Skip to main content

Secure Boot

Secure boot is functionality built into UEFI’s specification. Physical Presence must be asserted if you are going to enable UEFI Secure Boot. When Secure Boot is enabled and properly configured, it protects computers against attacks and infections from malware that installs rootkits and boot kits.

Secure Boot detects when software like the boot loader and key operating system files and other things like option ROMs have been tampered with. It does this by validating each component’s digital signature. Any component whose digital signature verification fails is not loaded during the boot process. Depending upon the OS and drivers you are using on the server it may not always be possible to enable secure boot.

To enable the Secure Boot in the System Setup Utility, do the following:
  1. Start the System Setup Utility. See Get started.

  2. On the Security menu, select Secure Boot > Secure Boot. Ensure that Secure Boot is set to Enable.

Use this submenu to set the Secure Boot parameter.

Submenu itemOptionDescription
System ModeSetupShow the system mode.
Vendor KeysModifiedShow the vendor keys.
Physical PresenceNot AssertedN/A
Secure BootDisable | Enable

Secure Boot feature is Active if Secure Boot is Enable, Platform Key(PK) is enrolled and the System is in User mode. The mode change requires platform reset.

The default option is Disable.

Secure Boot CustomizationCustom | Standard

Secure Boot options: Standard or Custom. In Custom mode, Secure Boot Policy variables can be configured by a physically present user without full authentication.

The default option is Custom.

Restore Factory KeysYes | No

Force System to User Mode. Install factory default Secure Boot key databases.

The default option is Yes.

Restore To Setup ModeYes | No

Delete all Secure Boot key databases from NVRAM.

The default option is Yes.

Key ManagementN/A

Enables expert users to modify Secure Boot Policy variables without full authentication. See the submenu.