Users Guide

Table Of Contents
Chapter 1: Introduction to Dell Command | Configure 4.4.............................................................. 5
Whats new in this release.................................................................................................................................................5
Other documents you may need......................................................................................................................................6
Accessing documents from the Dell EMC support site........................................................................................6
Chapter 2: Windows SMM Security Mitigations Table (WSMT) Compliance for Dell Command
| Configure 4.4........................................................................................................................... 7
Chapter 3: Using user interface for Dell Command | Configure 4.4................................................ 8
Accessing Dell Command | Configure within Windows system................................................................................8
Accessing Dell Command | Configure within Linux..................................................................................................... 8
Files and folders of Dell Command | Configure ...........................................................................................................8
Accessing the Dell Command | Configure GUI............................................................................................................. 9
Creating a BIOS package using the GUI........................................................................................................................ 9
Configure the general settings................................................................................................................................. 10
Configuration options..................................................................................................................................................10
Configuring the setup, system, and hard disk drive passwords........................................................................ 11
Clearing setup, system and hard disk drive passwords using the existing password..................................12
Password protection screen......................................................................................................................................12
Configuring the autoon option.................................................................................................................................. 12
Configuring the bootorder option.............................................................................................................................13
Boot order screen........................................................................................................................................................ 13
Adding a new device to the boot order.................................................................................................................. 14
Boot order type.............................................................................................................................................................14
Configuring the primarybatterycfg option............................................................................................................. 14
Configuring the advbatterychargecfg option........................................................................................................15
Configuring the peakshiftcfg option........................................................................................................................15
Password Configuration option................................................................................................................................ 16
Configuring the keyboardbacklightcolor option....................................................................................................16
Advanced System Management..................................................................................................................................... 17
Setting the non-critical threshold values................................................................................................................17
BIOS option validation.......................................................................................................................................................18
Validating a multiplatform package or saved package........................................................................................ 18
Validating a local system package............................................................................................................................18
Exporting the BIOS configuration.................................................................................................................................. 18
Exporting the SCE (.EXE) file................................................................................................................................... 19
Exporting the configuration without setting values............................................................................................ 19
Target system configuration.......................................................................................................................................... 20
Applying INI or CCTK file........................................................................................................................................... 20
Applying a shell script on Linux................................................................................................................................ 20
Applying a SCE file...................................................................................................................................................... 20
Log details in Package History........................................................................................................................................21
Viewing a log file...........................................................................................................................................................21
Deleting log details.......................................................................................................................................................21
Contents
Contents 3