Table 71. System Security details (continued)Option Descriptionsystem creates a random delay for power up. When this option is set to User Defined,the system delay time is manually to power up.User Defined Delay (120s to600s)Sets the User Defined Delay option when the User Defined option for AC PowerRecovery Delay is selected. The actual AC recovery time needs to add iDRAC root oftrust time (around 50 seconds).UEFI Variable Access Provides varying degrees of securing UEFI variables. When set to Standard (thedefault), UEFI variables are accessible in the operating system per the UEFIspecification. When set to Controlled, selected UEFI variables are protected in theenvironment and new UEFI boot entries are forced to be at the end of the current bootorder.In-Band Manageability Interface When set to Disabled , this setting hides the Management Engine's (ME), HECI devices,and the system's IPMI devices from the operating system. This prevents the operatingsystem from changing the ME power capping settings, and blocks access to all in-band management tools. All management should be managed through out-of-band. Thisoption is set to Enabled by default.NOTE: BIOS update requires HECI devices to be operational and DUP updatesrequire IPMI interface to be operational. This setting needs to be set to Enabled toavoid updating errors.SMM Security Mitigation Enables or disables the UEFI SMM security mitigation protections. It is set to Disabledby default.Secure Boot Enables Secure Boot, where the BIOS authenticates each pre-boot image by using thecertificates in the Secure Boot Policy. Secure Boot is set to Disabled by default.Secure Boot Policy When Secure Boot policy is set to Standard, the BIOS uses the system manufacturer’skey and certificates to authenticate pre-boot images. When Secure Boot policy is set toCustom, the BIOS uses the user-defined key and certificates. Secure Boot policy is setto Standard by default.Secure Boot Mode Configures how the BIOS uses the Secure Boot Policy Objects (PK, KEK, db, dbx).If the current mode is set to Deployed Mode, the available options are User Mode andDeployed Mode. If the current mode is set to User Mode, the available options areUser Mode, Audit Mode, and Deployed Mode.Below are the details of different boot modes available in the Secure Boot Modeoption.User Mode In User Mode, PK must be installed, and BIOS performssignature verification on programmatic attempts to updatepolicy objects. The BIOS allows unauthenticated programmatictransitions between modes.Audit mode In Audit Mode, PK is not present. BIOS does not authenticateprogrammatic update to the policy objects and transitionsbetween modes. The BIOS performs a signature verification onpre-boot images and logs the results in the image ExecutionInformation Table, but executes the images whether they passor fail verification. Audit Mode is useful for programmaticdetermination of a working set of policy objects.Deployed Mode Deployed Mode is the most secure mode. In Deployed Mode,PK must be installed and the BIOS performs signature verificationon programmatic attempts to update policy objects. DeployedMode restricts the programmatic mode transitions.Secure Boot Policy Summary Specifies the below list of certificates and hashes that secure boot uses to authenticateimages:Platform Key (PK)66 Pre-operating system management applications