Installation and Service Manual
Table Of Contents
- Dell EMC PowerEdge T440
- Dell EMC PowerEdge T440 overview
- Documentation resources
- Technical specifications
- Initial system setup and configuration
- Pre-operating system management applications
- Installing and removing system components
- Safety instructions
- Before working inside your system
- After working inside your system
- Optional front bezel
- System feet
- Caster wheels – optional
- System cover
- Air shroud
- Drives
- Removing a drive blank
- Installing a drive blank
- Removing a drive carrier
- Installing a drive carrier
- Removing the drive from the drive carrier
- Installing a drive into the drive carrier
- Removing a 2.5 inch drive from a 3.5 inch drive adapter
- Installing a 2.5 inch drive into a 3.5 inch drive adapter
- Removing a 3.5 inch drive adapter from a 3.5 inch drive carrier
- Installing a 3.5 inch drive adapter into the 3.5 inch drive carrier
- Optical drives and tape drives
- Cabled drives
- Drive backplane
- System memory
- Cooling fans
- Optional internal USB memory key
- Expansion card holder
- Expansion cards
- Optional IDSDM or vFlash card
- Processors and heat sinks
- Power supply units
- Power interposer board
- System battery
- Control panel assembly
- System board
- Trusted Platform Module
- Converting the system from tower mode to rack mode
- Updating BIOS
- Restoring the Service Tag using Easy Restore
- Using system diagnostics
- Jumpers and connectors
- Getting help
Option Description
AC Power Recovery Sets how the system behaves after AC power is restored to the system. This option is set to Last by default.
AC Power Recovery
Delay
Sets the time delay for the system to power up after AC power is restored to the system. This option is set to
Immediate by default.
User Dened Delay
(60 s to 240 s)
Sets the User Dened Delay option when the User Dened option for AC Power Recovery Delay is selected.
UEFI Variable
Access
Provides varying degrees of securing UEFI variables. When set to Standard (the default), UEFI variables are
accessible in the operating system per the UEFI specication. When set to Controlled, selected UEFI variables are
protected in the environment and new UEFI boot entries are forced to be at the end of the current boot order.
In-Band
Manageability
Interface
When set to Disabled, this setting will hide the Management Engine's (ME), HECI devices, and the system's IPMI
devices from the operating system. This prevents the operating system from changing the ME power capping
settings, and blocks access to all in-band management tools. All management should be managed through out-of-
band. This option is set to Enabled by default.
NOTE: BIOS update requires HECI devices to be operational and DUP updates require IPMI interface to
be operational. This setting needs to be set to Enabled to avoid updating errors.
Secure Boot Enables Secure Boot, where the BIOS authenticates each pre-boot image by using the certicates in the Secure
Boot Policy. Secure Boot is set to Disabled by default.
Secure Boot Policy When Secure Boot policy is set to Standard, the BIOS uses the system manufacturer’s key and certicates to
authenticate pre-boot images. When Secure Boot policy is set to Custom, the BIOS uses the user-dened key and
certicates. Secure Boot policy is set to Standard by default.
Secure Boot Mode Congures how the BIOS uses the Secure Boot Policy Objects (PK, KEK, db, dbx).
If the current mode is set to Deployed Mode, the available options are User Mode and Deployed Mode. If the
current mode is set to User Mode, the available options are User Mode, Audit Mode, and Deployed Mode.
Options Description
User Mode
In User Mode, PK must be installed, and BIOS performs signature verication on
programmatic attempts to update policy objects.
The BIOS allows unauthenticated programmatic transitions between modes.
Audit Mode
In Audit mode, PK is not present. The BIOS does not authenticate programmatic updates
to the policy objects, and transitions between modes.
Audit Mode is useful for programmatically determining a working set of policy objects.
BIOS performs signature verication on pre-boot images and logs results in the image
Execution Information Table, but executes the images whether they pass or fail
verication.
Deployed Mode
Deployed Mode is the most secure mode. In Deployed Mode, PK must be installed and
the BIOS performs signature verication on programmatic attempts to update policy
objects.
Deployed Mode restricts the programmatic mode transitions.
Secure Boot Policy
Summary
Species the list of certicates and hashes that secure boot uses to authenticate images.
Installation and Service Manual
Pre-operating system management applications
53