Dell PowerEdge R740xd2 EMC Installation and Service Manual - Page 38

Option, Description, Table 7. TPM Advanced Settings Details continued

Page 38 highlights

Option Description Table 7. TPM Advanced Settings Details (continued) Option Description Advanced Configuration and Power Interface (ACPI) provisioning operations. This option is set to Disabled by default. TPM2 Algorithm Selection Allows the user to change the cryptographic algorithms used in the Trusted Platform Module (TPM). The available options are dependent on the TPM firmware. To enable TPM2 Algorithm Selection, Intel(R) TXT technology must be disabled. Intel(R) TXT Enables or disables the Intel Trusted Execution Technology (TXT) option. To enable the Intel TXT option, virtualization technology and TPM Security must be enabled with Pre-boot measurements. This option is set to Off by default. When TPM 2.0 is installed, TPM 2 Algorithm option is available. It enables you to select a hash algorithm from those supported by the TPM (SHA1, SHA256). TPM 2 Algorithm option must be set to SHA256, to enable TXT. Power Button Enables or disables the power button on the front of the system. This option is set to Enabled by default. AC Power Recovery Sets how the system behaves after AC power is restored to the system. This option is set to Last by default. AC Power Recovery Delay Sets the time delay for the system to power up after AC power is restored to the system. This option is set to Immediate by default. User Defined Sets the User Defined Delay option when the User Defined option for AC Power Recovery Delay is selected. Delay (60 s to 600 s) UEFI Variable Access Provides varying degrees of securing UEFI variables. When set to Standard (the default), UEFI variables are accessible in the operating system per the UEFI specification. When set to Controlled, selected UEFI variables are protected in the environment and new UEFI boot entries are forced to be at the end of the current boot order. In-Band Manageability Interface When set to Disabled, this setting will hide the Management Engine's (ME), HECI devices, and the system's IPMI devices from the operating system. This prevents the operating system from changing the ME power capping settings, and blocks access to all in-band management tools. All management should be managed through out-ofband. This option is set to Enabled by default. NOTE: BIOS update requires HECI devices to be operational and DUP updates require IPMI interface to be operational. This setting needs to be set to Enabled to avoid updating errors. Secure Boot Enables Secure Boot, where the BIOS authenticates each pre-boot image by using the certificates in the Secure Boot Policy. Secure Boot is set to Disabled by default. Secure Boot Policy When Secure Boot policy is set to Standard, the BIOS uses the system manufacturer's key and certificates to authenticate pre-boot images. When Secure Boot policy is set to Custom, the BIOS uses the user-defined key and certificates. Secure Boot policy is set to Standard by default. Secure Boot Mode Configures how the BIOS uses the Secure Boot Policy Objects (PK, KEK, db, dbx). If the current mode is set to Deployed Mode, the available options are User Mode and Deployed Mode. If the current mode is set to User Mode, the available options are User Mode, Audit Mode, and Deployed Mode. Options User Mode Description In User Mode, PK must be installed, and BIOS performs signature verification on programmatic attempts to update policy objects. The BIOS allows unauthenticated programmatic transitions between modes. 38 Pre-operating system management applications

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182

Option
Description
Table 7. TPM Advanced Settings Details (continued)
Option
Description
Advanced Configuration and Power Interface
(ACPI) provisioning operations. This option is
set to
Disabled
by default.
TPM2 Algorithm Selection
Allows the user to change the cryptographic
algorithms used in the Trusted Platform
Module (TPM). The available options are
dependent on the TPM firmware. To enable
TPM2 Algorithm Selection
, Intel(R) TXT
technology must be disabled.
Intel(R) TXT
Enables or disables the Intel Trusted Execution Technology (TXT) option. To enable the
Intel TXT
option,
virtualization technology and TPM Security must be enabled with Pre-boot measurements. This option is set to
Off
by default.
When TPM 2.0 is installed,
TPM 2 Algorithm
option is available. It enables you to select a hash algorithm from
those supported by the TPM (SHA1, SHA256).
TPM 2 Algorithm
option must be set to
SHA256
, to enable TXT.
Power Button
Enables or disables the power button on the front of the system. This option is set to
Enabled
by default.
AC Power
Recovery
Sets how the system behaves after AC power is restored to the system. This option is set to
Last
by default.
AC Power
Recovery Delay
Sets the time delay for the system to power up after AC power is restored to the system. This option is set to
Immediate
by default.
User Defined
Delay (60 s to 600
s)
Sets the
User Defined Delay
option when the
User Defined
option for
AC Power Recovery Delay
is selected.
UEFI Variable
Access
Provides varying degrees of securing UEFI variables. When set to
Standard
(the default), UEFI variables are
accessible in the operating system per the UEFI specification. When set to
Controlled
, selected UEFI variables
are protected in the environment and new UEFI boot entries are forced to be at the end of the current boot
order.
In-Band
Manageability
Interface
When set to
Disabled
, this setting will hide the Management Engine's (ME), HECI devices, and the system's IPMI
devices from the operating system. This prevents the operating system from changing the ME power capping
settings, and blocks access to all in-band management tools. All management should be managed through out-of-
band. This option is set to
Enabled
by default.
NOTE:
BIOS update requires HECI devices to be operational and DUP updates require IPMI
interface to be operational. This setting needs to be set to Enabled to avoid updating errors.
Secure Boot
Enables Secure Boot, where the BIOS authenticates each pre-boot image by using the certificates in the Secure
Boot Policy. Secure Boot is set to
Disabled
by default.
Secure Boot
Policy
When Secure Boot policy is set to
Standard
, the BIOS uses the system manufacturer’s key and certificates to
authenticate pre-boot images. When Secure Boot policy is set to
Custom
, the BIOS uses the user-defined key
and certificates. Secure Boot policy is set to
Standard
by default.
Secure Boot Mode
Configures how the BIOS uses the Secure Boot Policy Objects (PK, KEK, db, dbx).
If the current mode is set to
Deployed Mode
, the available options are
User Mode
and
Deployed Mode
. If the
current mode is set to
User Mode
, the available options are
User Mode
,
Audit Mode
, and
Deployed Mode
.
Options
Description
User Mode
In
User Mode
, PK must be installed, and BIOS performs signature verification on
programmatic attempts to update policy objects.
The BIOS allows unauthenticated programmatic transitions between modes.
38
Pre-operating system management applications