User Manual
Table Of Contents
- Chapter 1
- Chapter 2
- Chapter 3
- BIOS setup
- 3.1 BIOS setup program
- 3.2 Main menu
- 3.3 Advanced menu
- 3.3.1 Platform Misc Configuration
- 3.3.2 CPU Configuration
- 3.3.3 System Agent (SA) Configuration
- 3.3.4 PCH Configuration
- 3.3.5 PCH Storage Configuration
- 3.3.6 PCH-FW Configuration
- 3.3.7 LVDS Configuration
- 3.3.8 Onboard Devices Configuration
- 3.3.9 APM Configuration
- 3.3.10 Network Stack Configuration
- 3.3.11 HDD/SSD SMART Information
- 3.3.12 USB Configuration
- 3.4 Monitor
- 3.5 Boot menu
- 3.7 Exit menu
- BIOS setup
- Appendix
3-22
H110T-CM-A R2.0
KEK Management
The Key Exchange Keys (KEK) manages the Signature database (db) and
Forbidden Signature database (dbx).
Key Exchange Keys (KEK) refers to Microsoft
®
Secure Boot Key-Enrollment
Key (KEK).
Save To File
This item allows you to save the KEK to a USB storage device.
Set New Key
This item allows you to load the downloaded KEK from a USB
storage device.
Append Key
This item allows you to load the additional KEK from a storage
device for an additional db and dbx loaded management.
Delete key
This item allows you to delete the KEK from your system.
Conguration options: [Yes] [No]
The KEK le must be formatted as a UEFI variable structure with time-based
authenticated variable.
DB Management
The Authorized Signatures (db) lists the signers or images of UEFI
applications, operating system loaders, and UEFI drivers that you can load
on the single computer.
Save To File
This item allows you to save the db to a USB storage device.
Set New Key
This item allows you to load the downloaded db from a USB
storage device.
Append Key
This item allows you to load the additional db from a storage
device for an additional db and dbx loaded management.
Delete key
This item allows you to delete the db le from your system.
Conguration options: [Yes] [No]
The db le must be formatted as a UEFI variable structure with time-based
authenticated variable.
DBX Management
The Forbidden Signature database (dbx) lists the forbidden images of db
items that are no longer trusted and cannot be loaded.