Dell Trusted Device Security Score Overview in the TechDirect Console
Summary: In-depth details are needed regarding the Security score data shown in the TechDirect console to help interpret the endpoint security state more thoroughly.
Instructions
Affected Products:
- Dell Trusted Device
- SupportAssist for Business PCs
- TechDirect
Background
The TechDirect console, at the Connect and Manage screen, can show a Security score. The goal is to add additional background information to assist with a better understanding of the security score results.
Security score is based on data collected by Dell Trusted Device (DTD), which makes DTD a prerequisite for Security Score calculation within TechDirect Connect and Manage. Also, customers can download DTD with SupportAssist or separately.
Back To Top
TechDirect Dashboard
The Security score data is shown in the Overview section. The presentation of Security score data is dependent upon service plan. For information regarding service plans, reference SupportAssist for Business PCs with Windows OS Administrator Guide page 8.
| Capability | Description | Contract Expired | Basic | ProSupport | ProSupport Plus and ProSupport Flex for Client |
|---|---|---|---|---|---|
| Security | Track and manage the security of a single computer and your computer fleet. | No | Limited support | Yes | Yes |
- Limited support for devices with Basic warranty support means that only the security status is displayed for the device.
- The factors affecting the security score for a device with Basic warranty support are not displayed within SupportAssist in TechDirect Connect and Manage.
In the dashboard, the security number (88, in the example below) is an over-all calculation regarding the security of the fleet. This would be an average of the security scores reported by Dell Trusted Device. The fleet calculation is performed each day based on the latest data available. The weekly fleet scores are calculated on Saturday in US Central time. The calculations are based on machines that report DTD security score data.


t
The message below is displayed, which indicates general information regarding the Security Score calculation.

Security Score Calculation Factors
- BIOS verification: The BIOS checksums have been verified against a known catalog.
- BIOS admin password set: In the BIOS, the admin password is set.
- BIOS Indicators of Attack detections: Indicators of Attack (IoAs) occur when one or more BIOS attributes are set to specific values, and can create an attack vector. This would be an attack chain, where the number of BIOS attributes can be one or more, creating a chain. More information about IoAs, see Indicators of Attack section below.
- Anti-virus, firewall, and disk encryption: These fundamental protections are part of the security score calculation.
- Trusted platform module (TPM): This is a hardware component that is used to securely store data used for functions like encryption, authentication, and is also part of the security score calculation.
- Intel ME Verification: Intel Management Engine (ME) verification is part of the security score calculation.
- Fleet and computer security ratings:
- 70-100: Minimal risk
- 50-69: Needs attention
- 0-49: Security is at risk to potential threats
- Data unavailable: Data was not received from the computer
The Risk and Needs attention indicators are links that provide additional details around the machines that fall into the two categories.
Following the Risk Security Alert
The Fleet security ratings are shown in the Security section of the Fleet Overview.

- Click PCs Risk to get more information about the computers at risk.

Note: The Security Score column can be sorted by clicking the Security score label, until the values are in ascending order, the machines with the most risk listed first. - Click the Service Tag link.

- Clicking on Risk, in the Security Box, shows the data related to the security score definition.
Note: This information relates back to the overall fleet security score definition.
The Security score, using DTD data can identify issues. For further assistance with troubleshooting and remediation, reference the Dell Trusted Device Installation and Administrator Guide.
Following the Needs Attention Security Alert
- Click PCs Needs attention, displays the Security screen.

Note:- The Security Score column can be sorted by clicking the Security score label, until the values are in ascending order, the machines with the most risk listed first.
- The list of devices and data in the view above can be exported using the Export CSV button shown in the screen capture above.
- Click a Service Tag.
Note: This information relates back to the overall fleet security score definition.
Additional Data on the Security Score
Investigation of the factors affecting the Security Score can be assisted using the information in the section Remediation Assistance and IoAs, in the Windows Events associated to the Security Score Results section.
To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.