Dell Trusted Device Event Repository Configuration Guide v7.2

PDF

Introduction

The Dell Trusted Device is part of the Dell SafeBIOS product portfolio. The Dell Trusted Device includes the following:

  • BIOS Events & Indicators of Attack
  • Image Capture
  • Intel ME Verification
  • Secured Component Verification (On Cloud)
  • Security Risk Protection Score
  • Dell Event Repository and SIEM integration
    NOTE:DTD v6.4 is the last version to support Dell Event Repository. This feature is not available in the DTD later releases.

BIOS Events & Indicators of Attack enables administrators to analyze events in the Windows Event Viewer that may indicate bad actors targeting BIOS on enterprise endpoints. Bad actors change BIOS attributes to gain access to enterprise computers locally or remotely. These attack vectors can be monitored then mitigated through the BIOS Events & Indicators of Attack features' ability to monitor BIOS attributes.

Secured Component Verification (On Cloud) is a supply-chain assurance offering that enables you to verify the integrity of the components inside your Dell computer.

Security Risk Protection Score enables administrators to determine the security risk level of computers in their enterprise. Dell Trusted Device scans for security solutions and assigns a score per overall risk assessment.


对此内容评级

准确性
有用性
易理解性
这篇文章对您有帮助吗?
0/3000 characters
  请提供评级(1-5星)。
  请提供评级(1-5星)。
  请提供评级(1-5星)。
  请选择这篇文章是否有帮助。
  注释中不得包含以下特殊字符:<>()\