30
BIOS Setup option name
Type
[Default] / Select Value
Show
Help string
Security
Page
Yes
►
Key Management
Yes
Enables experienced users to modify Secure Boot
variables without full authentication.
Factory Key Provision
Select item
[Disabled] / Enabled
Depend
Provision factory default keys on next re-boot only
when System in Setup Mode
Line separator
Depend
► Restore Factory Keys
Dialog
[Yes] / No
Depend
Force System to User Mode. Configure NVRAM to
contain OEM-defined factory default Secure Boot
keys.
► Reset To Setup Mode
Dialog
[Yes] / No
Depend
Delete NVRAM content of all UEFI Secure Boot
key databases.
► Export Secure Boot variables
Dialog
Drive: \Path
Depend
Copy NVRAM content of Secure Boot variables to
files in a root folder on a file system device
Line separator
Depend
Secure Boot variables | Size | Keys | Key Source
Information string
Depend
► Platform Key(PK)
Select item
[Details] / Export / Update / Delete
Depend
Enroll Factory Defaults or load keys from a file:
1.Public Key Certificate in:
a)EFI_SIGNATURE_LIST, b)EFI_CERT_X509 (DER
encoded), c)EFI_CERT_RSA2048 (bin),
d)EFI_CERT_SHA256,384,512 2.Authenticated
UEFI Variable 3. EFI PE/COFF Image(SHA256)
Key Source: Factory, External, Mixed
► Key Exchange Keys
Select item
[Details] / Export / Update / Append /
Delete
Depend
Enroll Factory Defaults or load keys from a file:
1.Public Key Certificate in:
a)EFI_SIGNATURE_LIST, b)EFI_CERT_X509 (DER
encoded), c)EFI_CERT_RSA2048 (bin),
d)EFI_CERT_SHA256,384,512 2.Authenticated
UEFI Variable 3. EFI PE/COFF Image(SHA256)
Key Source: Factory, External, Mixed
► Authorized Signatures
Select item
[Details] / Export / Update / Append /
Delete
Depend
Enroll Factory Defaults or load keys from a file:
1.Public Key Certificate in:
a)EFI_SIGNATURE_LIST, b)EFI_CERT_X509 (DER
encoded), c)EFI_CERT_RSA2048 (bin),
d)EFI_CERT_SHA256,384,512 2.Authenticated
UEFI Variable 3. EFI PE/COFF Image(SHA256)
Key Source: Factory, External, Mixed
► Forbidden Signatures
Select item
[Details] / Export / Update / Append /
Delete
Depend
Enroll Factory Defaults or load keys from a file:
1.Public Key Certificate in:
a)EFI_SIGNATURE_LIST, b)EFI_CERT_X509 (DER
encoded), c)EFI_CERT_RSA2048 (bin),
d)EFI_CERT_SHA256,384,512 2.Authenticated
UEFI Variable 3. EFI PE/COFF Image(SHA256)
Key Source: Factory, External, Mixed
► Authorized TimeStamps
Select item
[Details] / Export / Update / Append /
Delete
Depend
Enroll Factory Defaults or load keys from a file:
1.Public Key Certificate in:
a)EFI_SIGNATURE_LIST, b)EFI_CERT_X509 (DER
encoded), c)EFI_CERT_RSA2048 (bin),
d)EFI_CERT_SHA256,384,512 2.Authenticated
UEFI Variable 3. EFI PE/COFF Image(SHA256)
Key Source: Factory, External, Mixed
► OsRecovery Signatures
Select item
[Details] / Export / Update / Append /
Delete
Depend
Enroll Factory Defaults or load keys from a file:
1.Public Key Certificate in:
a)EFI_SIGNATURE_LIST, b)EFI_CERT_X509 (DER
encoded), c)EFI_CERT_RSA2048 (bin),
d)EFI_CERT_SHA256,384,512 2.Authenticated
UEFI Variable 3. EFI PE/COFF Image(SHA256)
Key Source: Factory, External, Mixed
►
BIOS Update
Yes
BIOS Update support
► Path for ROM Image
Dialog
Drive: \Path
Yes
Enter the path to the BIOS update option
Line separator
Yes
Notice :
Information string
Yes
ROM Image must in the root folder of storage
device.
File name must match with current BIOS project.
Summary of Contents for Cappucino
Page 1: ...MiTAC Rugged Tablet Cappuccino Product Guide Rev1 0 ...
Page 2: ...2 Revision History Revision 1 0 New Release ...
Page 6: ...6 ...
Page 10: ...10 Figure8 MiTAC Cappuccino Extension Cover Placement ...
Page 16: ...16 Table1 2 Capacitive Function Key Usage List ...
Page 17: ...17 Table1 3 Capacitive Function Key Usage List ...
Page 24: ...24 2 ADVANCED PAGE ...
Page 25: ...25 ...
Page 28: ...28 3 SECURITY ...
Page 31: ...31 4 BOOT ...