User's Manual
Table Of Contents
- 1.1 Knowing BIOS
- 1.2 BIOS setup program
- 1.3 My Favorites
- 1.4 Main menu
- 1.5 Ai Tweaker menu
- 1.6 Advanced menu
- 1.6.1 Platform Misc Configuration
- 1.6.2 CPU Configuration
- 1.6.3 System Agent (SA) Configuration
- 1.6.4 PCH Configuration
- 1.6.5 PCH Storage Configuration
- 1.6.6 PCH-FW Configuration
- 1.6.7 Onboard Devices Configuration
- 1.6.8 APM Configuration
- 1.6.9 USB Configuration
- 1.6.10 Network Stack Configuration
- 1.6.11 HDD/SSD SMART Information
- 1.6.12 Intel(R) Rapid Storage Technology
- 1.6.13 Intel(R) Ethernet Connection (7) I219-V - 00:0C:6E:00:00:42
- 1.7 Monitor menu
- 1.8 Boot menu
- 1.9 Tool menu
- 1.10 Exit menu
- 1.11 Updating BIOS
ROG STRIX H370-F GAMING BIOS Manual
59
KEK Management
The Key Exchange Keys (KEK) manages the Signature database (db) and Forbidden
Signature database (dbx).
Key Exchange Keys (KEK) refers to Microsoft
®
Secure Boot Key-Enrollment Key (KEK).
Save to file
This item allows you to save the KEK to a USB storage device.
Set New key
This item allows you to load the downloaded KEK from a USB storage
device.
Append Key
This item allows you to load the additional KEK from a storage device for
an additional db and dbx loaded management.
Delete key
This item allows you to delete the KEK from your system.
Conguration options: [Yes] [No]
The KEK le must be formatted as a UEFI variable structure with time-based authenticated
variable.
DB Management
The Authorized Signatures (db) lists the signers or images of UEFI applications,
operating system loaders, and UEFI drivers that you can load on the single computer.
Save to file
This item allows you to save the db to a USB storage device.
Set New key
This item allows you to load the downloaded db from a USB storage
device.
Append Key
This item allows you to load the additional db from a storage device for an
additional db and dbx loaded management.
Delete key
This item allows you to delete the db le from your system.
Conguration options: [Yes] [No]
The db le must be formatted as a UEFI variable structure with time-based authenticated
variable.
DBX Management
The Forbidden Signature database (dbx) lists the forbidden images of db items that are
no longer trusted and cannot be loaded.
Save to file
This item allows you to save the dbx to a USB storage device.