EP2C612D16FM2
52
53
English
3.3.5 Trusted Computing
NOTE: Options vary depending on the version of your connected TPM module. Here is an example of TPM2.0.
TPM State
Use this item to enable or disable Security Device.
NOTE: Your computer will reboot during restart in order to change State of the Device.
Pending Operation
Schedule an Operation for the Security Device.
NOTE: Your computer will reboot during restart in order to change State of the Device.
Platform Hierarchy
Use this item to enable or disable Platform Hierarchy.
Storage Hierarchy
Use this item to enable or disable Storage Hierarchy.
Endorsement Hierarchy
Use this item to enable or disable Endorsement Hierarchy.
Hash Policy
Select the Hash policy to use. SHA-2 is most secure but might not be supported by all
Operating Systems.