Table 34. System Setup options—Security menu(continued)
Security
forensic means as they are still represented on the physical media. Data Wipe
prevents this reconstruction and is not recoverable.
When enabled, the BIOS will queue up a data wipe cycle for storage devices that
are connected to the motherboard on the next reboot.
By default, the Start Data Wipe option is disabled.
NOTE: To view this option, enable Advanced Setup mode as described in
View Advanced Setup options.
HDD Security
SED Block SID Authentication Allows you to enable SED Block SID Authentication.
By default, the SED Block SID Authentication option is enabled.
PPI Bypass for SED Block SID Command Allows you to enable PPI Bypass for SED Block SID Command.
By default, the PPI Bypass for SED Block SID Command option is disabled.
Absolute Absolute Software provides various cyber security solutions, some requiring
software preloaded on Dell computers and integrated into the BIOS. To use
these features, you must enable the Absolute BIOS setting and contact Absolute
forconfiguration and activation.
By default, the Absolute option is enabled.
For additional security, Dell Technologies recommends keeping the Absolute
option enabled.
WARNING: The Permanently Disabled option can only be selected
once. When Permanently Disabled is selected, Absolute Persistence
cannot be reenabled. No further changes to the Enable/Disable states
are allowed.
NOTE: The Enable/Disable options are unavailable while the computer is in
the activated state.
NOTE: When the Absolute features are activated, the Absolute integration
cannot be disabled from the BIOS Setup screen.
UEFI Boot Path Security Enables or disables the computer to prompt the user to enter the Administrator
password (if set) when booting to a UEFI boot path device from the F12 boot
menu.
By default, the Always Except Internal HDD option is enabled.
NOTE: To view this option, enable Advanced Setup mode as described in
View Advanced Setup options.
Firmware Device Tamper Detection Allows you to control the firmware device tamper detection feature. This feature
notifies the user when the firmware device is tampered. When enabled, a screen
warning message is displayed on the computer and a tamper detection event is
logged in the BIOS Events log. The computer fails to reboot until the event is
cleared.
By default, the Firmware Device Tamper Detection option is enabled.
For additional security, Dell Technologies recommends keeping the Firmware
Device Tamper Detection option enabled.
NOTE: To view this option, enable Advanced Setup mode as described in
View Advanced Setup options.
SafeShutter
100 BIOS Setup