What is Dell Trusted Device
Zusammenfassung: Dell Trusted Device (formerly Dell BIOS Verification) can be used to validate that a BIOS has not been compromised or corrupted.
Weisungen
Dell Trusted Device (formerly Dell BIOS Verification) is part of the Dell SafeBIOS product portfolio. Dell Trusted Device includes BIOS Verification, Image Capture, and BIOS Events & Indicators of Attack. BIOS Verification provides customers with affirmation that devices are secured below the operating system, a place where IT administrator visibility is lacking. It enables customers to verify BIOS integrity using an off-host process without interrupting the boot process. After the Dell Trusted Device agent runs on the endpoint, a pass or fail result (0 or 1) displays in some of these locations:
- Web browser
- Command line
- Registry entry
- Event Viewer
- Logs BIOS
Events & Indicators of Attack enables administrators to analyze events in the Windows Event Viewer that may indicate bad actors targeting BIOS on enterprise endpoints. Bad actors change BIOS attributes to gain access to enterprise computers locally or remotely. These attack vectors can be monitored and then mitigated through the BIOS Events & Indicators of Attack features' ability to monitor BIOS attributes.
The earliest version of the agent, Dell BIOS Verification, performed off-host comparisons of the local BIOS to a known-good BIOS from Dell.
Affected Products:
- Dell Trusted Device
- CrowdStrike Falcon
Affected Versions:
- v1.0 and Later
Affected Platforms:
- Dell Pro Desktops
- Dell Pro Laptops
- Dell Pro Max Desktops
- Dell Pro Max Laptops
- Latitude
- OptiPlex
- Precision
- XPS
Affected Operating Systems:
- Windows 11
The following are common questions that are asked about Dell Trusted Device:
How do I download Dell Trusted Device?
Dell Trusted Device can be downloaded from Support for Trusted Device. For more information, refer to How to Download Dell Trusted Device.
How do I reinstall Dell Trusted Device if Dell Trusted Device was preinstalled?
Dell Trusted Device can be downloaded from Support for Trusted Device. For more information, refer to How to Download Dell Trusted Device.
Once downloaded, Dell Trusted Device can be installed using information from How to Install Dell Trusted Device.
How do I identify the version of Dell Trusted Device?
The version of Dell Trusted Device can be identified through the UI, CLI, or the installer. For more information, refer to How to Identify the Dell Trusted Device Version.
How do I install Dell Trusted Device?
Dell Trusted Device can be installed on Windows. For more information, refer to How to Install Dell Trusted Device.
How do I exclude Dell Trusted Device from my antivirus?
Different exclusions must be added depending on the version of Dell Trusted Device. For more information, refer to Antivirus Exclusions for Dell Trusted Device.
How do I run BIOS verification using Dell Trusted Device?
Dell Trusted Device’s BIOS verification can be run through the user interface (UI) or through command-line interface (CLI). For more information, refer to How to Run BIOS Verification Using Dell Trusted Device.
What do the results from BIOS verification using Dell Trusted Device mean?
Dell Trusted Device's BIOS verification uses return codes to represent each possible result. For more information, refer to How to Run BIOS Verification Using Dell Trusted Device.
How do I remediate a compromised BIOS?
If BIOS image results fail, refer to Recover BIOS on Dell Computer or Tablet After Boot or POST Failure. Refer to the BIOS Update Guide for more information about the Dell BIOS.
What code-signing certificates do Dell Data Security products use?
Dell Data Security signing certificate information is made available along with the version in which each signing certificate is used. For more information, refer to Dell Data Security Signing Certificate Updates.
How can I find the Dell Trusted Device logs?
The log collection process for Dell Trusted Device requires enabling verbosity, reproducing the issue, and then collecting the logs. For more information, refer to How to Collect Dell Trusted Device Logs.
How do I get support for Dell Trusted Device?
- Information for Dell Trusted Device can be found at Support for Dell Trusted Device.
- For phone-based support, refer to Dell Data Security International Support Phone Numbers.
What products can use Dell Trusted Device?
- Microsoft Intune: Dell Trusted Device uses PowerShell scripts and agent-level configuration to communicate endpoint compliance. For more information, refer to the Dell Trusted Device Installation and Administrator Guide at Support for Dell Trusted Device - Manuals and Documents.
- CrowdStrike: CrowdStrike provides verification of the integrity and validity of the BIOS image on Dell hosts by using enhanced telemetry from Dell Trusted Device. For more information, refer to Stomp Out BIOS-Level Threats with Hardware-Assisted Security.
To contact support, refer to Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.