System Security  Intel® Server Board S2600CW Family TPS 
58    Revision 2.4 
4.3.2  Physical Presence 
Administrative operations to the TPM require TPM ownership or physical presence indication 
by the operator to confirm the execution of administrative operations. The BIOS implements 
the operator presence indication by verifying the setup Administrator password. 
A TPM administrative sequence invoked from the operating system proceeds as follows: 
1.  A user makes a TPM administrative request through the operating system’s security 
software. 
2.  The operating system requests the BIOS to execute the TPM administrative command 
through TPM ACPI methods and then resets the system. 
3.  The BIOS verifies the physical presence and confirms the command with the operator. 
4.  The BIOS executes TPM administrative command(s), inhibits BIOS Setup entry, and 
boots directly to the operating system which requested the TPM command(s). 
4.3.3  TPM Security Setup Options 
The BIOS TPM Setup allows the operator to view the current TPM state and to carry out 
rudimentary TPM administrative operations. Performing TPM administrative options through 
the BIOS setup requires TPM physical presence verification. 
Using the BIOS TPM Setup, the operator can turn ON or OFF TPM functionality and clear the 
TPM ownership contents. After the requested TPM BIOS Setup operation is carried out, the 
option reverts to No Operation. 
The BIOS TPM Setup also displays the current state of the TPM, whether TPM is enabled or 
disabled and activated or deactivated. Note that while using TPM, a TPM-enabled operating 
system or application may change the TPM state independently of the BIOS setup. When an 
operating system modifies the TPM state, the BIOS Setup displays the updated TPM state. 
The BIOS Setup TPM Clear option allows the operator to clear the TPM ownership key and 
allows the operator to take control of the system with TPM. You use this option to clear 
security settings for a newly initialized system or to clear a system for which the TPM 
ownership security key was lost. 
4.4  Intel® Trusted Execution Technology 
The Intel® Xeon® Processor E5-4600/2600/2400/1600 v3 and v4 product families support 
Intel® Trusted Execution Technology (Intel® TXT), which is a robust security environment. 
Designed to help protect against software-based attacks, Intel® Trusted Execution Technology 
integrates new security features and capabilities into the processor, chipset, and other 
platform components. When used in conjunction with Intel® Virtualization Technology, Intel® 
Trusted Execution Technology provides hardware-rooted trust for your virtual applications. 
This hardware-rooted security provides a general-purpose, safer computing environment 
capable of running a wide variety of operating systems and applications to increase the