35
Secure Boot Mode
Set UEFI Secure Boot Mode to Standard mode or Custom mode.
In Custom mode, Secure Boot Policy variables can be configured by a physically
present user without full authentication.
The optional settings are: [Standard]; [Custom].
*When set as [
Custom
], user can make further settings in the following items that
show up:
Restore Factory Keys
Use this item to force system to User Mode, to install factory default Secure Boot
key databases.
Reset To Setup Mode
Use this item to delete all Secure Boot Key databases from NVRAM.
Key Management
This item enables experienced users to modify Secure Boot variables, which
includes the following items:
Factory Key Provision
This item is for user to install factory default secure boot keys after the platform
reset and while the system is in Setup mode.
The optional settings are: [Disabled]; [Enabled].
Restore Factory Keys
Use this item to force system into User Mode. Install factory default Secure Boot
Key databases.
Reset to Setup Mode
Use this item to delete all Secure Boot key databases from NVRAM.
Export Secure Boot variables
Use this item to copy NVRAM content of Secure Boot variables to files in a root
folder on a file system device.
Enroll Efi Image
This item allows the image to run in Secure Boot Mode.
Enroll SHA256 Hash certificate of a PE image into Authorized Signature
Database (db).
Device Guard Ready
Remove ‘UEFI CA’ from DB
Device Guard ready system must not list ‘Microsoft EFI CA’ Certificate in
Authorized Signature database (db).
Restore DB defaults
Use this item to restore DB variable to factory defaults.
Secure Boot Variable/Size/Keys/Key Source
Platform Key (PK)/Key Exchange Keys/Authorized Signature/Forbidden
Signature/ Authorized TimeStamps/OsRecovery Signatures
Use this item to enroll Factory Defaults or load the keys from a file with:
1. Public Key Certificate in:
a) EFI_SIGNATURE_LIST
b) EFI_ CERT_X509 (DER encoded)
c) EFI_ CERT_RSA2048 (bin)
d) EFI_ CERT_SHAXXX (bin)
2. Authenticated UEFI Variable