White Papers

Chapter 1: Introduction................................................................................................................. 5
Contact Dell ProSupport....................................................................................................................................................5
Chapter 2: Requirements.............................................................................................................. 6
Prerequisites......................................................................................................................................................................... 7
Platforms............................................................................................................................................................................... 7
Ports....................................................................................................................................................................................... 9
Operating Systems..............................................................................................................................................................9
Chapter 3: Download the software............................................................................................... 10
Chapter 4: Verify the installation package....................................................................................12
Chapter 5: Installation................................................................................................................. 13
Interactive installation.......................................................................................................................................................13
Check installed version interactively....................................................................................................................... 16
Check the installed version with command line....................................................................................................16
Command line installation................................................................................................................................................ 16
Deployment and collection...............................................................................................................................................18
Chapter 6: Uninstall Trusted Device.............................................................................................19
Uninstall from Apps & features ..................................................................................................................................... 19
Uninstall from the command line....................................................................................................................................19
Chapter 7: BIOS Verification....................................................................................................... 20
Chapter 8: Image Capture............................................................................................................ 21
Chapter 9: BIOS Events & Indicators of Attack............................................................................22
Chapter 10: Security Risk Protection Score................................................................................. 23
Chapter 11: Intel ME Verification................................................................................................. 24
Chapter 12: Integration............................................................................................................... 25
SIEM..................................................................................................................................................................................... 25
Requirements............................................................................................................................................................... 25
Carbon Black....................................................................................................................................................................... 31
Chapter 13: Run the BIOS Verification Agent............................................................................... 33
Run the BIOS Verification Agent Interactively...........................................................................................................33
Run the BIOS Verification Agent with Command Line.............................................................................................35
Commonly Used Scenarios............................................................................................................................................. 36
Contents
Contents 3