English Spanish
Click 'Customize before install', then select 'Finish'
On the 'Overview' screen, Change the 'Firmware' field to select the 'UEFI x86_64' option.
Click 'Begin Installation'
The boot screen you'll see should use `linuxefi` commands to boot the installer, and you should be able to run `efibootmgr` inside that system, to verify that you're running an UEFI OS.
virt-install
Add `--boot uefi` to your `virt-install` command. Example:
` sudo virt-install --name f20-uefi \` + `   --ram 2048 --disk size=20 \` + `   --boot uefi \` + `   --location `https://dl.fedoraproject.org/pub/fedora/linux/releases/22/Workstation/x86_64/os/[`https://dl.fedoraproject.org/pub/fedora/linux/releases/22/Workstation/x86_64/os/`]
Testing Secureboot in a VM
These steps describe how to test Fedora Secureboot support inside a KVM VM. The audience here is QA folks that want to test secureboot, and any other curious parties. This requires configuring the VM to use UEFI, so it builds upon the previous UEFI steps.
Run EnrollDefaultKeys.efi
(Formerly this article recommended the independent utility "LockDown_ms.efi".)
Since OVMF doesn't ship with any SecureBoot keys installed, we need to install some to mimic what an MS certified UEFI machine will ship with. OVMF now ships with the binaries required to set up a default set of keys. The easiest way is to use UefiShell.iso which is available at `/usr/share/edk2/ovmf/UefiShell.iso`. Boot your VM with this as the CD-ROM image and it should boot into the UEFI shell. At the prompt
Shell> fs0:
FS0:\> EnrollDefaultKeys.efi
FS0:\> reset
The VM will restart. Let it boot into Fedora as normal. Log in
You should see the string 'Secure boot enabled' in dmesg. Secureboot is now enabled for every subsequent boot.
Testing Fedora CD/DVD Secure Boot in a VM
Once you have a secureboot configured VM as described above, it's easy to use this to test ISO media secureboot support.
Use virt-manager to attach the ISO media to your VM