White Papers
Table Of Contents
- Dell Trusted Device Installation and Administrator Guide v3.2
- Contents
- Introduction
- Requirements
- Download the Software
- Verify the Installation Package
- Installation
- Uninstall Trusted Device
- BIOS Verification
- Image Capture
- BIOS Events & Indicators of Attack
- Security Risk Protection Score
- Integration
- Run the BIOS Verification Agent
- Results, Troubleshooting, and Remediation
BIOS Verification
BIOS Verification provides customers with affirmation that devices are secured below the operating system, a place where IT
administrator visibility is lacking. It enables customers to verify BIOS integrity using an off-host process without interrupting
the boot process. After the Trusted Device agent runs on the endpoint, a pass or fail result (0 or 1) displays in some of these
locations:
● Web browser
● Command-Line
● Registry entry
● Event Viewer
● Logs
BIOS Verification runs every 24 hours by default. For Command-Line parameters, see Run the BIOS Verification Agent.
7
20 BIOS Verification