
Table
Heading | Option | Description | |
|
|
| |
| System Security | Provides these options: | |
|
| ● Data Execution | |
|
| the CPUs. This mode prohibits code from running in pages that were set up as data | |
|
| pages, and prevents attacks such as buffer overflows. Operating system support is | |
|
| required for this feature. | |
|
| ● Virtualization Technology | |
|
| to increase workstation performance. | |
|
| ● Intel® | |
|
| features needed to support a virtual appliance. | |
|
| ● Interrupt | |
|
| enabled. | |
|
| ● Coherency | |
|
| enabled. | |
|
| ● ATS | |
|
| ● | |
|
| enabled. | |
|
| ● Embedded Security | |
|
| to Available under Device Security. | |
|
| NOTE: Embedded Security Device must be set to Device Available in the Device | |
|
| Security menu, and you must create a Setup Password, in order to configure the | |
|
| Embedded Security Device. | |
|
| Embedded Security Device (Hidden or Available) turns the Trusted Platform | |
|
| Mechanism (TPM) on and off. Device Hidden is the default. If this option is made | |
|
| available, the following options become available: | |
|
| ◦ | |
|
|
| feature that requires you to enter a TPM user key password to start the |
|
|
| workstation. This feature uses the TPM to generate and store the authentication |
|
|
| password. |
|
| ◦ | Reset Authentication |
|
|
| clears authentication credentials. |
To enable the Embedded Security Device and to access any security features associated with the device, you must enter a setup password.
Setting a device to Available enables the operating system to access the device. Hidden makes the device unavailable. It is disabled by the BIOS and cannot be enabled by the operating system.
56 Chapter 2 System management