White Papers
Table Of Contents
- Dell Trusted Device Installation and Administrator Guide v3.2
- Contents
- Introduction
- Requirements
- Download the Software
- Verify the Installation Package
- Installation
- Uninstall Trusted Device
- BIOS Verification
- Image Capture
- BIOS Events & Indicators of Attack
- Security Risk Protection Score
- Integration
- Run the BIOS Verification Agent
- Results, Troubleshooting, and Remediation
Chapter 1: Introduction................................................................................................................. 5
Contact Dell ProSupport....................................................................................................................................................5
Chapter 2: Requirements.............................................................................................................. 6
Prerequisites......................................................................................................................................................................... 7
Platforms............................................................................................................................................................................... 7
Ports....................................................................................................................................................................................... 9
Operating Systems..............................................................................................................................................................9
Chapter 3: Download the Software.............................................................................................. 10
Chapter 4: Verify the Installation Package................................................................................... 12
Chapter 5: Installation................................................................................................................. 13
Interactive Installation.......................................................................................................................................................13
Check Installed Version Interactively...................................................................................................................... 16
Check Installed Version With Command-line.........................................................................................................16
Command-Line Installation.............................................................................................................................................. 16
Deployment and Collection.............................................................................................................................................. 18
Chapter 6: Uninstall Trusted Device.............................................................................................19
Uninstall from Apps & Features .................................................................................................................................... 19
Uninstall from the Command-Line................................................................................................................................. 19
Chapter 7: BIOS Verification....................................................................................................... 20
Chapter 8: Image Capture............................................................................................................ 21
Chapter 9: BIOS Events & Indicators of Attack............................................................................22
Chapter 10: Security Risk Protection Score................................................................................. 23
Chapter 11: Integration................................................................................................................ 24
Carbon Black...................................................................................................................................................................... 24
Chapter 12: Run the BIOS Verification Agent...............................................................................25
Run the BIOS Verification Agent Interactively...........................................................................................................25
Run the BIOS Verification Agent with Command Line............................................................................................. 27
Commonly Used Scenarios..............................................................................................................................................28
Chapter 13: Results, Troubleshooting, and Remediation.............................................................. 29
Results................................................................................................................................................................................. 29
Troubleshooting..................................................................................................................................................................31
Contents
Contents 3