Intel(R) TXT
|
Enables you to set the Intel Trusted Execution Technology (TXT) option. To enable the
Intel TXT option, virtualization technology and TPM Security must be enabled with Pre-boot measurements. This option is set to
Off by default. It is set
On for Secure Launch (Firmware Protection) support on Windows 2022.
|
Memory Encryption
|
Enables or disables the Intel Total Memory Encryption (TME) and Multi-Tenant (Intel® TME-MT). When option is set to
Disabled, BIOS disables both TME and MK-TME technology. When option is set to
Single Key BIOS enables the TME technology. When option is set to
Multiple Keys, BIOS enables the TME-MT technology. This option is set to
Disabled by default.
|
TME Encryption Bypass
|
Allows the option to bypass the Intel Total Memory Encryption. This option is set to
Disabled by default.
|
Intel(R) SGX
|
Enables you to set the Intel Software Guard Extension (SGX) option. To enable the
Intel SGX option, processor must be SGX capable, memory population must be compatible (minimum x8 identical DIMM1 to DIMM8 per CPU socket, not support on persistent memory configuration), memory operating mode must be set at optimizer mode, memory encryption must be enabled and node interleaving must be disabled. This option is set to
Off by default. When this option is to
Off, BIOS disables the SGX technology. When this option is to
On, BIOS enables the SGX technology.
|
Power Button
|
Enables or disables the power button on the front of the
시스템. This option is set to
Enabled by default.
|
AC Power Recovery
|
Sets how the system behaves after AC power is restored to the
시스템. This option is set to
Last by default.
NOTE:The host system will not power on until iDRAC Root of Trust (RoT) is completed, host power on will be delayed by minimum 90 seconds after the AC applied.
|
AC Power Recovery Delay
|
Sets the time delay for the system to power up after AC power is restored to the
시스템. This option is set to
Immediate by default. When this option is set to
Immediate, there is no delay for power up. When this option is set to
Random, the system creates a random delay for power up. When this option is set to
User Defined, the system delay time is manually to power up.
|
User Defined Delay (120 s to 600 s)
|
Sets the
User Defined Delay option when the
User Defined option for
AC Power Recovery Delay is selected. The actual AC recovery time needs to add iDRAC root of trust time (around 50 seconds).
|
UEFI Variable Access
|
Provides varying degrees of securing UEFI variables. When set to
Standard (the default), UEFI variables are accessible in the operating system per the UEFI specification. When set to
Controlled, selected UEFI variables are protected in the environment and new UEFI boot entries are forced to be at the end of the current boot order.
|
In-Band Manageability Interface
|
When set to
Disabled , this setting hides the Management Engine's (ME), HECI devices, and the system's IPMI devices from the operating system. This prevents the operating system from changing the ME power capping settings, and blocks access to all in-band management tools. All management should be managed through out-of-band. This option is set to
Enabled by default.
NOTE:BIOS update requires HECI devices to be operational and DUP updates require IPMI interface to be operational. This setting needs to be set to Enabled to avoid updating errors.
|
SMM Security Mitigation
|
Enables or disables the UEFI SMM security mitigation protections. It is set to
Disabled by default.
|
Secure Boot
|
Enables Secure Boot, where the BIOS authenticates each pre-boot image by using the certificates in the Secure Boot Policy. Secure Boot is set to
Disabled by default.
|
Secure Boot Policy
|
When Secure Boot policy is set to
Standard, the BIOS uses the system manufacturer’s key and certificates to authenticate pre-boot images. When Secure Boot policy is set to
Custom, the BIOS uses the user-defined key and certificates. Secure Boot policy is set to
Standard by default.
|
Secure Boot Mode
|
Configures how the BIOS uses the Secure Boot Policy Objects (PK, KEK, db, dbx).
|
If the current mode is set to
Deployed Mode, the available options are
User Mode and
Deployed Mode. If the current mode is set to
User Mode, the available options are
User Mode,
Audit Mode, and
Deployed Mode.
|
Below are the details of different boot modes available in the
Secure Boot Mode option.
- User Mode
- In
User Mode, PK must be installed, and BIOS performs signature verification on programmatic attempts to update policy objects. The BIOS allows unauthenticated programmatic transitions between modes.
- Audit mode
- In
Audit Mode, PK is not present. BIOS does not authenticate programmatic update to the policy objects and transitions between modes. The BIOS performs a signature verification on pre-boot images and logs the results in the image Execution Information Table, but executes the images whether they pass or fail verification.
Audit Mode is useful for programmatic determination of a working set of policy objects.
- Deployed Mode
- Deployed Mode is the most secure mode. In
Deployed Mode, PK must be installed and the BIOS performs signature verification on programmatic attempts to update policy objects.
Deployed Mode restricts the programmatic mode transitions.
|
Secure Boot Policy Summary
|
Specifies the list of certificates and hashes that secure boot uses to authenticate images.
|
Secure Boot Custom Policy Settings
|
Configures the Secure Boot Custom Policy. To enable this option, set the Secure Boot Policy to
Custom option.
|
Intel Trust Domain Extension(TDX)
|
Intel Trust Domain Extension (TDX) is a hardware-based trusted execution environment. It is designed to protect sensitive data and applications in Trust Domain(TD) or Virtual Machine(VM) from unauthorized access.
Memory Encryption
must be set to
Multiple Keys for TDX to be enabled. TDX is set to
Disabled by default.
NOTE:To enable the TDX option, processor must be TDX capable, memory population must be compatible as SGX setting (minimum x8 identical DIMM1 to DIMM8 per CPU socket, not support on persistent memory configuration)
|
TME-MT/TDX Key Spilt to non-zero value
|
When the TME-MT/TDX Key Spilt to non-zero value is set to
1,
2,
3,
4,
5, or
6, it designates the number of bits for TDX usage, while the rest will be used by TME-MT. It is set to
1 by default.
|
Disable excluding Mem below 1MB in CMR
|
Convertible Memory Range (CMR) is programmed to define the memory region that are convertible between Intel SGX and Intel TDX usage. This option allows system to include memory region below 1MB in CMR. It is set to
Disabled by default.
|
TDX Secure Arbitration Mode Loader(SEAM)
|
This SW module runs in a new CPU Secure Arbitration Mode (SEAM) as peer virtual machine manager (VMM). This SEAM module supports TD entry and exit using the existing virtualization infrastructure. It is set to
Disabled by default.
|
Intel(R) In-Field Scan
|
The Intel(R) In-field Scan feature allows software to scan processor cores for latent faults. The scan can be performed in the field after the server is deployed. When
Enabled, the BIOS configures all processors to respond to software scan requests. When this setting is
Disabled, the processors will not respond to software scan requests. It is set to
Disabled by default.
|