LKBEN11736: How to read the BIOS from an HP computer via powershell?
Symptom
You need to check some BIOS settings with the windows powershell.
Cause
This is used in enterprises.
Solution
The proposed method depends on your computer, the age and the BIOS of your computer. This solution will only work on HP systems. For other manufactures, please lookup the namespace.
To enumerate all the BIOS settings you can use the following command:
Get-WmiObject -Namespace root/hp/instrumentedBIOS -Class hp_biosEnumeration|Select-Object Name, currentvalue, possiblevalues
This will show you a list of the settings and will look like this:
Name currentvalue
---- ------------
Configure Legacy Support and Secure Boot Legacy Support Disable and Secure Boot Enable
Import Custom Secure Boot keys Do Nothing
Clear Secure Boot keys Disable
Reset Secure Boot keys to factory defaults Disable
Enable MS UEFI CA key Yes
Custom Keys Image Verification State No Custom Keys
Ready to disable MS UEFI CA Key Ready
System Management Command Enable
Fast Boot Enable
Audio Alerts During Boot Enable
Manufacturing Programming Mode Lock
Permanent Disable Absolute Persistence Module Set Once No
Absolute Persistence Module Current State Inactive
Startup Menu Delay (sec.) 5
TPM Activation Policy No prompts
TCG event log format SHA-1
Physical Presence Interface Disable
Prompt on Network Controller Configuration Change Disable
Select Language English
Select Keyboard Layout English
Save/Restore MBR of System Hard Drive Disabled
Drivelock Password on restart Enable
Native OS Firmware Update Service Enable
Dust Filter Disable
Dust Filter Reminder (Days) 60
BIOS Rollback Policy Unrestricted Rollback to older BIOS
Prompt for Admin password on F9 (Boot Menu) Disable
Prompt for Admin password on F11 (System Recovery) Disable
Prompt for Admin password on F12 (Network Boot) Disable
Wake on LAN Power-on Password Policy Bypass Password
Prompt for Admin password on Capsule Update Disable
SureStart Production Mode Enable
Verify Boot Block on every boot Disable
BIOS Data Recovery Policy Automatic
Lock BIOS Version Disable
Dynamic Runtime Scanning of Boot Block Disable
Video Memory Size 32 MB
CD-ROM Boot Enable
USB Storage Boot Enable
Network (PXE) Boot Enable
Restrict USB Devices Allow all USB Devices
Configure Storage Controller for RAID Disable
At least one symbol is required in Administrator and User passwords No
At least one number is required in Administrator and User passwords No
At least one upper case character is required in Administrator and User passwords No
At least one lower case character is required in Administrator and User passwords No
Are spaces allowed in Administrator and User passwords? No
Force Check on Reboot Disable
Update BIOS via Network Enable
Update Source HP
Automatically Check for Updates Monthly
Automatic BIOS Update Setting Disable
Use Proxy Disable
IPv4 Configuration Automatic
Connected BIOS Enable
DNS Configuration Automatic
Force HTTP no-cache Disable
Clear password jumper Honor
PCI Express Power Management Enable
Audio Device Enable
Internal Speakers Enable
Front USB Ports Enable
Front USB Port 1 Enable
Front USB Port 2 Enable
Front USB Port 3 Enable
Front USB Port 4 Enable
Rear USB Ports Enable
Rear USB Port 1 Enable
Rear USB Port 2 Enable
Rear USB Port 3 Enable
Rear USB Port 4 Enable
Rear USB Port 5 Enable
Rear USB Port 6 Enable
USB Charging Ports Enable
Prompt on Memory Size Change Enabled
Prompt on Fixed Storage Change Disabled
PCI Express x16 Slot 1 Enable
PCI Express x1 Slot 1 Enable
PCI Express x1 Slot 2 Enable
PCI Express x4 Slot 1 Enable
Runtime Power Management Enable
Extended Idle Power States Enable
After Power Loss Power Off
Active Management (AMT) Enable
USB Key Provisioning Support Disable
Unconfigure AMT on next boot Do Not Apply
SOL Terminal Emulation Mode ANSI
Verbose Boot Messages Disable
Watchdog Timer Enable
OS Watchdog Timer (min.) 5
BIOS Watchdog Timer (min.) 5
USB Redirection Support Enable
Show Unconfigure ME Confirmation Prompt Enable
Wireless Manageability Enable
CIRA Timeout (min.) 1 min
Turbo-boost Enable
Hyperthreading Enable
Multi-processor Enable
Virtualization Technology (VTx) Enable
Virtualization Technology for Directed I/O (VTd) Enable
Trusted Execution Technology (TXT) Enable
Intel Software Guard Extensions (SGX) Enable
S5 Maximum Power Savings Disable
Sunday Disable
Monday Disable
Tuesday Disable
Wednesday Disable
Thursday Disable
Friday Disable
Saturday Disable
Diagnostics URL Enable
Allow PCIe/PCI SERR# Interrupt Enable
Unique Sleep State Blink Rates Disable
I/O Address A Default
Interrupt A Default
I/O Address B Default
Interrupt B Default
I/O Address C Default
Interrupt C Default
I/O Address D Default
Interrupt D Default
SATA0 Device available
SATA1 Device available
SATA2 Device available
SATA Power Management Enable
Media Card Reader/SD_RDR USB Enable
Power Button Override 4 sec
POST Prompt for RAID Configuration Enable
Power On from Keyboard Ports Enable
Configure Option ROM Launch Policy All UEFI
NumLock on at boot Disable
Serial Port A Enable
Wake On LAN Boot to Network
Embedded LAN controller Enable
Save Custom Defaults Do not Save
Apply Custom Defaults and Exit No
Apply Factory Defaults and Exit No
Legacy Boot Options Enable
UEFI Boot Options Enable
TPM Device Available
TPM State Enable
Clear TPM No
Hope this helps.
Disclaimer:
The information provided in this document is intended for your information only. Lubby makes no claims to the validity of this information. Use of this information is at own risk!About the Author
Author:
- Keskon GmbH & Co. KGWim Peeters is electronics engineer with an additional master in IT and over 30 years of experience, including time spent in support, development, consulting, training and database administration. Wim has worked with SQL Server since version 6.5. He has developed in C/C++, Java and C# on Windows and Linux. He writes knowledge base articles to solve IT problems and publishes them on the Lubby Knowledge Platform.
Latest update: 25-07-2024