Dell EMC PowerEdge R6525 Podręcznik referencyjny - Strona 18

Przeglądaj online lub pobierz pdf Podręcznik referencyjny dla Serwer Dell EMC PowerEdge R6525. Dell EMC PowerEdge R6525 22 stron.

Table 22. TPM 2.0 security information (continued)
Option
Description
When set to Disabled, the storage and endorsement hierarchies cannot be used.
When set to Clear, the storage and endorsement hierarchies are cleared of any values, and then reset
to Enabled.
TPM Advanced
Specifies TPM Advanced Settings details.
Settings
Table 23. System Security details
Option
AMD Dynamic Root of Trust
Measurement (DRTM)
Power Button
AC Power Recovery
AC Power Recovery Delay
User Defined Delay (60 s to 600
s)
UEFI Variable Access
Secure Boot
Secure Boot Policy
Secure Boot Mode
18
Pre-operating system management applications
Description
Enable/Disable AMD Dynamic Root of Trust Measurement (DRTM)
To enable AMD DRTM, below configurations must be enabled:
1. TPM2.0 must be enabled and the hash algorithm must be set to SHA256.
2. Transparent SME (TSME) must be enabled.
3. Direct Memory Access Protection must be enabled.
Enables or disables the power button on the front of the system. This option is set to
Enabled by default.
Sets how the system behaves after AC power is restored to the system. This option is
set to Last by default.
Sets the time delay for the system to power up after AC power is restored to the
system. This option is set to Immediate by default.
Sets the User Defined Delay option when the User Defined option for AC Power
Recovery Delay is selected.
Provides varying degrees of securing UEFI variables. When set to Standard (the
default), UEFI variables are accessible in the operating system per the UEFI
specification. When set to Controlled, selected UEFI variables are protected in the
environment and new UEFI boot entries are forced to be at the end of the current boot
order.
Enables Secure Boot, where the BIOS authenticates each pre-boot image by using the
certificates in the Secure Boot Policy. Secure Boot is set to Disabled by default.
When Secure Boot policy is set to Standard, the BIOS uses the system manufacturer's
key and certificates to authenticate pre-boot images. When Secure Boot policy is set to
Custom, the BIOS uses the user-defined key and certificates. Secure Boot policy is set
to Standard by default.
Configures how the BIOS uses the Secure Boot Policy Objects (PK, KEK, db, dbx).
If the current mode is set to Deployed Mode, the available options are User Mode and
Deployed Mode. If the current mode is set to User Mode, the available options are
User Mode, Audit Mode, and Deployed Mode.
Table 24. Secure Boot Mode
Options
Descriptions
User Mode
In User Mode, PK must be installed, and BIOS performs signature
verification on programmatic attempts to update policy objects.
The BIOS allows unauthenticated programmatic transitions between
modes.
Deployed
Deployed Mode is the most secure mode. In Deployed Mode, PK
Mode
must be installed and the BIOS performs signature verification on
programmatic attempts to update policy objects.
Deployed Mode restricts the programmatic mode transitions.