Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products

Dell APEX Cloud Platform MC-660 Hardware Requirements and Specifications

System security

In the BIOS, access System Security to view details.

Steps

  1. To view the System Security screen, power on the system and press F2.
  2. Click System Setup Main Menu, System BIOS, and then System Security.

    The following table describes the options available in the System Security details:

    Table 1. System Security detailsThis table describes the options available in the System Security details.
    Option Description
    CPU AES-NI Improves the speed of applications by performing encryption and decryption by using the Advanced Encryption Standard Instruction Set (AES-NI). By default, this option is set to Enabled.
    System Password Sets the system password. If the password jumper is not installed in the system, this option is read-only.
    Setup Password Sets the setup password. If the password jumper is not installed in the system, this option is read-only.
    Password Status Locks the system password. By Default, this option is set to Unlocked.
    TPM Information Indicates the type of Trusted Platform Module, if present.
    Intel TXT Use this option to set the Intel Trusted Execution Technology (TXT) function. Virtualization technology and TPM Security must be enabled with Preboot measurements to enable the Intel TXT option. By default, this option is set to Off. It is set On for Secure Launch (Firmware Protection) support on Windows 2022.
    Memory Encryption Enables or disables Intel Total Memory Encryption (TME) and Multitenant (Intel TME-MT). When the option is set to:
    • Disabled, the BIOS disables both TME and MK-TME technology.
    • Single Key, the BIOS enables the TME technology.
    • Multiple Keys, the BIOS enables the TME-MT technology.
    By default, this option is set to Disabled. This setting can be enabled only if the CPU Physical Address Limit is disabled.
    TME Encryption Bypass This option allows you to bypass the Intel Total Memory Encryption. By default, this option is set to Disabled.
    Intel SGX Enables you to set the Intel Software Guard Extension (SGX) option. To enable the Intel SGX option, the processor:
    • Must be SGX capable
    • Memory population must be compatible (minimum x8 identical DIMM1 to DIMM8 per CPU socket
    • Does not support persistent memory configuration
    • Memory operating mode must be set to Optimizer mode
    • Memory encryption must be enabled
    • Node interleaving must be disabled
    When this option is set to Off, BIOS disables the SGX technology. When this option is set to On, the BIOS enables the SGX technology. By default, this option is set to Off.
    Power Button Enables or disables the power button on the front of the system. By default, this option is set to Enabled.
    AC Power Recovery Sets how the system behaves after AC power is restored to the system. By default, this option is set to Last.
    NOTE:The host system will not power on until the iDRAC Root of Trust (RoT) function is completed. The host power-on delays by 90 seconds after the AC power is applied.
    AC Power Recovery Delay Sets the time delay for the system to power on after AC power is restored to the system. By default, this option is set to Immediate. When this option is set to:
    • Immediate, there is no delay for power-up.
    • Random, the system creates a random delay for power-up.
    • User Defined, the system delay time is manually to power on.
    User Defined Delay (120s to 600s) Sets the User Defined Delay option when the User Defined option for AC Power Recovery Delay is selected. The AC recovery time adds approximately 50 seconds to the iDRAC root of trust time.
    UEFI Variable Access This option provides various degrees of securing UEFI variables. When set to:
    • Standard (the default), UEFI variables are accessible in the operating system per the UEFI specification.
    • Controlled, selected UEFI variables are protected in the environment. New UEFI boot entries are placed at the end of the current boot order.
    In-Band Manageability Interface When set to Disabled, the Management Engine (ME), HECI devices, and the system IPMI devices are hidden from the operating system. Hiding the ME and the devices from the operating system prevents changes to the ME power capping settings, and blocks access to all in-band management tools. All managements should be managed through out-of-band. By default, this option is set to Enabled.
    NOTE:The BIOS update requires HECI devices to be operational, and DUP updates require IPMI interface to be operational. Set this setting to Enabled to avoid updating errors.
    SMM Security Mitigation Enables or disables the UEFI SMM security mitigation protections. By default, this option is set to Disabled.
    Secure Boot Enables Secure Boot, where the BIOS authenticates each preboot image by using the certificates in the Secure Boot Policy. By default, Secure Boot is set to Disabled.
    Secure Boot Policy When the Secure Boot policy is set to:
    • Standard, the BIOS uses the system manufacturer key and certificates to authenticate preboot images.
    • Custom, the BIOS uses the user-defined key and certificates.
    By default, the Secure Boot policy is set to Standard.
    Secure Boot Mode Configures how the BIOS uses the Secure Boot Policy Objects, such as PK, KEK, db, or dbx.
    If the current mode is set to:
    • Deployed Mode, the available options are: User Mode and Deployed Mode.
    • User Mode, the available options are: User Mode, Audit Mode, and Deployed Mode.
    The following list details the different boot modes available in the Secure Boot Mode option:
    • User Mode: In User Mode, PK must be installed, and BIOS performs signature verification on programmatic attempts to update policy objects. The BIOS allows unauthenticated programmatic transitions between modes.
    • Audit Mode: In Audit Mode, PK is not present. BIOS does not authenticate programmatic update to the policy objects and transitions between modes. The BIOS performs a signature verification on preboot images. The results are logged in the image Execution Information Table, but runs the images whether they pass or fail verification. Audit Mode is useful for programmatic determination of a working set of policy objects.
    • Deployed Mode: Deployed Mode is the most secure mode. In Deployed Mode, PK must be installed and the BIOS performs signature verification on programmatic attempts to update policy objects. Deployed Mode restricts the programmatic mode transitions.
    Secure Boot Policy Summary Specifies the list of certificates and hashes that secure boot uses to authenticate images.
    Secure Boot Custom Policy Settings Configures the Secure Boot Custom Policy. To enable this option, set the Secure Boot Policy to Custom option.
    Intel TXT Use this option to set the Intel Trusted Execution Technology (TXT) function. Virtualization technology and TPM Security must be enabled with Preboot measurements to enable the Intel TXT option. By default, this option is set to Off. It is set On for Secure Launch (Firmware Protection) support on Windows 2022.
    Memory Encryption Enables or disables Intel Total Memory Encryption (TME) and Multitenant (Intel TME-MT). When the option is set to:
    • Disabled, the BIOS disables both TME and MK-TME technology.
    • Single Key, the BIOS enables the TME technology.
    • Multiple Keys, the BIOS enables the TME-MT technology.
    By default, this option is set to Disabled. This setting can be enabled only if the CPU Physical Address Limit is disabled.
    TME Encryption Bypass This option allows you to bypass the Intel Total Memory Encryption. By default, this option is set to Disabled.
    Intel SGX Enables you to set the Intel Software Guard Extension (SGX) option. To enable the Intel SGX option, the processor:
    • Must be SGX capable
    • Memory population must be compatible (minimum x8 identical DIMM1 to DIMM8 per CPU socket
    • Does not support persistent memory configuration
    • Memory operating mode must be set to Optimizer mode
    • Memory encryption must be enabled
    • Node interleaving must be disabled
    When this option is set to Off, BIOS disables the SGX technology. When this option is set to On, the BIOS enables the SGX technology. By default, this option is set to Off.
    Power Button Enables or disables the power button on the front of the system. By default, this option is set to Enabled.
    AC Power Recovery Sets how the system behaves after AC power is restored to the system. By default, this option is set to Last.
    NOTE:The host system will not power on until the iDRAC Root of Trust (RoT) function is completed. The host power-on delays by 90 seconds after the AC power is applied.
    AC Power Recovery Delay Sets the time delay for the system to power on after AC power is restored to the system. By default, this option is set to Immediate. When this option is set to:
    • Immediate, there is no delay for power-up.
    • Random, the system creates a random delay for power-up.
    • User Defined, the system delay time is manually to power on.
    User Defined Delay (120s to 600s) Sets the User Defined Delay option when the User Defined option for AC Power Recovery Delay is selected. The AC recovery time adds approximately 50 seconds to the iDRAC root of trust time.
    UEFI Variable Access This option provides various degrees of securing UEFI variables. When set to:
    • Standard (the default), UEFI variables are accessible in the operating system per the UEFI specification.
    • Controlled, selected UEFI variables are protected in the environment. New UEFI boot entries are placed at the end of the current boot order.
    In-Band Manageability Interface When set to Disabled, the Management Engine (ME), HECI devices, and the system IPMI devices are hidden from the operating system. Hiding the ME and the devices from the operating system prevents changes to the ME power capping settings, and blocks access to all in-band management tools. All managements should be managed through out-of-band. By default, this option is set to Enabled.
    NOTE:The BIOS update requires HECI devices to be operational, and DUP updates require IPMI interface to be operational. Set this setting to Enabled to avoid updating errors.
    SMM Security Mitigation Enables or disables the UEFI SMM security mitigation protections. By default, this option is set to Disabled.
    Secure Boot Enables Secure Boot, where the BIOS authenticates each preboot image by using the certificates in the Secure Boot Policy. By default, Secure Boot is set to Disabled.
    Secure Boot Policy When the Secure Boot policy is set to:
    • Standard, the BIOS uses the system manufacturer key and certificates to authenticate preboot images.
    • Custom, the BIOS uses the user-defined key and certificates.
    By default, the Secure Boot policy is set to Standard.
    Secure Boot Mode Configures how the BIOS uses the Secure Boot Policy Objects, such as PK, KEK, db, or dbx.
    If the current mode is set to:
    • Deployed Mode, the available options are: User Mode and Deployed Mode.
    • User Mode, the available options are: User Mode, Audit Mode, and Deployed Mode.
    The following list details the different boot modes available in the Secure Boot Mode option:
    • User Mode: In User Mode, PK must be installed, and BIOS performs signature verification on programmatic attempts to update policy objects. The BIOS allows unauthenticated programmatic transitions between modes.
    • Audit Mode: In Audit Mode, PK is not present. BIOS does not authenticate programmatic update to the policy objects and transitions between modes. The BIOS performs a signature verification on preboot images. The results are logged in the image Execution Information Table, but runs the images whether they pass or fail verification. Audit Mode is useful for programmatic determination of a working set of policy objects.
    • Deployed Mode: Deployed Mode is the most secure mode. In Deployed Mode, PK must be installed and the BIOS performs signature verification on programmatic attempts to update policy objects. Deployed Mode restricts the programmatic mode transitions.
    Secure Boot Policy Summary Specifies the list of certificates and hashes that secure boot uses to authenticate images.
    Secure Boot Custom Policy Settings Configures the Secure Boot Custom Policy. To enable this option, set the Secure Boot Policy to Custom option.

    The following table provides the TPM 2.0 Security information:

    Table 2. TPM 2.0 Security informationThis table provides the TPM 2.0 Security information.
    TPM information Description
    TPM Security
    NOTE:The TPM menu is available only when the TPM module is installed.
    This option allows you to control the reporting mode of the TPM. When set to Off, the presence of the TPM is not reported to the operating system. When set to On, the presence of the TPM is reported to the operating system. By default, the TPM Security option is set to Off.
    When TPM 2.0 is installed, the TPM Security option is set to On or Off. By default, this option is set to Off.
    TPM Information Indicates the type of Trusted Platform Module, if present.
    TPM Firmware Indicates the firmware version of the TPM.
    TPM Hierarchy Enables, disables, or clears the storage and endorsement hierarchies. When set to Enabled, the storage and endorsement hierarchies can be used.
    When set to Disabled, the storage and endorsement hierarchies cannot be used.
    When set to Clear, the storage and endorsement hierarchies are cleared of any values, and then reset to Enabled.
    TPM Advanced Settings Specifies TPM Advanced Settings details.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\