
Dell Trusted Device Event Repository Configuration Guide v7.2
Introduction
The Dell Trusted Device is part of the Dell SafeBIOS product portfolio. The Dell Trusted Device includes the following:
- BIOS Events & Indicators of Attack
- Image Capture
- Intel ME Verification
- Secured Component Verification (On Cloud)
- Security Risk Protection Score
- Dell Event Repository and SIEM integration
NOTE:DTD v6.4 is the last version to support Dell Event Repository. This feature is not available in the DTD later releases.
BIOS Events & Indicators of Attack enables administrators to analyze events in the Windows Event Viewer that may indicate bad actors targeting BIOS on enterprise endpoints. Bad actors change BIOS attributes to gain access to enterprise computers locally or remotely. These attack vectors can be monitored then mitigated through the BIOS Events & Indicators of Attack features' ability to monitor BIOS attributes.
Secured Component Verification (On Cloud) is a supply-chain assurance offering that enables you to verify the integrity of the components inside your Dell computer.
Security Risk Protection Score enables administrators to determine the security risk level of computers in their enterprise. Dell Trusted Device scans for security solutions and assigns a score per overall risk assessment.