Prepare your endpoints to allow Server & Workload Protection to support Secure Boot.
Important
|
Before you start, make sure to download the Trend Micro public keys and the required CA certificates.
Procedure
- On the endpoint you want to enable Secure Boot, install the Machine Owner Key (MOK)
command
mokutil.For example, on Red Hat Enterprise Linux, type the command:yum install mokutilFor Debian or Ubuntu, type the commands:sudo apt-get update sudo apt-get install efitools
- Add the Trend Micro public keys to the MOK list.Separate multiple keys with a space. For example:mokutil --import /opt/ds_agent/secureboot/DS2022.der /opt/ds_agent/secureboot/DS20_v2.derWhen prompted, provide a password. Make sure to save the password, or use a password you can remember. The endpoint requires the password to enroll the keys in a later step.
- Reboot the endpoint.When the endpoint restarts, the Shim UEFI key management console appears.
- Press any key to continue.
- On the Perform MOK management screen, select Enroll MOK.
- If you need to verify the certificate hashes of the public keys, select View key X.
- On the Enroll the key(s)? screen, select Continue.
- Select Yes, and provide the password you configured previously.
- On the The system must now be rebooted screen, select OK to confirm your changes and reboot.
- After the endpoint finishes rebooting, verify the keys are successfully enrolle din
the MOK list.On most operating systems, use the command mokutil --test-key /opt/ds_agent/${certificate_file}.derFor Debian 11, use the command keyctl show %:.platform | grep 'Trend'
