2-30
Chapter 2: Getting started
Delete the KEK
Allows you to delete the KEK from your system. Conguration options: [Yes] [No]
Append KEK from le
Allows you to load the additional KEK from a storage device for an additional db and dbx
loaded management.
The KEK le must be formatted as a UEFI variable structure with time-based authenticated
variable.
db Management
The db (Authorized Signature database) lists the signers or images of UEFI
applications, operating system loaders, and UEFI drivers that you can load on the
single computer.
Load db from File
Allows you to load the downloaded db from a USB storage device.
Copy db from le
Allows you to store the db to a USB storage device.
Delete the db
Allows you to delete the db le from your system. Conguration options: [Yes] [No]
Append db from le
Allows you to load the additional db from a storage device so that more images can be
loaded securely.
The db le must be formatted as a UEFI variable structure with time-based authenticated
variable.
dbx Management
The dbx (Revoked Signature database) lists the forbidden images of db items that are
no longer trusted and cannot be loaded.
Load dbx from File
Allows you to load the downloaded dbx from a USB storage device.
Copy dbx from le
Allows you to store the dbx to a USB storage device.
Delete the dbx
Allows you to delete the dbx le from your system. Conguration options: [Yes] [No]
Append dbx from le
Allows you to load the additional dbx from a storage device so that more db’s images
cannot be loaded.
The dbx le must be formatted as a UEFI variable structure with time-based authenticated
variable.
Comments to this Manuals