Owners Manual

Table Of Contents
Option Description
AC Power
Recovery
Sets how the system behaves after AC power is restored to the system. This option is set to Last by
default.
UEFI Variable
Access
Provides varying degrees of securing UEFI variables. When set to Standard (the default), UEFI variables
are accessible in the operating system per the UEFI specification. When set to Controlled, selected UEFI
variables are protected in the environment and new UEFI boot entries are forced to be at the end of the
current boot order.
Secure Boot
Policy
When Secure Boot policy is set to Standard, the BIOS uses the system manufacturers key and
certificates to authenticate pre-boot images. When Secure Boot policy is set to Custom, the BIOS uses
the user-defined key and certificates. Secure Boot policy is set to Standard by default.
Secure Boot
Policy Summary
Specifies the list of certificates and hashes that secure boot uses to authenticate images.
Related references
System Security on page 31
Related tasks
Viewing System Security on page 32
Secure Boot Custom Policy Settings
Secure Boot Custom Policy Settings is displayed only when Secure Boot Policy is set to Custom.
Viewing Secure Boot Custom Policy Settings
To view the Secure Boot Custom Policy Settings screen, perform the following steps:
Steps
1. Turn on, or restart your system.
2. Press F2 immediately after you see the following message:
F2 = System Setup
NOTE:
If your operating system begins to load before you press F2, wait for the system to finish booting, and then
restart your system and try again.
3. On the System Setup Main Menu screen, click System BIOS.
4. On the System BIOS screen, click System Security.
5. On the System Security screen, click Secure Boot Custom Policy Settings.
Secure Boot Custom Policy Settings details
The Secure Boot Custom Policy Settings screen details are explained as follows:
Option
Description
Platform Key Imports, exports, deletes, or restores the platform key (PK).
Key Exchange
Key Database
Enables you to import, export, delete, or restore entries in the Key Exchange Key (KEK) Database.
Authorized
Signature
Database
Imports, exports, deletes, or restores entries in the Authorized Signature Database (db).
Forbidden
Signature
Database
Imports, exports, deletes, or restores entries in the Forbidden Signature Database (dbx).
Pre-operating system management applications 33