Intel BLKDQ45CB Product Guide - Page 23

Security Passwords, Intel® Trusted Platform Module (Intel® TPM)

Page 23 highlights

Desktop Board Features Security Passwords The BIOS includes security features that restrict whether the BIOS Setup program can be accessed and who can boot the computer. A supervisor password and a user password can be set for the BIOS Setup and for booting the computer, with the following restrictions: • The supervisor password gives unrestricted access to view and change all Setup options. If only the supervisor password is set, pressing at the password prompt of Setup gives the user restricted access to Setup. • If both the supervisor and user passwords are set, you must enter either the supervisor password or the user password to access Setup. Setup options are then available for viewing and changing depending on whether the supervisor or user password was entered. • Setting a user password restricts who can boot the computer. The password prompt is displayed before the computer is booted. If only the supervisor password is set, the computer boots without asking for a password. If both passwords are set, you can enter either password to boot the computer. For instructions on resetting the password, see "Clearing or Changing Passwords" on page 54. Intel® Trusted Platform Module (Intel® TPM) The Intel® Trusted Platform Module (Intel® TPM) component is designed to enhance platform security above and beyond the capabilities of today's software by providing a protected space for key operations and other security critical tasks. Using both hardware and software, the TPM protects encryption and signature keys at their most vulnerable stages-operations when the keys are being used unencrypted in plain-text form. The TPM is specifically designed to shield unencrypted keys and platform authentication information from software-based attacks. NOTE The Intel TPM uses the onboard coin-cell battery (CR2032) to maintain its monotonic counters. One major function of the monotonic counters is for anti-replay protection of the internal Intel TPM data. If the battery is removed or exhausted, the Intel TPM data will be deleted in accordance with Trusted Computing Group guidelines. Please read the Intel TPM user guide and back-up Intel TPM keys and data before removing the battery. 23

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86

Desktop Board Features
23
Security Passwords
The BIOS includes security features that restrict whether the BIOS Setup program can
be accessed and who can boot the computer.
A supervisor password and a user
password can be set for the BIOS Setup and for booting the computer, with the
following restrictions:
The supervisor password gives unrestricted access to view and change all Setup
options.
If only the supervisor password is set, pressing <Enter> at the password
prompt of Setup gives the user restricted access to Setup.
If both the supervisor and user passwords are set, you must enter either the
supervisor password or the user password to access Setup.
Setup options are then
available for viewing and changing depending on whether the supervisor or user
password was entered.
Setting a user password restricts who can boot the computer.
The password
prompt is displayed before the computer is booted.
If only the supervisor
password is set, the computer boots without asking for a password.
If both
passwords are set, you can enter either password to boot the computer.
For instructions on resetting the password, see “Clearing or Changing Passwords” on
page 54.
Intel
®
Trusted Platform Module (Intel
®
TPM)
The Intel
®
Trusted Platform Module (Intel
®
TPM) component is designed to enhance
platform security above and beyond the capabilities of today’s software by providing a
protected space for key operations and other security critical tasks.
Using both
hardware and software, the TPM protects encryption and signature keys at their most
vulnerable stages—operations when the keys are being used unencrypted in plain-text
form.
The TPM is specifically designed to shield unencrypted keys and platform
authentication information from software-based attacks.
NOTE
The Intel TPM uses the onboard coin-cell battery (CR2032) to maintain its monotonic
counters.
One major function of the monotonic counters is for anti-replay protection
of the internal Intel TPM data.
If the battery is removed or exhausted, the Intel TPM
data will be deleted in accordance with Trusted Computing Group guidelines.
Please
read the Intel TPM user guide and back-up Intel TPM keys and data before removing
the battery.