Pci*/Pci Express Auto Configuration; Bios Security Passwords; Trusted Platform Module (Tpm) Support - Intel DH61SA Product Manual

English product guide
Hide thumbs Also See for DH61SA:
Table of Contents

Advertisement

PCI*/PCI Express Auto Configuration

If you install a Conventional PCI or PCI Express add-in card in your computer, the
PCI/PCI Express auto-configuration utility in the BIOS automatically detects and
configures the resources (IRQs, DMA channels, and I/O space) for that add-in card.
You do not need to run the BIOS Setup program after you install a Conventional PCI or
PCI Express add-in card.

BIOS Security Passwords

The BIOS includes security features that restrict whether the BIOS Setup program can
be accessed and who can boot the computer. A supervisor password and a user
password can be set for the BIOS Setup and for booting the computer, with the
following restrictions:
The supervisor password gives unrestricted access to view and change all Setup
options. If only the supervisor password is set, pressing <Enter> at the password
prompt of Setup gives the user restricted access to Setup.
If both the supervisor and user passwords are set, you must enter either the
supervisor password or the user password to access Setup. Setup options are then
available for viewing and changing depending on whether the supervisor or user
password was entered.
Setting a user password restricts who can boot the computer. The password
prompt is displayed before the computer is booted. If only the supervisor
password is set, the computer boots without asking for a password. If both
passwords are set, you can enter either password to boot the computer.
For instructions on resetting the password, go to Clearing Passwords on page 50.

Trusted Platform Module (TPM) Support

Intel Desktop Board DH61SA provides a header to connect to an external TPM. The
header is shown in Figure 1, P on page 12 and the header pinout is listed in Table 8 on
page 43. TPMs are designed to enhance platform security by providing a protected
space for key operations and other security critical tasks. Using both hardware and
software, the TPM protects encryption and signature keys at their most vulnerable
stages—operations when the keys are being used unencrypted in plain-text form.
TPMs shield unencrypted keys and platform authentication information from software-
based attacks.
Desktop Board Features
19

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents