Siirry pääsisältöön
  • Tee tilauksia nopeasti ja helposti
  • Tarkastele tilauksia ja seuraa lähetyksen tilaa
  • Luo tuoteluettelo ja käytä sitä
  • Hallitse Dell EMC-sivustoja, tuotteita ja tuote-tason yhteystietoja yrityksen hallinnan avulla.

What is Dell Trusted Device

Yhteenveto: Dell Trusted Device (formerly Dell BIOS Verification) can be used to validate that a BIOS has not been compromised or corrupted.

Tämä artikkeli on saatettu kääntää automaattisesti. Jos sinulla on palautetta sen laadusta, ilmoita siitä meille käyttämällä tämän sivun alareunassa olevaa lomaketta.

Artikkelin sisältö


Oireet

Dell Trusted Device (formerly Dell BIOS Verification) is part of the Dell SafeBIOS product portfolio. The Dell Trusted Device agent includes BIOS Verification, Image Capture, and BIOS Events & Indicators of Attack. BIOS Verification provides customers with affirmation that devices are secured below the operating system, a place where IT administrator visibility is lacking. It enables customers to verify BIOS integrity using an off-host process without interrupting the boot process. After the Dell Trusted Device agent runs on the endpoint, a pass or fail result (0 or 1) displays in some of these locations:

  • Web browser
  • Command line
  • Registry entry
  • Event Viewer
  • Logs BIOS

Events & Indicators of Attack enables administrators to analyze events in the Windows Event Viewer that may indicate bad actors targeting BIOS on enterprise endpoints. Bad actors change BIOS attributes to gain access to enterprise computers locally or remotely. These attack vectors can be monitored and then mitigated through the BIOS Events & Indicators of Attack features' ability to monitor BIOS attributes.

The earliest version of the agent, Dell BIOS Verification, performed off-host comparisons of the local BIOS to a known-good BIOS from Dell.


Affected Products:

  • Dell Trusted Device Agent
  • Dell BIOS Verification
  • Workspace ONE
  • CrowdStrike Falcon
  • SecureWorks Managed EDR
  • VMware Carbon Black Cloud
  • Secureworks Taegis XDR

Affected Versions:

  • v1.0 and Later

Affected Platforms:

  • Latitude
  • OptiPlex
  • Precision
  • XPS

Affected Operating Systems:

  • Windows

Syy

Not applicable

Tarkkuus

The following are common questions that are asked about Dell Trusted Device:

Note: Some questions may redirect you to a different page due to the complexity or length of the answer.

Dell Trusted Device can be downloaded from Support for Trusted Device. For more information, reference How to Download Dell Trusted Device.

Dell Trusted Device can be downloaded from Support for Trusted Device. For more information, reference How to Download Dell Trusted Device.

Once downloaded, Dell Trusted Device can be installed using information from How to Install Dell Trusted Device.

The version of Dell Trusted Device can be identified through the UI, CLI, or the installer. For more information, reference How to Identify the Dell Trusted Device Version.

Dell Trusted Device can be installed on Windows. For more information, reference How to Install Dell Trusted Device.

Different exclusions must be added depending on the version of Dell Trusted Device. For more information, reference Anti-virus Exclusions for Dell Trusted Device.

Dell Trusted Device's BIOS verification uses return codes to represent each possible result. For more information, reference How to Run BIOS Verification Using Dell Trusted Device.

If BIOS image results fail, reference How to Recover the BIOS on a Dell Computer or Tablet. Reference Dell BIOS and UEFI Updates for more information about the Dell BIOS.

Dell Data Security signing certificate information is made available along with the version in which each signing certificate is used. For more information, reference Dell Data Security Signing Certificate Updates.

The log collection process for Dell Trusted Device requires enabling verbosity, reproducing the issue, and then collecting the logs. For more information, reference How to Collect Dell Trusted Device Logs.

For phone-based support, reference Dell Data Security International Support Phone Numbers.

Workspace ONE can implement a Trusted Device check against Dell computers through the Workspace ONE agent. Workspace ONE leverages Dell Trusted Device, found on https://www.dell.com/support/home/. For more information, reference How to Download Dell Trusted Device.

CrowdStrike Falcon Sensor performs a customized Firmware Verification check that validates against the list of known-good BIOS Checksums that Dell maintains for their partners. This data can be fed to SecureWorks Managed Endpoint Detection and Response (EDR) from CrowdStrike.

Note: SecureWorks integration requires an active CrowdStrike subscription.

To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

Artikkelin ominaisuudet


Tuote, johon asia vaikuttaa

OptiPlex, XPS, Latitude, XPS, Fixed Workstations, Mobile Workstations, Dell Trusted Device

Edellinen julkaisupäivä

17 huhtik. 2024

Versio

21

Artikkelin tyyppi

Solution