跳转至主要内容

Dell Trusted Device Technical Advisories v7.1

PDF

Technical Advisories

The Dell Trusted Device (DTD) is part of the Dell SafeBIOS product portfolio. The Dell Trusted Device includes the following:

  • BIOS Verification
  • BIOS Events & Indicators of Attack
  • Image Capture
  • Intel ME Verification
  • Security Risk Protection Score
  • Secured Component Verification (On Cloud)
  • CVE Detection for BIOS and Firmware

The Dell Trusted Device is part of the Dell SafeBIOS product portfolio. The Dell Trusted Device includes the following: BIOS Verification provides customers with affirmation that devices are secured below the operating system, a place where IT administrator visibility is lacking. It enables customers to verify BIOS integrity using an off-host process without interrupting the boot process. After the Dell Trusted Device runs on the endpoint, a pass or fail result (0 or 1) displays in some of these locations:

  • Web browser
  • Command line
  • Registry entry
  • Event Viewer
  • Logs

BIOS Events & Indicators of Attack enables administrators to analyze events in the Windows Event Viewer that may indicate bad actors targeting BIOS on enterprise endpoints. Bad actors change BIOS attributes to gain access to enterprise computers locally or remotely. These attack vectors can be monitored then mitigated through the BIOS Events & Indicators of Attack features' ability to monitor BIOS attributes.

The Intel Management Engine (Intel ME) is an independent microcontroller that is built into Intel processor chipsets manufactured starting in 2008. Intel ME provides an interface between the operating system, hardware, and BIOS. Additionally, Intel ME is granted extensive system-level privilege and runs in every power state. The Dell Trusted Device scans and verifies that Intel ME firmware is present and untampered.

Security Risk Protection Score enables administrators to determine the security risk level of computers in their enterprise. Dell Trusted Device scans for security solutions and assigns a score per overall risk assessment.

Secured Component Verification (On Cloud) is a supply-chain assurance offering that enables you to verify the integrity of the components inside your Dell computer. Dell Trusted Device compares component details on your computer against an off-host certificate containing the unique system component IDs generated and signed by Dell during factory-assembly process. Secured Component Verification (On Cloud) verifies the following components:

  • Processor (CPU)
  • Trusted Platform Module (TPM) version 2.0
  • Fixed Storage
  • Onboard Networking
  • Memory (RAM)
  • Motherboard
  • System Information

Common Vulnerabilities and Exposures (CVE) is a standardized list of publicly disclosed security flaws, maintained by the U.S. National Vulnerability Database. Each CVE is assigned a unique ID, enabling consistent identification and communication of security issues. With Dell Trusted Device (DTD) 7.0, the solution is enhanced to detect and identify CVEs related to BIOS and firmware. It offers clear visibility into outstanding Dell Security Advisories (DSAs), helping users assess their system's security status. A DSA may encompass one or more CVEs.


对此内容评级

准确性
有用性
易理解性
这篇文章对您有帮助吗?
0/3000 characters
  请提供评级(1-5星)。
  请提供评级(1-5星)。
  请提供评级(1-5星)。
  请选择这篇文章是否有帮助。
  注释中不得包含以下特殊字符:<>()\