• Table of Contents
  • Security Features Implemented in EDK II
  • Signed Firmware Updates
  • Enabling UEFI Secure Boot
  • How to add Secure Boot to DSC and FDF
  • Download PDF with examples
  • Enable User Identification
  • Enabling Trusted Compute Module (TPM)
  • Additional Notes