Dell Command | Configure Version 4.
Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2020 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries.
Contents 1 Introduction to Dell Command | Configure 4.3.................................................................................5 What’s new in this release....................................................................................................................................................5 Other documents you may need.........................................................................................................................................
Troubleshooting scenarios in Dell Command | Configure 4.3........................................................... 21 Contacting Dell.....................................................................................................................................................................22 5 Third-party licenses....................................................................................................................
1 Introduction to Dell Command | Configure 4.3 Dell Command | Configure is a software package that provides a simple configuration capability for client systems. You can easily configure client systems using a User Interface (UI) or a Command Line Interface (CLI). Dell Command | Configure supports the following Windows and Linux operating systems: Windows 7, Windows 8, Windows 8.
• The Dell Command | Configure Command Line Interface Reference Guide provides information about configuring the BIOS options on supported Dell client systems. The Release Notes documentation is available as part of the Dell Command | Configure download on dell.com/ dellclientcommandsuitemanuals, provides the latest available information for the installation and operation of Dell Command | Configure .
2 Windows SMM Security Mitigations Table (WSMT) Compliance for Dell Command | Configure 4.3 The Windows (SMM) Security Mitigations Table contains information about the ACPI table that was created for the Windows operating system, which supports Windows virtualization-based security (VBS) features. Dell Command | Configure is WSMT compatible. This is used for configuring the platform features on Dell Client Systems with WSMT enabled BIOS.
3 Using graphical user interface for Dell Command | Configure 4.3 Dell Command | Configure Graphical User Interface (Dell Command | Configure GUI) displays all BIOS configurations that are supported by Dell Command | Configure . Using the Dell Command | Configure GUI, you can perform the following: • • • Create BIOS configuration for client systems. For more information, see Creating a BIOS Package using GUI. Validate the BIOS configuration against the BIOS configuration of the host system.
Table 1. Files and folders of Dell Command | Configure Files/Folders Description Dell Command | Configure Command Prompt Allows access to the Dell Command | Configure command prompt. Dell Command | Configure Wizard Allows access to the Dell Command | Configure GUI. Dell Command | Configure WINPE Allows access to the Windows PE scripts to create a bootable image. For more details, see the Dell Command | Configure Installation Guide available at dell.com/ dellclientcommandsuitemanuals .
• • Configuring peak shift battery charging Configuring keyboard backlight color option Configuration options You can customize the BIOS settings and create a configuration package using the available configuration options that are described in the following table: Table 2. Configuration options Options Description View/Change Click to view or change the selected configuration and load a new configuration. When you click View/ Change to load a new configuration, the configuration screen is displayed.
Options Description NOTE: The Status column is displayed only when you validate. Configuring the setup, system, and hard disk drive passwords You can set or change the setup password (setuppwd) also known as BIOS password, the system password (syspwd), and the hard disk drive password (hddpwd). To edit the setup, system, or hard disk drive password: 1. In the Edit mode, click the Value to Set text box of the required option. The corresponding password screen is displayed.
• • • Create Multiplatform Package Create Local System Package Open a Saved Package NOTE: To open a saved package, click Open a Saved Package, browse to the file location, and then click Open. 2. Click Edit, or double-click the option. 3. In the autoon option row, click View/Change in the Value to set column. The auto on screen is displayed. 4. Select one of the following options from Auto On screen: • • • • Disabled — To turn off the feature.
Options Description Device Instance Displays a unique number to identify the device on the system. Shortform Displays the short form of the device name. If the system has many devices of the same device type, and then the short form of the device is displayed with a . notation. For example, if the system has an internal hard drive, eSATA HDD, and eSATA Dock HDD, and then the short forms are displayed as hdd.1, hdd.2, and hdd.3 respectively.
4. Select the mode to charge the battery in the Primary Battery screen. • • • • • Standard Charge — Charges the battery over a longer period of time. Express Charge — Charges the battery using the express charging algorithm, Dell's fast charging technology. AC Use — Charges the battery while plugged-in. Auto Charge — Charges the battery based on a periodic evaluation of battery usage to deliver the best balance capacity. Custom Charge — The battery charging starts and stops based on user settings.
2. Click Edit, or double-click the option. 3. In the peakshiftcfg option row, click View/Change in the Value to set column. The Peak Shift screen is displayed. 4. Enable the peak shift settings option. 5. Select the day of the week. NOTE: To apply the same settings to all the days select the Apply these settings to other days option. 6. From the Operate only on battery drop-down list, select the time from when you want the system to operate only on battery. 7.
NOTE: To open a saved package click Open a Saved Package, browse to the file location and then click Open. 2. Click Edit or double-click the option. 3. In the keyboardbacklightcolor option row, click View/Change in the Value to set column. The Keyboard Backlight Color screen is displayed. 4. Select the colors that you want to enable for the keyboard backlight from the list Enable. NOTE: • You can select and enable multiple colors at a time. • If you select None, no color will be enabled.
5. To set the non-critical threshold value for the listed probes, provide the value in the respective column. 6. To delete a probe, click X mark. 7. Click OK. 8. To apply the modifications, export the configuration in ,ini or .exe format. See, Exporting the BIOS configuration. BIOS option validation You can validate the options of a BIOS package against the configuration of the host system using the Validate option.
Figure 1. Password Reference Table For example, • • If the setup password is set in the system, and you want to configure BIOS tokens/features, you need to provide setup password. If the setup and system passwords are set in the system, and you want to configure BIOS tokens/features, you need to provide setup password.
To apply INI file or CCTK file, run cctk -i . NOTE: For systems running Ubuntu Core operating system, copy the file at var/snap/dcc/current and run, dcc.cctk -i /var/snap/dcc/current/.ini Applying a shell script on Linux 1. Copy the script to a system running the Linux operation system. 2. Run dos2unix on the system. 3. Run the script as: sh Applying a SCE file NOTE: You must have Administrator privileges.
Related Links: • • Viewing a log file Deleting log details Viewing a log file Click Package History, on the Dell Command | Configure page. Deleting log details On the Package History page, click the Clear Log. Providing feedback on Dell Command | Configure You can provide feedback on the Dell Command | Configure using the link on Dell Command | Configure GUI. 1. Click the Give us your feedback link to launch the online survey page. 2. Provide your feedback and satisfactory ratings. 3.
4 Troubleshooting scenarios in Dell Command | Configure 4.3 Running Dell Command | Configure displays error messages If you get the error message, Required BIOS interface not found or HAPI load error. and then uninstall and reinstall Hardware Application Programming Interface (HAPI). Running Dell Command | Configure on 32-bit and 64-bit Windows supported system Ensure that you are running cctk.exe based on the architecture of the system.
1. If not set, set the BIOS password on the system. Type: cctk --setuppwd= 2. If not enabled, enable TPM. by typing the following command: cctk --tpm=on 3. Reboot the system. 4. To activate TPM, type the following command: cctk --tpmactivation=activate --valsetuppwd= 5. Reboot the system without interruption till the operating system loads. 6. To check the status of TPM. type: cctk --tpmactivation The status is displayed as activate.
5 Third-party licenses The table provides the details about third-party licenses. Table 4. Third-party licenses Sl No Component name Version License type 1 mini-XML(mxml1 library) 2.6 GNU Library General Public License version 2 (LGPL2) 2 miniunz.exe no version zlib license 3 zlibwapi.dll 1.2.3 zlib license 4 zip.exe no version zlib license 5 PiePiece.cs 0 Copyright (c) 2014 AlphaSierraPapa for the SharpDevelop Team 6 getoptl.c 1.15 Copyright (c) 2000 The NetBSD Foundation, Inc.
freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights.
work under the scope of this License. 3. You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library. To do this, you must alter all the notices that refer to this License, so that they refer to the ordinary GNU General Public License, version 2, instead of to this License. (If a newer version than version 2 of the ordinary GNU General Public License has appeared, then you can specify that version instead if you wish.
or unenforceable under any particular circumstance, the balance of the section is intended to apply, and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices.
This software is provided 'as-is', without any express or impliedwarranty. In no event will the authors be held liable for any damagesarising from the use of this software.Permission is granted to anyone to use this software for any purpose,including commercial applications, and to alter it and redistribute itfreely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software.