Dell PowerEdge R540 EMC Installation and Service Manual - Page 60
Option, Description, Secure Boot Mode
![]() |
View all Dell PowerEdge R540 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 60 highlights
Option Description When TPM 2.0 is installed, TPM 2 Algorithm option is available. It enables you to select a hash algorithm from those supported by the TPM (SHA1, SHA256). TPM 2 Algorithm option must be set to SHA256, to enable TXT. Power Button Enables you to set the power button on the front of the system. This option is set to Enabled by default. AC Power Recovery Sets how the system behaves after AC power is restored to the system. This option is set to Last by default. AC Power Recovery Delay Enables you to set the time that the system should take to turn on after AC power is restored to the system. This option is set to Immediate by default. User Defined Enables you to set the User Defined Delay option when the User Defined option for AC Power Recovery Delay (60 s to 600 Delay is selected. s) UEFI Variable Access Provides varying degrees of securing UEFI variables. When set to Standard (the default), UEFI variables are accessible in the operating system per the UEFI specification. When set to Controlled, selected UEFI variables are protected in the environment, and new UEFI boot entries are forced to be at the end of the current boot order. In-Band Manageability Interface When set to Disabled, this setting hides the Management Engine's (ME), HECI devices, and the system's IPMI devices from the operating system. This prevents the operating system from changing the ME power capping settings, and blocks access to all in-band management tools. All management should be managed through out-ofband. This option is set to Enabled by default. NOTE: BIOS update requires HECI devices to be operational and DUP updates require IPMI interface to be operational. This setting needs to be set to Enabled to avoid updating errors. Secure Boot Enables Secure Boot, where the BIOS authenticates each pre-boot image by using the certificates in the Secure Boot Policy. Secure Boot is set to Disabled by default. Secure Boot Policy When Secure Boot policy is set to Standard, the BIOS uses the system manufacturer key and certificates to authenticate pre-boot images. When Secure Boot policy is set to Custom, the BIOS uses the user-defined key and certificates. Secure Boot policy is set to Standard by default. Secure Boot Mode Enables you to configure how the BIOS uses the Secure Boot Policy Objects (PK, KEK, db, dbx). If the current mode is set to Deployed Mode, the available options are User Mode and Deployed Mode. If the current mode is set to User Mode, the available options are User Mode, Audit Mode, and Deployed Mode. Options User Mode Description In User Mode, PK must be installed, and BIOS performs signature verification on programmatic attempts to update policy objects. BIOS allows unauthenticated programmatic transitions between modes. Audit Mode In Audit mode, PK is not present. BIOS does not authenticate programmatic updates to the policy objects, and transitions between modes. Audit Mode is useful for programmatically determining a working set of policy objects. BIOS performs signature verification on pre-boot images. BIOS also logs the results in the image Execution Information Table, but approves the images whether they pass or fail verification. Deployed Mode Deployed Mode is the most secure mode. In Deployed Mode, PK must be installed and the BIOS performs signature verification on programmatic attempts to update policy objects. Deployed Mode restricts the programmatic mode transitions. Secure Boot Policy Summary Secure Boot Custom Policy Settings Specifies the list of certificates and hashes that secure boot uses to authenticate images. Configures the Secure Boot Custom Policy. To enable this option, set the Secure Boot Policy to Custom. 60 Pre-operating system management applications
![](/manual_guide/products/dell-poweredge-r540-emc-installation-service-manual-665d651/60.png)