Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell VxRail VD-4510c Hardware Requirements and Specifications

System security overview

  1. From the System Security screen, power on the system, and press F2.
  2. Click System Setup Main Menu > System BIOS > System Security.
  3. Use the following table for a description of System Security settings:
    Option Description
    CPU AES-NI Improves the speed of applications by performing encryption and decryption by using the Advanced Encryption Standard Instruction Set (AES-NI). This option is set to Enabled by default.
    System Password Sets the system password. This option is read-only if the password jumper is not installed in the system.
    Setup Password Sets the setup password. This option is read-only if the password jumper is not installed in the system.
    Password Status Locks the system password. This option is set to Unlocked by default.
    TPM Information Indicates the type of Trusted Platform Module, if present.
    The following table describes the TPM 2.0 security information:
    Option Description
    TPM Security Enables you to control the reporting mode of the TPM. When set to Off (default), the presence of the TPM is not reported to the operating system. When set to On, the presence of the TPM is reported to the operating system.
    NOTE:The TPM menu is available only when the TPM module is installed.
    When TPM 2.0 is installed, the TPM Security option is set to On or Off (default).
    TPM Information Indicates the type of Trusted Platform Module, if present.
    TPM Firmware Indicates the firmware version of the TPM.
    TPM Hierarcy Enables, disables, or clears the storage and endorsement hierarchies. When set to Enabled, the storage and endorsement hierarchies can be used.
    When set to Disabled, the storage and endorsement hierarchies cannot be used.
    When set to Clear, the storage and endorsement hierarchies are cleared of any values, and then reset to Enabled.
    TPM Advanced Settings Specifies TPM Advanced Settings details.
    The following table provides the details of the options available on the System Security screen:
    Option Description
    Intel(R) TXT Enables you to set the Intel Trusted Execution Technology (TXT) option. To enable the Intel TXT option, virtualization technology and TPM Security must be enabled with Pre-boot measurements. This option is set to Off by default. It is set On for Secure Launch (Firmware Protection) support on Windows 2022.
    Memory Encryption Enables or disables the Intel Total Memory Encryption (TME) and Multi-Tenant (Intel® TME-MT). When option is set to Disabled, BIOS disables both TME and MK-TME technology. When option is set to Single Key BIOS enables the TME technology. When option is set to Multiple Keys, BIOS enables the TME-MT technology. This option is set to Disabled by default.
    Intel(R) SGX Enables you to set the Intel Software Guard Extension (SGX) option. To enable the Intel SGX option, processor must be SGX capable, memory population must be compatible (minimum x8 identical DIMM1 to DIMM8 per CPU socket, not support on persistent memory configuration), memory operating mode must be set at optimizer mode, memory encryption must be enabled and node interleaving must be disabled. This option is set to Off by default. When this option is to Off, BIOS disables the SGX technology. When this option is to On, BIOS enables the SGX technology.
    Power Button Enables (default) or disables the power button on the front of the system.
    AC Power Recovery Sets how the system behaves after AC power is restored to the system. This option is set to Last by default.
    NOTE:The host system does not power on until iDRAC Root of Trust (RoT) is completed, host power on is delayed by minimum 90 seconds after the AC applied.
    AC Power Recovery Delay Sets the time delay for the system to power up after AC power is restored to the system. This option is set to Immediate by default. When this option is set to Immediate, there is no delay for power up. When this option is set to Random, the system creates a random delay for power up. When this option is set to User Defined, the system delay time is manually to power up.
    User Defined Delay (120 s to 600 s) Sets the User Defined Delay option when the User Defined option for AC Power Recovery Delay is selected. The actual AC recovery time needs to add iDRAC root of trust time (around 50 seconds).
    UEFI Variable Access Provides varying degrees of securing UEFI variables. When set to Standard (the default), UEFI variables are accessible in the operating system per the UEFI specification. When set to Controlled, selected UEFI variables are protected in the environment and new UEFI boot entries are forced to be at the end of the current boot order.
    In-Band Manageability Interface When set to Disabled, hides the Management Engine (ME), HECI devices, and the system IPMI devices from the operating system. This prevents the operating system from changing the ME power capping settings, and blocks access to all in-band management tools. All management should be managed through out-of-band. This option is set to Enabled by default.
    NOTE:BIOS update requires HECI devices to be operational and DUP updates require IPMI interface to be operational. This setting needs to be set to Enabled to avoid updating errors.
    SMM Security Migration Enables or disables (default) the UEFI SMM security migration protections.
    Secure Boot Enables Secure Boot, where the BIOS authenticates each pre-boot image by using the certificates in the Secure Boot Policy. Secure Boot is set to Disabled by default.
    Secure Boot Policy When Secure Boot policy is set to Standard, the BIOS uses the system manufacturer’s key and certificates to authenticate pre-boot images. When Secure Boot policy is set to Custom, the BIOS uses the user-defined key and certificates. Secure Boot policy is set to Standard by default.
    Secure Boot Mode Configures how the BIOS uses the Secure Boot Policy Objects (PK, KEK, db, dbx).
    If the mode is set to Deployed Mode, the available options are User Mode and Deployed Mode. If the mode is set to User Mode, the available options are User Mode, Audit Mode, and Deployed Mode
    Below are the details of different boot modes available in the Secure Boot Mode option.
    User Mode
    In User Mode, PK must be installed, and BIOS performs signature verification on programmatic attempts to update policy objects. The BIOS allows unauthenticated programmatic transitions between modes.
    Deployed Mode
    Deployed Mode is the most secure mode. In Deployed Mode, PK must be installed and the BIOS performs signature verification on programmatic attempts to update policy objects. Deployed Mode restricts the programmatic mode transitions.
    Secure Boot Policy Summary Specifies the list of certificates and hashes that secure boot uses to authenticate images.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\