Trusted Computing - ASROCK FH-C612NM User Manual

Server/workstation
Table of Contents

Advertisement

3.3.5 Trusted Computing

NOTE: Options vary depending on the version of your connected TPM module. Here is an example of TPM2.0.
TPM State
Use this item to enable or disable Security Device.
NOTE: Your computer will reboot during restart in order to change State of the Device.
Pending Operation
Schedule an Operation for the Security Device.
NOTE: Your computer will reboot during restart in order to change State of the Device.
Platform Hierarchy
Use this item to enable or disable Platform Hierarchy.
Storage Hierarchy
Use this item to enable or disable Storage Hierarchy.
Endorsement Hierarchy
Use this item to enable or disable Endorsement Hierarchy.
Hash Policy
Select the Hash policy to use. SHA-2 is most secure but might not be supported by all
Operating Systems.
48

Advertisement

Table of Contents
loading

Table of Contents