Secure Boot Mode; Secure Boot Custom Policy Settings Screen - Dell EMC XC Core XC6515 Installation And Service Manual

Table of Contents

Advertisement

Table 37. System Security details (continued)
Option

Secure Boot Mode

Authorize Device Firmware
Secure Boot Policy Summary
Create passwords
Use this procedure to create a system password and a set-up password.
Prerequisites
Ensure that the password jumper is enabled. The password jumper enables or disables the system password and setup password features.
For more information, see the System board jumper settings section.
NOTE:
If the password jumper setting is disabled, the existing system password and setup password are deleted and
you need not provide the system password to boot the system.
Description
Configures how the BIOS uses the Secure Boot Policy Objects (PK, KEK, db, dbx).
If the current mode is set to Deployed Mode, the available options are User Mode and
Deployed Mode. If the current mode is set to User Mode, the available options are User
Mode, Audit Mode, and Deployed Mode.
Table 38. Secure Boot Mode
Options
Descriptions
User Mode
In User Mode, PK must be installed, and BIOS performs signature
verification on programmatic attempts to update policy objects.
The BIOS allows unauthenticated programmatic transitions between modes.
Deployed
Deployed Mode is the most secure mode. In Deployed Mode, PK must be
Mode
installed and the BIOS performs signature verification on programmatic
attempts to update policy objects.
Deployed Mode restricts the programmatic mode transitions.
Audit Mode
In Audit mode, PK is not present. The BIOS does not authenticate
programmatic updates to the policy objects, and transitions between modes.
The BIOS performs a signature verification on pre-boot images and logs the
results in the image Execution Information Table, but starts the images
whether they pass or fail verification.
Audit Mode is useful for programmatic determination of a working set of
policy objects.
Specifies the status of the device firmware.
Specifies the list of certificates and hashes that secure boot uses to authenticate images.
Table 39. Secure Boot Custom Policy Settings screen
Options
Descriptions
Platform
Imports, exports, deletes, or restores the platform key (PK).
Key
Key
Enables you to import, export, delete, or restore entries in the Key Exchange
Exchange
Key (KEK) Database.
Key
Database
Authorized
Imports, exports, deletes, or restores entries in the Authorized Signature
Signature
Database (db).
Database
Forbidden
Imports, exports, deletes, or restores entries in the Forbidden Signature
Signature
Database (dbx).
Database
Pre-operating system management applications
47

Advertisement

Table of Contents
loading

Table of Contents