Dell PowerEdge R760 Installation and Service Manual - Page 70

Table 69. System Security details continued, User Defined Delay 120 s to 600

Page 70 highlights

Table 69. System Security details (continued) Option Description AC Power Recovery Sets how the system behaves after AC power is restored to the system. This option is set to Last by default. NOTE: The host system will not power on up until iDRAC Root of Trust (RoT) is completed, host power on will be delayed by minimum 90 seconds after the AC applied. AC Power Recovery Delay Sets the time delay for the system to power up after AC power is restored to the system. This option is set to Immediate by default. When this option is set to Immediate, there is no delay for power up. When this option is set to Random, the system creates a random delay for power up. When this option is set to User Defined, the system delay time is manually to power up. User Defined Delay (120 s to 600 Sets the User Defined Delay option when the User Defined option for AC Power s) Recovery Delay is selected. The actual AC recovery time needs to add iDRAC root of trust time (around 50 seconds). UEFI Variable Access Provides varying degrees of securing UEFI variables. When set to Standard (the default), UEFI variables are accessible in the operating system per the UEFI specification. When set to Controlled, selected UEFI variables are protected in the environment and new UEFI boot entries are forced to be at the end of the current boot order. In-Band Manageability Interface When set to Disabled , this setting hides the Management Engine's (ME), HECI devices, and the system's IPMI devices from the operating system. This prevents the operating system from changing the ME power capping settings, and blocks access to all inband management tools. All management should be managed through out-of-band. This option is set to Enabled by default. NOTE: BIOS update requires HECI devices to be operational and DUP updates require IPMI interface to be operational. This setting needs to be set to Enabled to avoid updating errors. SMM Security Migration Secure Boot Secure Boot Policy Secure Boot Mode Enables or disables the UEFI SMM security migration protections. It is set to Disabled by default. Enables Secure Boot, where the BIOS authenticates each pre-boot image by using the certificates in the Secure Boot Policy. Secure Boot is set to Disabled by default. When Secure Boot policy is set to Standard, the BIOS uses the system manufacturer's key and certificates to authenticate pre-boot images. When Secure Boot policy is set to Custom, the BIOS uses the user-defined key and certificates. Secure Boot policy is set to Standard by default. Configures how the BIOS uses the Secure Boot Policy Objects (PK, KEK, db, dbx). If the current mode is set to Deployed Mode, the available options are User Mode and Deployed Mode. If the current mode is set to User Mode, the available options are User Mode, Audit Mode, and Deployed Mode. Below are the details of different boot modes available in the Secure Boot Mode option. User Mode In User Mode, PK must be installed, and BIOS performs signature verification on programmatic attempts to update policy objects. The BIOS allows unauthenticated programmatic transitions between modes. Audit mode In Audit Mode, PK is not present. BIOS does not authenticate programmatic update to the policy objects and transitions between modes. The BIOS performs a signature verification on pre-boot images and logs the results in the image Execution Information Table, but executes the images whether they pass or fail verification. Audit Mode is useful for programmatic determination of a working set of policy objects. 70 Pre-operating system management applications

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332

Table 69. System Security details (continued)
Option
Description
AC Power Recovery
Sets how the system behaves after AC power is restored to the system. This option is
set to
Last
by default.
NOTE:
The host system will not power on up until iDRAC Root of Trust (RoT) is
completed, host power on will be delayed by minimum 90 seconds after the AC
applied.
AC Power Recovery Delay
Sets the time delay for the system to power up after AC power is restored to
the system. This option is set to
Immediate
by default. When this option is set to
Immediate
, there is no delay for power up. When this option is set to
Random
, the
system creates a random delay for power up. When this option is set to
User Defined
,
the system delay time is manually to power up.
User Defined Delay (120 s to 600
s)
Sets the
User Defined Delay
option when the
User Defined
option for
AC Power
Recovery Delay
is selected. The actual AC recovery time needs to add iDRAC root of
trust time (around 50 seconds).
UEFI Variable Access
Provides varying degrees of securing UEFI variables. When set to
Standard
(the
default), UEFI variables are accessible in the operating system per the UEFI
specification. When set to
Controlled
, selected UEFI variables are protected in the
environment and new UEFI boot entries are forced to be at the end of the current boot
order.
In-Band Manageability Interface
When set to
Disabled
, this setting hides the Management Engine's (ME), HECI devices,
and the system's IPMI devices from the operating system. This prevents the operating
system from changing the ME power capping settings, and blocks access to all in-
band management tools. All management should be managed through out-of-band. This
option is set to
Enabled
by default.
NOTE:
BIOS update requires HECI devices to be operational and DUP updates
require IPMI interface to be operational. This setting needs to be set to Enabled to
avoid updating errors.
SMM Security Migration
Enables or disables the UEFI SMM security migration protections. It is set to
Disabled
by default.
Secure Boot
Enables Secure Boot, where the BIOS authenticates each pre-boot image by using the
certificates in the Secure Boot Policy. Secure Boot is set to
Disabled
by default.
Secure Boot Policy
When Secure Boot policy is set to
Standard
, the BIOS uses the system manufacturer’s
key and certificates to authenticate pre-boot images. When Secure Boot policy is set to
Custom
, the BIOS uses the user-defined key and certificates. Secure Boot policy is set
to
Standard
by default.
Secure Boot Mode
Configures how the BIOS uses the Secure Boot Policy Objects (PK, KEK, db, dbx).
If the current mode is set to
Deployed Mode
, the available options are
User Mode
and
Deployed Mode
. If the current mode is set to
User Mode
, the available options are
User Mode
,
Audit Mode
, and
Deployed Mode
.
Below are the details of different boot modes available in the
Secure Boot Mode
option.
User Mode
In
User Mode
, PK must be installed, and BIOS performs
signature verification on programmatic attempts to update
policy objects. The BIOS allows unauthenticated programmatic
transitions between modes.
Audit mode
In
Audit Mode
, PK is not present. BIOS does not authenticate
programmatic update to the policy objects and transitions
between modes. The BIOS performs a signature verification on
pre-boot images and logs the results in the image Execution
Information Table, but executes the images whether they pass
or fail verification.
Audit Mode
is useful for programmatic
determination of a working set of policy objects.
70
Pre-operating system management applications