
6.3 Access Panel
1. Prepare the computer for disassembly (Chapter 6, “Removal and Replacement Procedures—
Microtower (MT) Chassis”).
CAUTION: Before removing the computer access panel, ensure that the computer is turned off and that
Ä
the power cord is disconnected from the electrical outlet.
2. Loosen the captive thumbscrew 1 that secures the access panel to the computer chassis.
3. Slide the access panel 2 back about 1 inch (2.5 cm), then lift it off the unit.
You may want to lay the computer on its side to install internal parts. Be sure the side with the
✎
access panel and pull grip is facing up.
To install the access panel, reverse the removal procedure.
6–4361293-002Service Reference Guide, dx6100
6.4 Front Bezel
1. Prepare the computer for disassembly (Section 6.1, “Preparation for Disassembly”).
2. Remove the access panel (Section 6.3, “Access Panel”).
3. To remove the front bezel, press in on the two bottom tabs on the left side of the bezel 1 so
that they release from the chassis. Then press in on the upper tab on the left side of the bezel
2 so that it releases from the chassis. The bezel will rotate out slightly from left to right.
CAUTION: Do not over-rotate or try to pull the bezel off at this point, otherwise you may break the
Ä
remaining hooks on the inside of the bezel.
Removal and Replacement Procedures— Microtower (MT) Chassis
4. Press down on the upper right corner of the bezel to release the hook that secures the top of
the bezel to the chassis. Continue to rotate the bezel, then push the bezel to the left to release
the right side latches and rotate the bezel off the chassis from left to right.
Service Reference Guide, dx6100361293-0026–5
Removal and Replacement Procedures— Microtower (MT) Chassis
To reinstall the front bezel,
1. Position the chassis in the upright position.
2. Insert the hooks on the right side of the bezel 1 into the rectangular holes on the chassis then
rotate the bezel into place 2 so that the three tabs on the left side of the bezel and the single
tab on the upper right corner of the bezel snap into the slots on the chassis.
6–6361293-002Service Reference Guide, dx6100
6.5 Front Drive Bezels
1. Prepare the computer for disassembly (Section 6.1, “Preparation for Disassembly”).
2. Remove the access panel (Section 6.3, “Access Panel”).
3. Remove the front bezel (Section 6.4, “Front Bezel”).
6.5.1 5.25" Drive Bezel Blank
Press the two retaining tabs on the inside of the large bezel 1 towards the outside of the bezel to
release the bezel blank. At the same time, pull the bezel blank in 2 to remove it from the front
bezel.
Removal and Replacement Procedures— Microtower (MT) Chassis
To install a bezel blank, reverse the removal procedure.
Service Reference Guide, dx6100361293-0026–7
Removal and Replacement Procedures— Microtower (MT) Chassis
6.5.2 Diskette Drive Bezel
Press the two upper 1 or the two lower 2 tabs for the diskette drive bezel towards the center of
the drive bezel and push the bezel out to remove it from the front bezel.
To install a bezel or a bezel blank, reverse the removal procedure.
6.5.3 3.5" Drive Bezel Blank
Press the two upper 1 or the two lower 2 tabs for the 3.5" drive bezel towards the center of the
3.5" drive bezel and push the bezel blank out to remove it from the front bezel.
To install a bezel blank, reverse the removal procedure.
6–8361293-002Service Reference Guide, dx6100
6.6 Cable Management
Always follow good cable management practices when working inside the computer.
■ Keep cables away from major heat sources like the heatsink.
■ Do not jam cables on top of expansion cards or memory modules.Printed circuit cards like
these are not designed to take excessive pressure on them.
■ Keep cables clear of sliding or moveable parts to prevent their being cut or crimped when the
parts are moved.
■ When folding a flat ribbon cable, never fold to a sharp crease. Sharp creases may damage the
wires.
■ Some flat ribbon cables come prefolded. Never change the folds on these cables.
■ Do not bend any cable sharply. A sharp bend can break the internal wires.
■ Never bend a SATA data cable tighter than a 30 mm (1.18 in) radius.
■ Never crease a SATA data cable.
■ Do not rely on components like the drive cage, power supply, or computer cover to push
cables down into the chassis. Always position the cables to lay properly by themselves.
Removal and Replacement Procedures— Microtower (MT) Chassis
When removing the power supply power cables from the P1 or P3 connectors on the system
board, always follow these steps:
1. Squeeze on the top of the retaining latch attached to the cable end of the connector 1.
2. Grasp the cable end of the connector and pull it straight up 2.
CAUTION: Always pull the connector - NEVER pull on the cable. Pulling on the cable could damage the
Ä
cable and result in a failed power supply.
Service Reference Guide, dx6100361293-0026–9
Removal and Replacement Procedures— Microtower (MT) Chassis
6.7 Memory Modules
CAUTION: The memory module sockets have gold metal contacts. When upgrading the memory, it is
Ä
important to use memory modules with gold metal contacts to prevent corrosion and/or oxidation
resulting from having incompatible metals in contact with each other.
Static electricity can damage the electronic components of the computer or optional cards. Before
beginning these procedures, ensure that you are discharged of static electricity by briefly touching a
grounded metal object. Refer to Chapter
When handling a memory module, be careful not to touch any of the contacts. Doing so may damage
the module.
1. Prepare the computer for disassembly (Section 6.1, “Preparation for Disassembly”).
2. Remove the access panel and rotate the computer so the system board is parallel to the table
to make it easier to work on (
WARNING: To reduce risk of personal injury from hot surfaces, allow the internal system components
Å
to cool before touching.
3. Open both latches of the memory module socket 1, and insert the memory module into the
socket 2. Begin by installing a module into the socket nearest the preinstalled module, and
install the modules following the numerical order of the sockets.
5 for more information.
Section 6.3, “Access Panel”).
A memory module can be installed in only one way. Match the notch on the module with the tab
✎
on the memory socket.
It may be easier to install a memory module in some cases if the main power cable from the
power supply to the system board is temporarily disconnected.
4. Push the module down into the socket, ensuring that the module is fully inserted and
properly seated. Make sure the latches are in the closed position 3.
5. Repeat steps 3 and 4 for any additional modules that you want to install.
To reassemble the computer, reverse the removal procedure.
6–10361293-002Service Reference Guide, dx6100
6.8 Expansion Cards
6.8.1 Expansion Slot Cover
1. Prepare the computer for disassembly (Section 6.1, “Preparation for Disassembly”).
2. Remove the access panel and rotate the computer so the system board is parallel to the table
to make it easier to work on (
3. On the rear of the computer, remove the retaining screw 1 then, slide the slot cover lock up
2 to access the expansion slot covers. There are two different slot cover locks used on this
computer chassis. Both are shown for reference purposes.
Section 6.3, “Access Panel”).
Removal and Replacement Procedures— Microtower (MT) Chassis
For instructions on standard PCI expansion cards, see Section 6.8.2, “Standard PCI Expansion
Card.” or 6.7.3, “PCI Express Expansion Card.”
Service Reference Guide, dx6100361293-0026–11
Removal and Replacement Procedures— Microtower (MT) Chassis
6.8.2 Standard PCI Expansion Card
For preliminary steps, see Section 6.8.1, “Expansion Slot Cover.”
If replacing a standard PCI expansion card, go to step 1.
If installing a standard PCI or a PCI Express expansion card for the first time in a computer,
skip to step 4.
If replacing a Express expansion card, skip to Section 6.8.3, “PCI Express Expansion Card”.
1. When removing a standard expansion card from a standard expansion socket, hold the card
at each end, and carefully rock it back and forth until the connectors pull free from the
socket.
2. Pull the expansion card straight up from the socket 1 then away from the inside of the
chassis 2 to maneuver the card out of the computer.
CAUTION: Be sure not to scrape the card against the other components.
Ä
CAUTION: After removing an expansion card, you must replace it with a new card or cover the open
Ä
slot (for example, with a metal slot cover or a piece of cardboard taped in place) for proper cooling of
internal components during operation.
3. Store the old card in anti-static packaging that contained the new card.
4. If you are installing a PCI expansion card for the first time in this computer you will need to
remove the correct expansion slot cover at this time.
6–12361293-002Service Reference Guide, dx6100
Removal and Replacement Procedures— Microtower (MT) Chassis
5. When installing an expansion card, hold the card just above the expansion slot on the system
board then move the card toward the rear of the chassis so that the bracket on the card is
aligned with the open slot on the rear of the chassis 1.
6. Press the card straight down into the expansion slot on the system board 2.
Press firmly on the card so that the whole connector seats properly in the expansion card slot.
✎
Service Reference Guide, dx6100361293-0026–13
Removal and Replacement Procedures— Microtower (MT) Chassis
7. Replace the slot cover lock using the appropriate procedure for your computer, as illustrated
below:
»Slide the slot cover lock down 1 toward the expansion card brackets and slot covers to
hold them in place, and then install the retaining screw 2 to secure the cover lock.
- or -
»Slide the slot cover lock down toward the expansion card brackets and slot covers to
secure them in place 1 and install the retaining screw 2.
6–14361293-002Service Reference Guide, dx6100
Removal and Replacement Procedures— Microtower (MT) Chassis
6.8.3 PCI Express Expansion Card
For preliminary steps, see Section 6.8.1, “Expansion Slot Cover.”
If replacing a standard PCI Expansion card go to Section 6.8.2, “Standard PCI Expansion
Card”.
If installing a PCI Express expansion card for the first time in a computer, skip to step 4.
1. Pull the retention arm on the back of the PCI Express expansion socket away from the card
(on x16 card socket only) and carefully rock the card back and forth until the connectors pull
free from the socket. Pull the expansion card straight up from the socket then away from the
inside of the chassis. Be sure not to scrape the card against the other components.
2. If you are not installing a new expansion card, install an expansion slot cover to close the
open slot.
Service Reference Guide, dx6100361293-0026–15
Removal and Replacement Procedures— Microtower (MT) Chassis
3. Replace the slot cover lock using the appropriate procedure for your computer, as illustrated
below:
»Slide the slot cover lock down 1 toward the expansion card brackets and slot covers to
hold them in place, and then install the retaining screw 2 to secure the cover lock.
- or -
»Slide the slot cover lock down toward the expansion card brackets and slot covers to
secure them in place 1 and install the retaining screw 2.
4. If installing a card for the first time, remove the expansion slot cover.
5. When installing an expansion card, hold the card just above the expansion slot on the system
board then move the card toward the rear of the chassis so that the bracket on the card is
aligned with the open slot on the rear of the chassis.
6. Press the card straight down into the expansion slot on the system board.
6–16361293-002Service Reference Guide, dx6100
Removal and Replacement Procedures— Microtower (MT) Chassis
Press firmly on the card so that the whole connector seats properly in the expansion card slot.
✎
7. Replace the slot cover lock using the appropriate procedure for your computer, as illustrated
below:
»Slide the slot cover lock down towards the expansion card brackets and slot covers 1 to
secure them in place, and then install the retaining screw 2.
- or -
»Slide the slot cover lock down toward the expansion card brackets and slot covers to
secure them in place 1 and install the retaining screw 2.
Service Reference Guide, dx6100361293-0026–17
Removal and Replacement Procedures— Microtower (MT) Chassis
6.9 Drives
The computer supports up to six drives that may be installed in various configurations.
This Section describes the procedure for replacing or upgrading the storage drives. A Torx T-15
screwdriver is needed to remove and install the guide screws on a drive.
CAUTION: Make sure personal files on the hard drive are backed up to an external storage device
Ä
before removing the hard drive. Failure to do so will result in data loss. After replacing the primary hard
drive, you will need to run the Restore CD to load the Compaq factory-installed files.
6.9.1 Drive Positions
Drive Positions
ItemDescription
1Two 5.25-inch, half-height bays for optional drives
2Two standard 3.5-inch, one-third height bays (1.44-MB diskette drive shown)*
3Two internal 3.5-inch, one-third height bays for hard drives
*A 3.5-inch diskette drive or zip drive may be installed in this bay but the correct bezel must be
installed to ensure proper air flow.
6–18361293-002Service Reference Guide, dx6100
6.9.2 Removing a Drive
1. Prepare the computer for disassembly (Section 6.1, “Preparation for Disassembly”).
2. Remove the access panel and rotate the computer so the system board is parallel to the table
to make it easier to work on (
3. Remove the front bezel (Section 6.4, “Front Bezel”).
4. Disconnect the power and data cables from the back of the drive, as shown in the following
illustrations.
Disconnecting Optical Drive Cables
Removal and Replacement Procedures— Microtower (MT) Chassis
Section 6.3, “Access Panel”).
Disconnecting Diskette Drive Cables
Service Reference Guide, dx6100361293-0026–19
Removal and Replacement Procedures— Microtower (MT) Chassis
Disconnecting Hard Drive Cables
Some products use straight cable connectors while others use right angle connectors.
✎
Releasing the Drives
5. A latch drive bracket with release tabs secures the drives in the drive bay. Lift the release tab
on the latch drive bracket 1 for the drive you want to remove, then slide the drive from its
drive bay
2.
6. Remove the four guide screws (two on each side) from the old drive. You will need these
screws to install a new drive.
6–20361293-002Service Reference Guide, dx6100
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.