Users Guide

Both erase methods can be executed using BIOS setup options. User can choose to perform an erase on all or a subset of
installed PMems.
Crypto erase
The Crypto Erase function erases the App-direct Region Key (PM-RK) forcing the system to reboot.
Cryptographic erase option can be accessed by going to: System BIOS Settings > Memory Settings > Persistent Memory
> Intel Persistent Memory > Persistent Memory DIMM Configuration
Figure 13. Crypto erase
NOTE:
It is not recommended to erase part of PMems installed on the system when App-direct interleaved region is
configured. This operation renders all the data on the interleave set invalid.
Sanitize
PMem Sanitization is a long operation which runs on all the selected persistent memories in parallel.
This process does a cryptographic erase first and writes zeros to all accessible persistent media regions on the PMem. Also, it
destroys any existing memory goal contents.
The region of the PMem where the goal is configured will be empty and on the next boot the memory will default to 100%
Memory Mode. If the system does not have the proper ratio of RDIMM or LRDIMM memory to PMem, it is expected on the
following boot for an error to occur indicating that the ratio is not optimized.
Sanitize option can be accessed by going to: System BIOS Settings > Memory Settings > Persistent Memory
Figure 14. Sanitize
PMem security
31