User Manual
Table Of Contents
- Safety information
- Chapter 1: Product Introduction
- Chapter 2: Hardware Setup
- Chapter 3: Motherboard Information
- Chapter 4: BIOS Setup
- 4.1 Managing and updating your BIOS
- 4.2 BIOS setup program
- 4.3 Main menu
- 4.4 Advanced menu
- 4.4.1 CPU Configuration
- 4.4.2 Power & Performance
- 4.4.3 Server ME Configuration
- 4.4.4 System Event Log
- 4.4.5 Trusted Computing
- 4.4.6 Redfish Host Interface Settings
- 4.4.7 Onboard LAN Configuration
- 4.4.8 Serial Port Console Redirection
- 4.4.9 Intel TXT Information
- 4.4.10 SIO Configuration
- 4.4.11 PCI Subsystem Settings
- 4.4.12 USB Configuration
- 4.4.13 Network Stack Configuration
- 4.4.14 CSM (Compatibility Support Module)
- 4.4.15 NVMe Configuration
- 4.4.16 APM Configuration
- 4.4.17 Third-party UEFI driver configurations
- 4.5 Chipset menu
- 4.6 Security menu
- 4.7 Boot menu
- 4.8 Monitor menu
- 4.9 Tool menu
- 4.10 Event Logs menu
- 4.11 Server Mgmt menu
- 4.12 Exit menu
- Chapter 5: RAID Configuration
- Appendix
ASUS TS100-E11-PI4
4-17
The following item appears only when
PCH Error Enable
is set to
[Yes]
.
PCI/PCI Error Enabling:
Press <Enter> to view or change PCH errors enabling options.
PCI-Ex Error Enable [No]
Congurationoptions:[No][Yes]
Fatal Error Enable [Enabled]
Allows you to enable and escalate fatal errors to error pins.
Congurationoptions:[DisableLink][Enabled]
Uncorrected Error Enable [Enabled]
Allows you to enable and escalate Uncorrectable/Recoverable errors to error pins.
Congurationoptions:[DisableLink][Enabled]
Corrected Error Enable [Enabled]
Allows you to enable and escalate Correctable Errors to error pins.
Congurationoptions:[DisableLink][Enabled]
Enable SERR propagation [No]
Congurationoptions:[No][Yes]
Enable PERR propagation [No]
Congurationoptions:[No][Yes]
Security Device Support [Enabled]
This item allows you to enable or disable BIOS support for security device. O.S. will not show
Security Device. TCG EFI protocol and INT1A interface will not be available.
Congurationoptions:[Disabled][Enabled]
4.4.5 Trusted Computing