Users Manual Part 2

USER’S MANUAL
l 71
Protecting Your Computer
Trusted Computing
TPM Support:
Enable the TPM support for advanced crypto capabilities.
TPM State: Enable the TPM state to see pending TPM operations.
Pending TPM Operation: Set the pending TPM operation to TPM
Clear if you want to clear all data secured by TPM or to None if you
want to discard the selection.
Secure Boot Control
Secure Boot Control: Enable secure boot ow control to prevent
malicious apps and “unauthorized” operating systems from loading
during the system start-up process.
 Enable to install all the
default secure keys, such as PK, KEK, db, and dbx set by the
manufacturer. Changes will take effect after you restart the system.
Clear Secure Boot Keys: Enable if you want to uninstall all the
default secure keys, such as PK, KEK, db, and dbx set by the
manufacturer. Changes will take effect after you restart the system.
NOTE: Modications to the TPM state will take effect after you restart the
computer.
Exit Menu
Item 
Save Changes
and Exit
Select this option if you want to save all modications and exit the Nexstgo
System Conguration utility. The computer will automatically restart.
Discard Changes
and Exit
Select this option if you want to discard all modications and exit the Setup
Utility.
Save Changes
Select this option if you want to save the modications but not to exit the
Setup Utility.
Discard Changes
Select this option if you want to discard the modications but not to exit the
Setup Utility.
Load Optimized
Defaults
Select this option to reset all values in Setup Utility to their factory defaults.