Dell Trusted Device Event Repository Configuration Guide v7.2

PDF

Introduction

The Dell Trusted Device is part of the Dell SafeBIOS product portfolio. The Dell Trusted Device includes the following:

  • BIOS Events & Indicators of Attack
  • Image Capture
  • Intel ME Verification
  • Secured Component Verification (On Cloud)
  • Security Risk Protection Score
  • Dell Event Repository and SIEM integration
    NOTE:DTD v6.4 is the last version to support Dell Event Repository. This feature is not available in the DTD later releases.

BIOS Events & Indicators of Attack enables administrators to analyze events in the Windows Event Viewer that may indicate bad actors targeting BIOS on enterprise endpoints. Bad actors change BIOS attributes to gain access to enterprise computers locally or remotely. These attack vectors can be monitored then mitigated through the BIOS Events & Indicators of Attack features' ability to monitor BIOS attributes.

Secured Component Verification (On Cloud) is a supply-chain assurance offering that enables you to verify the integrity of the components inside your Dell computer.

Security Risk Protection Score enables administrators to determine the security risk level of computers in their enterprise. Dell Trusted Device scans for security solutions and assigns a score per overall risk assessment.


このコンテンツを評価する

正確
有益
分かりやすい
この記事は役に立ちましたか?
0/3000 characters
  1~5個の星の数で評価してください。
  1~5個の星の数で評価してください。
  1~5個の星の数で評価してください。
  この記事は役に立ちましたか?
  コメントでは、以下の特殊文字は利用できません: <>()\