Table 37. System Security details (continued)
Option
Description
Secure Boot Mode
Configures how the BIOS uses the Secure Boot Policy Objects (PK, KEK, db, dbx).
If the current mode is set to
Deployed Mode
, the available options are
User Mode
and
Deployed Mode
. If the current mode is set to
User Mode
, the available options are
User
Mode
,
Audit Mode
, and
Deployed Mode
.
Table 38. Secure Boot Mode
Options
Descriptions
User Mode
In
User Mode
, PK must be installed, and BIOS performs signature
verification on programmatic attempts to update policy objects.
The BIOS allows unauthenticated programmatic transitions between modes.
Deployed
Mode
Deployed Mode
is the most secure mode. In
Deployed Mode
, PK must be
installed and the BIOS performs signature verification on programmatic
attempts to update policy objects.
Deployed Mode
restricts the programmatic mode transitions.
Audit Mode
In
Audit mode
, PK is not present. The BIOS does not authenticate
programmatic updates to the policy objects, and transitions between modes.
The BIOS performs a signature verification on pre-boot images and logs the
results in the image Execution Information Table, but starts the images
whether they pass or fail verification.
Audit Mode
is useful for programmatic determination of a working set of
policy objects.
Authorize Device Firmware
Specifies the status of the device firmware.
Secure Boot Policy Summary
Specifies the list of certificates and hashes that secure boot uses to authenticate images.
Table 39. Secure Boot Custom Policy Settings screen
Options
Descriptions
Platform
Key
Imports, exports, deletes, or restores the platform key (PK).
Key
Exchange
Key
Database
Enables you to import, export, delete, or restore entries in the Key Exchange
Key (KEK) Database.
Authorized
Signature
Database
Imports, exports, deletes, or restores entries in the Authorized Signature
Database (db).
Forbidden
Signature
Database
Imports, exports, deletes, or restores entries in the Forbidden Signature
Database (dbx).
Create passwords
Use this procedure to create a system password and a set-up password.
Prerequisites
Ensure that the password jumper is enabled. The password jumper enables or disables the system password and setup password features.
For more information, see the System board jumper settings section.
NOTE:
If the password jumper setting is disabled, the existing system password and setup password are deleted and
you need not provide the system password to boot the system.
Pre-operating system management applications
47