Dell Trusted Device (formerly Dell BIOS Verification) can be used to validate that a BIOS has not been compromised or corrupted. Learn about the exclusions that must be added in your anti-virus by an administrator to run Dell Trusted Device without conflicts.
Anti-virus exclusions differ between versions of Dell Trusted Device. Select the appropriate version for more information. For more information about product versioning, reference How to Identify the Dell Trusted Device Version.
Folders to Exclude:
C:\Program Files\DELL\TrustedDevice C:\ProgramData\Dell\BiosVerification C:\ProgramData\Dell\TrustedDevice
Files and Processes to Exclude:
C:\Program Files\DELL\TrustedDevice\ClientConsole\Dell.TrustedDevice.Console.exe C:\Program Files\DELL\TrustedDevice\Dell.SecurityCenter.Agent.Console.exe C:\Program Files\DELL\TrustedDevice\Dell.TrustedDevice.Service.Console.exe C:\Program Files\DELL\TrustedDevice\Dell.TrustedDevice.Service.exe C:\Program Files\DELL\TrustedDevice\DCF.Agent.exe C:\Windows\System32\drivers\DellBV.sys C:\Windows\System32\drivers\dtdsel.sys
File Types to Exclude
.bv
Folders to Exclude:
C:\Program Files\DELL\TrustedDevice C:\ProgramData\Dell\BiosVerification C:\ProgramData\Dell\TrustedDevice
Files and Processes to Exclude:
C:\Program Files\DELL\TrustedDevice\Dell.SecurityCenter.Agent.Console.exe C:\Program Files\DELL\TrustedDevice\Dell.TrustedDevice.Service.Console.exe C:\Program Files\DELL\TrustedDevice\Dell.TrustedDevice.Service.exe C:\Program Files\DELL\TrustedDevice\DCF.Agent.exe C:\Windows\System32\drivers\DellBV.sys C:\Windows\System32\drivers\dtdsel.sys
File Types to Exclude:
.bv
Folders to Exclude:
C:\Program Files\DELL\BIOSVerification C:\ProgramData\Dell\BiosVerification
Files and Processes to Exclude:
C:\Program Files\DELL\TrustedDevice\Dell.SecurityCenter.Agent.Console.exe C:\Program Files\DELL\TrustedDevice\DCF.Agent.exe C:\Windows\System32\drivers\DellBV.sys
File Types to Exclude:
.bv
To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.