User Manual
Table Of Contents
- Safety information
- Chapter 1: Product Introduction
- Chapter 2: Hardware Setup
- 2.1 Chassis cover
- 2.2 Central Processing Unit (CPU)
- 2.3 System memory
- 2.4 Storage devices
- 2.5 Expansion slots
- 2.5.1 The PCI Express riser card
- 2.5.2 Installing an ASUS PIKE II card
- 2.5.3 Reconnecting the cable to the M.2 expansion board (only for SKU-3)
- 2.5.4 Installing an M.2 (NGFF) card
- 2.5.5 Reconnecting the cable to the OCP 3.0 slot baseboard (only for SKU-2)
- 2.5.6 (optional) Installing the PFR module
- 2.5.7 Configuring an expansion card
- 2.6 Cable connections
- 2.7 SATA/SAS backplane cabling
- 2.8 Removable/optional components
- Chapter 3: Installation Options
- Chapter 4: Motherboard Infomation
- Chapter 5: BIOS Setup
- 5.1 Managing and updating your BIOS
- 5.2 BIOS setup program
- 5.3 Main menu
- 5.4 Advanced menu
- 5.4.1 OffBoard SATA Controller Configuration
- 5.4.2 Trusted Computing
- 5.4.3 ACPI Settings
- 5.4.4 Redfish Host Interface Settings
- 5.4.5 Onboard LAN Configuration
- 5.4.6 Serial Port Console Redirection
- 5.4.7 SIO Common Setting
- 5.4.8 SIO Configuration
- 5.4.9 PCI Subsystem Settings
- 5.4.10 USB Configuration
- 5.4.11 Network Stack Configuration
- 5.4.12 CSM (Compatibility Support Module)
- 5.4.13 NVMe Configuration
- 5.4.14 APM Configuration
- 5.4.15 Third-party UEFI driver configurations
- 5.5 Platform Configuration menu
- 5.6 Socket Configuration menu
- 5.7 Event Logs menu
- 5.8 Server Mgmt menu
- 5.9 Security menu
- 5.10 Boot menu
- 5.11 Tool menu
- 5.12 Save & Exit menu
- Chapter 6: Driver Installation
- Appendix
5-67
ASUS ESC4000-E10S
Clear Secure Boot Keys
This option will delete all previously applied secure boot keys, including the PK (Platform
key), KEK (key-exchange key), db (signature database), and dbx (revoked signature
database). All the secure boot keys states will change from unloaded to loaded. Save
changes and reset the system for the changes to take effect.
Save all Secure Boot Variables
This option will save NVRAM content of Secure Boot policy variables to the file (EFI_
SIGNATURE_LIST data format) in root foler on a target file system device.
Enroll Efi Image
This item will allow the image to run in Secure Boot mode. Enroll SHA256 Hash
certificate of a PE image into Authorized Signature Database (db).
Device Guard Ready
Remove ‘UEFI CA’ from DB
Remove Microsoft UEFI CA from Secure Boot DB.
Restore DB defaults
Restore DB variable to factory defaults.
PK Management
Configuration options: [Details] [Save To File] [Set New Key] [Delete key]
KEK Management / DB Management / DBX Management
Configuration options: [Details] [Save To File] [Set New Key] [Append Key] [Delete key]
Authorized TimeStamps / OsRecovery Signatures
Configuration options: [Set New Key] [Append Key]