Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell Trusted Device Installation and Administrator Guide v5.5

Image Capture

Administrators can capture images of corrupted or tampered BIOS for analysis and remediation. When run, Trusted Device queries the EFI (Extensible Firmware Interface) partition for a corrupt or tampered image. If an image is detected, it is copied from the EFI partition to %PROGRAMDATA%\Dell\TrustedDevice\ImageCapture. If off-host verification fails, Trusted Device copies corrupt or tampered images from memory to %PROGRAMDATA%\Dell\TrustedDevice\ImageCapture. Image Capture data is retained for 200 days.

Administrators can invoke image capture, configure captured image storage locations, and export most recent or all images. Each captured image is signed and named based on the following:

  • If copied from the EFI partition - BIOSImageCaptureMMDDYYYY_HHMMSS.rcv
  • If copied from memory - BIOSImageCaptureBVSMMDDYYYY_HHMMSS.bv

MMDDYYYY is the date and HHMMSS is the time of image copy. For Command-Line parameters, see Run the BIOS Verification Agent.

For more information about Image Capture and the Windows Registry, see Results, Troubleshooting, and Remediation .


Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\