Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell PowerFlex Appliance with PowerFlex 4.x Administration Guide

Verify no hardware changes using secure component verification tool

Use the following procedure to verify no hardware changes using secure component verification tool.

Steps

  1. Download the Windows or Linux version of the secure component verification tool from the Dell Technologies support site.
  2. To run the secure component verification tool on Windows, double click the secure component verification software and click unzip.
    1. Navigate to the file path in file explorer, default c:\SecureComponentVerification, and click on setup to install.
    2. Click Next, accept the license, click Next > Install. Click Finish.
    3. In the command prompt, run the secure component verification commands using iDRAC credentials.

      C:\Users\Administrator>

      scv ValidateSystemInventory -r <idrac IP> -i

      Username: root

      Password:

    4. To check the logs, navigate to the file path that is displayed in the command prompt.
  3. To run secure component verification on Linux, in the terminal, navigate to the directory where iDRAC tools file is downloaded and unzip the file: # tar -xvf Dell-SCV-Web-LX-1.91.0-308_A00.tar.gz
    1. Navigate to the directory SCVTools after the files have been extracted and execute the install_scv.sh script using the command sh install_scv.sh.
      NOTE:To uninstall secure component verification tool you can use the command sh uninstall_scv.sh to execute the uninstall_scv.sh script.
    2. Once secure component verification tool is installed, run the command scv ValidateSystemInventory to start the validation process.
      NOTE:Use the command scv help to get more information on secure component verification tool and how to run it.
    3. To check the logs, navigate to the file path that is displayed in the command prompt.
  4. Once the system runs the secure component verification tool application successfully, it should give the result Validating System Inventory: Match and Mismatch if the component has mismatched.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\