Download Print this page

Options Description - Dell EMC PowerEdge R740 Installation And Service Manual

Hide thumbs Also See for PowerEdge R740:

Advertisement

Option
Description
Secure Boot Policy
When Secure Boot policy is set to Standard, the BIOS uses the system manufacturer key and certificates to
authenticate pre-boot images. When Secure Boot policy is set to Custom, the BIOS uses the user-defined key and
certificates. Secure Boot policy is set to Standard by default.
Secure Boot Mode
Enables you to configure how the BIOS uses the Secure Boot Policy Objects (PK, KEK, db, dbx).
If the current mode is set to Deployed Mode, the available options are User Mode and Deployed Mode. If the
current mode is set to User Mode, the available options are User Mode, Audit Mode, and Deployed Mode.
Options
User Mode
Audit Mode
Deployed Mode
Secure Boot Policy
Specifies the list of certificates and hashes that secure boot uses to authenticate images.
Summary
Secure Boot
Configures the Secure Boot Custom Policy. To enable this option, set the Secure Boot Policy to Custom.
Custom Policy
Settings
Creating a system and setup password
Prerequisite
Ensure that the password jumper is enabled. The password jumper enables or disables the system password and setup password features.
For more information, see the System board jumper settings section.
NOTE:
If the password jumper setting is disabled, the existing system password and setup password are deleted and you need
not provide the system password to boot the system.
Steps
1
To enter System Setup, press F2 immediately after turning on or rebooting your system.
2
On the System Setup Main Menu screen, click System BIOS > System Security.
3
On the System Security screen, verify that Password Status is set to Unlocked.
4
In the System Password field, type your system password, and press Enter or Tab.
A message prompts you to reenter the system password.
Description
In User Mode, PK must be installed, and BIOS performs signature verification on
programmatic attempts to update policy objects.
BIOS allows unauthenticated programmatic transitions between modes.
In Audit mode, PK is not present. BIOS does not authenticate programmatic updates to
the policy objects, and transitions between modes.
Audit Mode is useful for programmatically determining a working set of policy objects.
BIOS performs signature verification on pre-boot images and logs the results in the image
Execution Information Table, but approves the images whether they pass or fail
verification.
Deployed Mode is the most secure mode. In Deployed Mode, PK must be installed and
the BIOS performs signature verification on programmatic attempts to update policy
objects.
Deployed Mode restricts the programmatic mode transitions.
Pre-operating system management applications
63

Advertisement

loading