Users Guide

Sanitize
Both erase methods can be executed using BIOS setup options. User can choose to perform an erase on all or a subset of
installed DCPMMs.
Crypto erase
The Crypto Erase function erases the App-direct Region Key (PM-RK) forcing the system to reboot.
Cryptographic erase option can be accessed by going to: System BIOS Settings > Memory Settings > Persistent Memory
> Intel Persistent Memory > Persistent Memory DIMM Configuration
Figure 13. Crypto erase
NOTE:
It is not recommended to erase part of DCPMMs installed on the system when App-direct interleaved region is
configured. This operation renders all the data on the interleave set invalid.
Sanitize
DCPMM Sanitization is a long operation which runs on all the selected persistent memories in parallel.
This process does a cryptographic erase first and writes zeros to all accessible persistent media regions on the DCPMM. Also, it
destroys any existing memory goal contents.
The region of the DCPMM where the goal is configured will be empty and on the next boot the memory will default to 100%
Memory Mode. If the system does not have the proper ratio of RDIMM or LRDIMM memory to DCPMM, it is expected on the
following boot for an error to occur indicating that the ratio is not optimized.
Sanitize option can be accessed by going to: System BIOS Settings > Memory Settings > Persistent Memory
30
DCPMM security