Dell EMC PowerEdge R6525 Installation And Service Manual page 34

Hide thumbs Also See for PowerEdge R6525:
Table of Contents

Advertisement

Table 31. TPM 2.0 security information
Option
Description
TPM Information
Changes the operational state of the TPM. This option is set to No Change by default.
TPM Firmware
Indicates the firmware version of the TPM.
TPM Hierarcy
Enables, disables, or clears the storage and endorsement hierarchies. When set to Enabled, the storage and
endorsement hierarchies can be used.
When set to Disabled, the storage and endorsement hierarchies cannot be used.
When set to Clear, the storage and endorsement hierarchies are cleared of any values, and then reset to
Enabled.
Table 32. System Security details
Option
Power Button
AC Power Recovery
AC Power Recovery Delay
User Defined Delay (60 s to 600 s)
UEFI Variable Access
Secure Boot
Secure Boot Policy
Secure Boot Mode
34
Pre-operating system management applications
Description
Enables or disables the power button on the front of the system. This option is set to Enabled
by default.
Sets how the system behaves after AC power is restored to the system. This option is set to
Last by default.
Sets the time delay for the system to power up after AC power is restored to the system. This
option is set to Immediate by default.
Sets the User Defined Delay option when the User Defined option for AC Power Recovery
Delay is selected.
Provides varying degrees of securing UEFI variables. When set to Standard (the default), UEFI
variables are accessible in the operating system per the UEFI specification. When set to
Controlled, selected UEFI variables are protected in the environment and new UEFI boot
entries are forced to be at the end of the current boot order.
Enables Secure Boot, where the BIOS authenticates each pre-boot image by using the
certificates in the Secure Boot Policy. Secure Boot is set to Disabled by default.
When Secure Boot policy is set to Standard, the BIOS uses the system manufacturer's key
and certificates to authenticate pre-boot images. When Secure Boot policy is set to Custom,
the BIOS uses the user-defined key and certificates. Secure Boot policy is set to Standard by
default.
Configures how the BIOS uses the Secure Boot Policy Objects (PK, KEK, db, dbx).
If the current mode is set to Deployed Mode, the available options are User Mode and
Deployed Mode. If the current mode is set to User Mode, the available options are User
Mode, Audit Mode, and Deployed Mode.
Table 33. Secure Boot Mode
Options
Descriptions
User Mode
In User Mode, PK must be installed, and BIOS performs signature
verification on programmatic attempts to update policy objects.
The BIOS allows unauthenticated programmatic transitions between modes.
Deployed
Deployed Mode is the most secure mode. In Deployed Mode, PK must be
Mode
installed and the BIOS performs signature verification on programmatic
attempts to update policy objects.
Deployed Mode restricts the programmatic mode transitions.
Audit Mode
In Audit mode, PK is not present. The BIOS does not authenticate
programmatic updates to the policy objects, and transitions between modes.
The BIOS performs a signature verification on pre-boot images and logs the
results in the image Execution Information Table, but executes the images
whether they pass or fail verification.

Advertisement

Table of Contents
loading

Table of Contents