Trusted Computing; Pending Operation - ASROCK EP2C612D16SM User Manual

Table of Contents

Advertisement

EP2C612D16SM / EP2C612D16SM-2T

3.3.5 Trusted Computing

NOTE: Options vary depending on the version of your connected TPM module. Here is an example of TPM2.0.
TPM State
Use this item to enable or disable Security Device.
NOTE: Your computer will reboot during restart in order to change State of the Device.

Pending Operation

Schedule an Operation for the Security Device.
NOTE: Your computer will reboot during restart in order to change State of the Device.
Platform Hierarchy
Use this item to enable or disable Platform Hierarchy.
Storage Hierarchy
Use this item to enable or disable Storage Hierarchy.
Endorsement Hierarchy
Use this item to enable or disable Endorsement Hierarchy.
Hash Policy
Select the Hash policy to use. SHA-2 is most secure but might not be supported by all
Operating Systems.
47

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ep2c612d16sm-2t

Table of Contents