Trusted Computing - ASROCK EPYCD8-2T User Manual

Server/workstation
Table of Contents

Advertisement

EPYCD8-2T / EPYCD8

3.3.11 Trusted Computing

NOTE: Options vary depending on the version of your connected TPM module.
TPM State
Use this item to enable or disable Security Device.
NOTE: Your computer will reboot during restart in order to change State of the Device.
Pending Operation
Schedule an Operation for the Security Device.
NOTE: Your computer will reboot during restart in order to change State of the Device.
Platform Hierarchy
Use this item to enable or disable Platform Hierarchy.
Storage Hierarchy
Use this item to enable or disable Storage Hierarchy.
Endorsement Hierarchy
Use this item to enable or disable Endorsement Hierarchy.
Hash Policy
Select the Hash policy to use. SHA-2 is most secure but might not be supported by all
Operating Systems.
55

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Epycd8

Table of Contents