White Papers
Table Of Contents
- Dell Trusted Device Installation and Administrator Guide v3.2
- Contents
- Introduction
- Requirements
- Download the Software
- Verify the Installation Package
- Installation
- Uninstall Trusted Device
- BIOS Verification
- Image Capture
- BIOS Events & Indicators of Attack
- Security Risk Protection Score
- Integration
- Run the BIOS Verification Agent
- Results, Troubleshooting, and Remediation
Security Risk Protection Score
Security Risk Protection Score enables administrators to determine the security risk level of computers in their enterprise.
Trusted Device scans and detects the below security solutions and assigns a score per overall risk assessment.
● Anti-virus
●
BIOS administrator password
● BIOS Verification
● Disk encryption
● Firewall
● Indicators of Attack
● TPM use
Trusted Device scans for the presence and status of each security solution every 24 hours, and 15 minutes after the Trusted
Device agent restarts. For each component, Trusted Device writes a timestamped pass, pass with warnings, or fail, and
comprehensive score to the Windows Event Viewer. For more information, see Results, Troubleshooting, and Remediation.
NOTE: BIOS Events & Indicators of Attack must be supported on the target computer to be included in the Security Risk
Protection Score calculation.
10
Security Risk Protection Score 23