White Papers
Table Of Contents
- Dell Trusted Device Installation and Administrator Guide v3.6
- Contents
- Introduction
- Requirements
- Download the software
- Verify the installation package
- Installation
- Uninstall Trusted Device
- BIOS Verification
- Image Capture
- BIOS Events & Indicators of Attack
- Security Risk Protection Score
- Intel ME Verification
- Integration
- Run the BIOS Verification Agent
- Results, troubleshooting, and remediation
BIOS Verification
BIOS Verification provides customers with affirmation that devices are secured below the operating system, a place where IT
administrator visibility is lacking. It enables customers to verify BIOS integrity using an off-host process without interrupting
the boot process. After the Trusted Device agent runs on the endpoint, a pass or fail result (0 or 1) displays in some of these
locations:
● Web browser
● Command-Line
● Registry entry
● Event Viewer
● Logs
BIOS Verification runs every 24 hours by default. For Command-Line parameters, see Run the BIOS Verification Agent. For
additional information including types of events and event location, see Results, Troubleshooting, and Remediation.
7
20 BIOS Verification