Dell PowerEdge MX740c EMC PowerEdge MX740c Installation and Service Manual - Page 35

Creating a system and setup password, Policy Summary

Page 35 highlights

Option In-Band Manageability Interface Secure Boot Secure Boot Policy Secure Boot Mode Description variables are protected in the environment and new UEFI boot entries are forced to be at the end of the current boot order. When set to Disabled, this setting will hide the Management Engine's (ME), HECI devices, and the system's IPMI devices from the operating system. This prevents the operating system from changing the ME power capping settings, and blocks access to all in-band management tools. All management should be managed through out-of-band. This option is set to Enabled by default. NOTE: BIOS update requires HECI devices to be operational and DUP updates require IPMI interface to be operational. This setting needs to be set to Enabled to avoid updating errors. Enables Secure Boot, where the BIOS authenticates each pre-boot image by using the certificates in the Secure Boot Policy. Secure Boot is set to Disabled by default. When Secure Boot policy is set to Standard, the BIOS uses the system manufacturer's key and certificates to authenticate pre-boot images. When Secure Boot policy is set to Custom, the BIOS uses the user-defined key and certificates. Secure Boot policy is set to Standard by default. Configures how the BIOS uses the Secure Boot Policy Objects (PK, KEK, db, dbx). If the current mode is set to Deployed Mode, the available options are User Mode and Deployed Mode. If the current mode is set to User Mode, the available options are User Mode, Audit Mode, and Deployed Mode. Options User Mode Description In User Mode, PK must be installed, and BIOS performs signature verification on programmatic attempts to update policy objects. The BIOS allows unauthenticated programmatic transitions between modes. Deployed Mode Deployed Mode is the most secure mode. In Deployed Mode, PK must be installed and the BIOS performs signature verification on programmatic attempts to update policy objects. Deployed Mode restricts the programmatic mode transitions. Audit Mode In Audit mode, PK is not present. The BIOS does not authenticate programmatic updates to the policy objects, and transitions between modes. Audit Mode is useful for programmatically determining a working set of policy objects. BIOS performs signature verification on pre-boot images and logs results in the image Execution Information Table, but executes the images whether they pass or fail verification. Secure Boot Policy Summary Secure Boot Custom Policy Settings Specifies the list of certificates and hashes that secure boot uses to authenticate images. Configures the Secure Boot Custom Policy. To enable this option, set the Secure Boot Policy to Custom option. Creating a system and setup password Prerequisites Ensure that the password jumper is enabled. The password jumper enables or disables the system password and setup password features. For more information, see the System board jumper settings section. NOTE: If the password jumper setting is disabled, the existing system password and setup password are deleted and you need not provide the system password to boot the system. Steps 1. To enter System Setup, press F2 immediately after turning on or rebooting your system. Pre-operating system management applications 35

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135

Option
Description
variables are protected in the environment and new UEFI boot entries are forced to be at the end of the
current boot order.
In-Band
Manageability
Interface
When set to
Disabled
, this setting will hide the Management Engine's (ME), HECI devices, and the
system's IPMI devices from the operating system. This prevents the operating system from changing the
ME power capping settings, and blocks access to all in-band management tools. All management should
be managed through out-of-band. This option is set to
Enabled
by default.
NOTE:
BIOS update requires HECI devices to be operational and DUP updates require IPMI interface
to be operational. This setting needs to be set to
Enabled
to avoid updating errors.
Secure Boot
Enables Secure Boot, where the BIOS authenticates each pre-boot image by using the certificates in the
Secure Boot Policy. Secure Boot is set to
Disabled
by default.
Secure Boot
Policy
When Secure Boot policy is set to
Standard
, the BIOS uses the system manufacturer’s key and
certificates to authenticate pre-boot images. When Secure Boot policy is set to
Custom
, the BIOS uses
the user-defined key and certificates. Secure Boot policy is set to
Standard
by default.
Secure Boot
Mode
Configures how the BIOS uses the Secure Boot Policy Objects (PK, KEK, db, dbx).
If the current mode is set to
Deployed Mode
, the available options are
User Mode
and
Deployed Mode
.
If the current mode is set to
User Mode
, the available options are
User Mode
,
Audit Mode
, and
Deployed Mode
.
Options
Description
User Mode
In
User Mode
, PK must be installed, and BIOS performs signature verification on
programmatic attempts to update policy objects.
The BIOS allows unauthenticated programmatic transitions between modes.
Deployed Mode
Deployed Mode
is the most secure mode. In
Deployed Mode
, PK must be
installed and the BIOS performs signature verification on programmatic attempts to
update policy objects.
Deployed Mode
restricts the programmatic mode transitions.
Audit Mode
In
Audit mode
, PK is not present. The BIOS does not authenticate programmatic
updates to the policy objects, and transitions between modes.
Audit Mode
is useful for programmatically determining a working set of policy
objects.
BIOS performs signature verification on pre-boot images and logs results in the
image Execution Information Table, but executes the images whether they pass or
fail verification.
Secure Boot
Policy Summary
Specifies the list of certificates and hashes that secure boot uses to authenticate images.
Secure Boot
Custom Policy
Settings
Configures the Secure Boot Custom Policy. To enable this option, set the Secure Boot Policy to
Custom
option.
Creating a system and setup password
Prerequisites
Ensure that the password jumper is enabled. The password jumper enables or disables the system password and setup password
features. For more information, see the System board jumper settings section.
NOTE:
If the password jumper setting is disabled, the existing system password and setup password are deleted and you
need not provide the system password to boot the system.
Steps
1.
To enter System Setup, press F2 immediately after turning on or rebooting your system.
Pre-operating system management applications
35