Quantcast
Channel: Enterprise Client - Wiki
Viewing all 1843 articles
Browse latest View live

Dell Command | Configure

$
0
0
Revision 39 posted to Enterprise Client - Wiki by Tarun Kr Agrawal on 1/9/2017 9:07:31 AM

Overview

Dell Command | Configure is a packaged software application that provides configuration capability to business client platforms.

This product consists of a Command Line Interface (CLI) and Graphical User Interface (GUI) to configure various BIOS features. Dell Command | Configure supports following Windows and Linux operating systems: Windows 7, Windows 8, Windows 8.1, and Windows 10, Windows Pre-installation Environment (Windows PE), Red Hat Enterprise Linux 6, Red Hat Enterprise Linux 7, and Ubuntu Desktop 16.04.

This is the 3.2 version of Dell Command | Configure.

 

Downloads

 

New in the Release

  • New platforms.
  • Support for SMBIOS 3.0
  • Updated the default installation path for Linux as/opt/dell/dcc.
  • Support for following new BIOS features/attributes:
    • Determining if BIOS should attempt to boot from the legacy boot list when the UEFI boot list fails (--attemptlegacyboot).
    • Configuring the Active State Power Management (ASPM) level (--aspm).

    • Configuring the automatic BIOS recovery without any user interaction if BIOS corruption is detected (--biosautorecovery).
    • Configuring the BIOS connect feature (--biosconnect).
    • Configuring the state of the available BiosConnect boot paths (--biosconnectactivation).
    • Allowing or restricting downgrading of the system BIOS (--biosdowngrade).
    • Configuring the BIOS integrity check during the booting process (--biosintegritycheck).
    • Allowing or restricting the BIOS event log to be cleared on the next boot (--bioslogclear).
    • Configuring the visibility of BIOS settings (--biossetupadvmode).
    • Configuring the time-out value for the keyboard backlight when an AC adapter is plugged into the system (--brightnessac).
    • Configuring the panel brightness to be used when the system is using battery power only (--brightnessbattery).
    • Configuring the Reliability Availability Serviceability (RSA) support on CPUs (--cpursa).
    • Configures the CPU snoop mode (--cpusnoop).
    • Configuring the platform external displays (--dgpuexterndisplay).
    • Configuring Configures the dock battery charge mode (--dockbattchrgcfg).
    • Allowing or restricting to use the docking station in the absence of AC power while the battery is charged for more than specified percentage (--docksupportonbattery).
    • Configuring the fan speed control if the fan speed is set to Auto using fanspeed attribute (--fanspeedctrllevel).
    • Configuring whether to clear the fault tolerant memory log during the next boot (--faulttolerantmemlogclear).
    • Configuring the full screen logo that appears during BIOS POST (--fullscreenlogo)
    • Configuring GPS WWAN Radio (--gpsonwwanradio).
    • Configuring System Isochronous mode (--isochronous).
    • Configuring the time-out value for the keyboard backlight when an AC adapter is plugged into the system (--kbdbacklighttimeoutac).
    • Configuring the time-out value for the keyboard backlight when the system is running only on battery power (--kbdbacklighttimeoutbatt).
    • Configuring lid switch functions (--lidswitch).
    • Configuring the liquid cooler 1, and the liquid cooler 2 (--liquidcooler1, and --liquidcooler2).
    • Configuring M2 PCIE SSD 0 and M2 PCIE SSD 1 (--m2pciessd0, and --m2pciessd1).
    • Configuring the master password settings (--masterpwdlockout).
    • Configuring the time limit value of the memory fault tolerance (--memfaulttoltimelmt).
    • Configuring Reliability Availability Serviceability (RSA) support on memory modules (--memoryrsa).
    • Configuring the memory performance monitor feature (--memperformancemonitor).
    • Configuring the Reliability Availability Serviceability (RSA) support on PCIe devices (--pciersa).
    • Allows or restricts the power event log to be cleared on the next boot (--powerlogclear).
    • Configuring the Stealth Mode control of the Intel 8260 card (--poweroffintel8260stealthmode).
    • Configuring the Dell recovery tool (--recoverytool).
    • Allowing or restricting the system to boot from SD card (--sdcardboot).
    • Configuring the read-only mode for SD card (--sdcardreadonly).
    • Configures Secure Guard Extensions (SGX) feature (--secureguardext).
    • Indicating that the power button has been pressed during POST (--signoflifeindication).
    • Determining which sleep mode to be used by the operating system (--sleepmode).
    • Configuring the boot flow for SupportAssist OS recovery tool in the event of certain system errors (--supportassistosrcvry).
    • Deleting the service OS non-volatile region (--svcosclear).
    • Allows or restricts the thermal event log to be cleared on the next boot (--thermallogclear).
    • Configuring the thunderbolt controller in the system (--thunderbolt).
    • Configuring the thunderbolt security level (--thunderboltsecuritylevel).
    • Configuring the maximum power for type-C connector (--typecbtryovrldprotection).
    • Determining whether the system should prompt the user to enter the Admin password, if set, while booting from a UEFI boot path from the F12 Boot Menu (--uefibootpathsecurity).
    • Configuring the provisioning of Intel AMT from a USB storage device (--usbprovision).
    • Configuring the USB wake from s4 power state of the system (--usbwakefroms4)
  • Support for additional possible values for the following BIOS features/attributes:
    • --cpucore
    • --speaker
    • --primaryvideodeviceslot
    • --processorcorecount
  • Withdrawal of support for the following BIOS features/attributes:
    • --clearsel
    • --speakervol

 

Previous Releases

Dell Command | Configure 3.1.2

Dell Command | Configure 3.1

Dell Command | Configure 3.0

 

Video

1. Activating the TPM with Dell Command | Configure

(Please visit the site to view this video)

 

2. Setting the BIOS defaults using Dell Command | Configure

 (Please visit the site to view this video)

 

White Papers

will be posted soon.....

Tags: bios, cctk, DCCS, BIOS Configuration Tool, Dell Client Command Suite, DCC, system management, Dell Command | Configure, Dell Command Suite

Dell Family Driver Packs

$
0
0
Current Revision posted to Enterprise Client - Wiki by Tyler McLaughlin on 1/10/2017 5:35:55 PM

The driver packs on this page work with ImageAssist, KACE, MDT& SCCM deployments.  They are consolidated, combining models by generation rather than being model specific.  These packs are developed and sustained by Dell's Global Configuration Services group.  For support, please post comments directly to this page.

Drivers used during the development process have been tested and qualified by our Dell Product Group for both platform and factory integration.  There are times when newer drivers are provided by vendors, but in order to get these drivers to customers more quickly they are validated and posted online to support.dell.com.  (where Dell Command Update pulls from) These updated drivers if deemed required or critical will be tested, validated and integrated into the factory process during a future release.  Hence, there may be a delta between when a driver is ‘web-posted’ to support.dell.com and when it gets added to the relevant driver package.

Turn on page notifications for updates. (bottom right - requires logging in.)

Windows 7 Family Packs

Note: For Windows 7 & M.2 NVMe native support refer to the following articles:

Custom Images, OEM Images, MDT 2013, SCCM 2007, SCCM 2012

 More information on NVMe @ http://www.dell.com/nvme-support

Latitude & Mobile PrecisionBit LevelIncluded ModelsWindows 7
M3800X64M3800,M3800TB, M3800TBT, M3800TA04 (05/04/15)
E8 Latitude FamilyX643350,3470,3570,E5270,E5470,E5570,E7270,E7470,7370A21 (11/03/16)
X863350,E3350,3470,3570,E5270,E5470,E5570,E7270,E7470
E8 Latitude Rugged FamilyX647414,5414,7214A05 (11/17/16)
X867414,5414,7214
E7 Latitude FamilyX643160,3460,3560A12 (11/15/16)
X863160,3460,3560
MWS6 Precision Mobile Workstation X645510,7710,7510,3510A14 (12/08/16)
E6 Latitude FamilyX643150,3450,3550,E5250,5250,E5450,5450,E5550,5550,E7250,7250,E7450,7450A21 (12/01/16)
X863450,3550,E5250,5250,E5450,5450,E5550,5550,E7250,7250,E7450,7450
E6 Family XFRX645404,7204,7404A06 (11/23/16)
X865404,7204,7404
MWS5 Precision Mobile WorkstationX64M2800,M4800,M6800A15 (08/01/16)
X86M2800,M4800,M6800
E5 Latitude 3x40 X643340 ,3440 ,3540A11 (02/03/16)
X863340, 3440, 3540
E5 Latitude Family X64E5440,E5540,E6440,E6540,E7240,E7440A16 (02/09/15)
X86E5440,E5540,E6440,E6540,E7240,E7440
E4 Latitude Family X643330,6430U,E5430,E5530,E6230,E6330,E6430,E6430s,E6530,M4700,M6700  A14 (12/11/14)
X863330,6430U,E5430,E5530,E6230,E6330,E6430,E6430s,E6530,M4700,M6700  
E3 Latitude Family X6413,E5420,E5420m,E5520,E6220,E6320,E6420,E6520,M4600,M6600,XT2 A02 (01/23/13)
X8613,E5420,E5420m,E5520,E6220,E6320,E6420,E6520,M4600,M6600,XT2
E2 Latitude Family X64E4310,E5410,E5510,E6410,E6510,M4500,M6500 A02 (06/23/14)
X86E4310,E5410,E5510,E6410,E6510,M4500,M6500,Z600 
E1 Latitude Family X64E4200,E4300,E6400,E6500,M2400,M4400,M6400 A03 (06/19/14)
X86E4200,E4300,E5400,E5500,E6400,E6500,M2400,M4400,M6400
OptiPlexBit LevelIncluded ModelsWindows 7
D7 OptiPlex Family X643040,3240,7040,5040,7440AIO,3046A14 (10/27/16)
X863040,3240,7040,5040,7440AIO,3046
D6 OptiPlex Family X643030,7020,9030,3030AIO,9030AIO,3020M,9020M  A17 (10/26/16)
X863030,7020,9030,3030AIO,9030AIO,3020M,9020M  
D5 OptiPlex 3011X643011,3011 AIO,3011AIO,3011-AIOA04 (02/17/15)
X863011,3011 AIO,3011AIO,3011-AIO
D5 OptiPlex Family X649020,9020AIO,XE2,3020A28 (10/24/16)
X869020,9020AIO,XE2,3020
D4 OptiPlex Family X643010,7010,9010,9010AIOA07 (05/30/14)
X863010,7010,9010,9010AIO
D3 OptiPlex Family X64390,790,990A03 (07/12/13)
X86390,790,990
D2 OptiPlex Family X64380,780,980,XEA01 (10/08/12)
X86380,780,980,XE
D1 OptiPlex Family X64760,960A01 (10/08/12)
X86360,760,960
Precision WorkstationBit LevelIncluded ModelsWindows 7
WS7 Precision WS FamilyX643420,3620 A11 (10/26/16)
X863420,3620 
WS6 Precision WS FamilyX64R7910,T5810,T7810,T7910,R7910XL,T5810XL,T7810XL,T7910XL,7910,5810,7810 A19 (12/06/16)
WS5 Precision WS FamilyX64R7610,T1700,T3610,T5610,T7610 A15 (06/26/16)
X86R7610,T1700,T3610,T5610,T7610 
WS4 Precision WS FamilyX64T1600,T1650,T3600,T5600,T7600 A05 (05/30/14)
X86T1600,T1650,T3600,T5600,T7600 
WS3 Precision WS FamilyX64R5400,R5500,T3500,T5500,T7500A01 (10/08/12)
X86R5400,R5500,T3500,T5500,T7500
XPS NotebookBit LevelIncluded ModelsWindows 7
XPS4 Familyx64139350A06 (12/02/16)
XPS3 FamilyX649343,139343A02 (07/22/15)
X869343, 139343 
XPS2 FamilyX649333,139333,15-9530,159530,9530A03 (04/22/15)
X869333, 139333 
XPS1 FamilyX64L321X,L322X,L421X,L521X A01 (01/08/13)
X86L321X,L322X 

Windows 8.1 Family Packs
Latitude & Mobile PrecisionBit LevelIncluded ModelsWindows 8.1
M3800X64M3800,M3800TB, M3800TBT, M3800TA04 (05/04/15)
MWS7 Precision  Mobile WorkstationX643420,3620A03 (10/14/15)
E8 Latitude FamilyX643350,E3350,3470,3570,E5270,E5470,E5570,E7270,E7470,7370A12 (11/29/16)
E8 Latitude Tablet FamilyX645175,5179,7275,E7275A09 (11/29/16)
E7 Latitude FamilyX643160,3460,3560A08 (10/26/16)
MWS6 Precision  Mobile WorkstationX64159550,5510,7710,7510,3510A10 (12/08/16)
E6 Latitude FamilyX643150,3450,3550,E5250,5250,E5450,5450,E5550,5550,7350,E7250,7250,E7450,7450A19 (10/25/16)
E6 Family XFRX647204,7404,Extreme,(5404),5404 A08 (06/20/16)
MWS5 Precision  Mobile WorkstationX64M2800,M4800,M6800 A10 (07/07/16)
X86M2800,M4800,M6800 
E5 Latitude 3x40 X643340, 3440, 3540 A07 (02/03/16)
E5 Latitude Family X64E5440,E5540,E6440,E6540,E7240,E7440  A08 (06/03/15)
X86E6440,E6540  
E4 Latitude Family X643330,6430U,E5430,E5530,E6230,E6330,E6430,E6430s,E6530,M4700,M6700A05 (12/11/14)
X866430U,E5430,E5530,E6230,E6330,E6430,E6430s,E6530,M4700,M6700 
OptiPlexBit LevelIncluded ModelsWindows 8.1
D7 OptiPlex Family X643040,3240,7040,5040,7440AIO,3046
A13 (10/27/16)
D6 OptiPlex Family X643030,7020,9030,3030AIO,9030AIO,3020M,9020MA15 (10/26/16)
X863030,7020,9030,3030AIO,9030AIO,3020M,9020M
D5 OptiPlex 3011X643011A00 (04/16/14)
D5 OptiPlex Family X649020,9020AIO,XE2,3020A13 (10/24/16)
D4 OptiPlex Family X643010,7010,9010-AIO,9010AIO,9010 A00 (01/07/14)
X863010,7010,9010-AIO,9010AIO,9010 
Precision WorkstationBit LevelIncluded ModelsWindows 8.1
WS7 Precision WS FamilyX643420,3620A09 (10/27/16)
WS6 Precision WS FamilyX64R7910,T5810,T7810,T7910,R7910XL,T5810XL,T7810XL,T7910XL,7910,T5810,7810 A14 (10/26/16)
WS5 Precision WS FamilyX64R7610,T1650,T1700,T3610,T5610,T7610 A14 (06/26/16)
X86R7610,T1650,T3610,T5610,T7610 
XPS NotebookBit LevelIncluded ModelsWindows 8.1
XPS4 FamilyX649350A08 (12/02/16)
XPS3 FamilyX649343, 139343A04 (07/22/15)
XPS1 FamilyX6415-9530,159530,9530,13-9333,139333,9333,12-9Q33,129Q33,9Q33,12-9Q23,129Q23,9Q23,11-9P33,119P33,9P33,A04 (04/23/15)
Venue ProBit LevelIncluded ModelsWindows 8.1
Venue Pro4 FamilyX645056,10PRO5056,5855,8PRO5855A07 (07/19/16)
Venue Pro3  FamilyX647140,11PRO7140A08 (08/25/16)
Venue Pro2  FamilyX645130, 7130, 7139 A17 (03/04/16)
X865130, 5830 


 NOTE: Windows 10 32-bit is not supported with ImageAssist.

Windows 10 Family Packs
Latitude & Mobile PrecisionBit LevelIncluded ModelsWindows 10
M3800X64M3800,M3800TB,M3800TBT,M3800TA00 (08/20/15)
E8 Latitude FamilyX643350,E3350,3470,3570,E5270,E5470,E5570,E7270,E7470,7370A12 (11/29/16)
E8 Latitude Rugged FamilyX647414,5414,7214A03 (11/17/16)
E8 Latitude Tablet FamilyX645175,5179,7275,E7275,3379A05 (11/22/16)
E7 Latitude FamilyX643160,3460,3560A07 (11/22/16)
MWS6 Precision Mobile WorkstationX64159550,5510,7710,7510,3510A11 (12/26/16)
E6 Family XFRX647204,7404,Extreme,(5404),5404A03 (11/17/16)
E6 Latitude FamilyX643150,3450,3550,E5250,5250,E5450,5450,E5550,5550,7350,E7250,7250,E7450,7450A10 (10/25/16)
MWS5 Precision  Mobile WorkstationX64M2800,M4800,M6800A02 (07/07/16)
E5 Latitude 3340X643340A01 (02/03/16)
OptiPlexBit LevelIncluded ModelsWindows 10
D7 OptiPlex FamilyX643040,3240,3240AIO,7040,5040,7440,7440AIO,3046A12 (10/27/16)
D6 OptiPlex Family X643030,7020,9030,3030AIO,9030AIO,3020M,9020MA07 (10/26/16)
D5 OptiPlex Family X643020,9020,9020AIO,XE2A07 (10/24/16)
D4 OptiPlex Family X643010,7010,9010,9010AIOA02 (04/13/16)
X863010,7010,9010,9010AIO
Precision WorkstationBit LevelIncluded ModelsWindows 10
WS7 Precision WS FamilyX643420,3620A09 (10/27/16)
WS6 Precision WS FamilyX64R7910,T5810,T7810,T7910,R7910XL,T5810XL,T7810XL,T7910XL,7910,5810,7810A08 (10/26/16)
 WS5 Precision WS FamilyX64  T1700A03   06/26/16
XPS NotebookBit LevelIncluded ModelsWindows 10
XPS5 FamilyX649360,9365A10 (10/25/16)
XPS4 FamilyX649250,9350A10 (12/02/16)
XPS3 FamilyX649343, 139343A00 (07/22/15)
XPS1 FamilyX6415-9530,159530,9530A01 (08/04/15)
Venue ProBit LevelIncluded ModelsWindows 10
Venue Pro2  FamilyX645130, 7130, 7139 A03 (03/04/16)
X865130, 5830 
Venue Pro3 FamilyX647140,11PRO7140A03 (03/04/16)

Venue Pro4 Family

X645056,10PRO5056,5855,8PRO5855A07 (07/27/16)

If looking for model specific driver packs, go to Command | Deploy Driver Packs for Enterprise Client OS Deployment

Ultimate VDI protection, end-to-end, from the edge all the way to the datacenter

$
0
0
Revision 17 posted to Enterprise Client - Wiki by Manish Chacko on 1/10/2017 7:25:10 PM

Proactively protect virtual desktops and thin clients

Viruses and malware continue to evolve with greater sophistication and more ways to infect organizations’ digital assets. Dell differentiates with a unique Advanced Threat Prevention (ATP) technology, using new dynamic mathematical models, artificial intelligence and machine learning that doesn’t depend on previously seen patterns and behaviors and doesn’t require human intervention. This enables a revolutionary level of security and management efficiency that extends into Windows Embedded thin clients and VDI hosted environments, in addition to conventional physical PCs.

(Please visit the site to view this video)

Protect virtual desktops

End users using virtual desktops can also be infected by a virus or malware, even though the risk is much lower than for those using physical PCs.

Dell Data Protection | Endpoint Security Suite Enterprise includes advanced threat prevention and enterprise-class encryption for both physical PCs and Windows virtual desktops running either on Citrix or VMware. Revolutionary advanced threat prevention offers unparalleled efficacy against zero-day threats, advanced persistent threats and commodity malware. In fact, testing shows that our protection prevents 99% of malware, far above the average 50% of threats identified by the top anti-virus solutions1. The suite is managed via a single, central console, greatly simplifying data security management and compliance reporting.

 

 

Protect Windows-based thin clients

The Dell Wyse zero clients and ThinOS based thin clients natively offer maximum security and are malware resistant with an unpublished API and zero attack surface. They thus do not need any threat protection solution.

Other thin clients running Windows® Embedded Standard™ (WES) can offer increased flexibility but require a more cautious approach to security as they can still be the target of cyber-attacks via malicious websites or locally through an installed web browser or an infected USB key. Advanced threat protection can now also be installed on Windows-based thin clients to prevent 99% of executable malware, far above the average 50% of threats identified by the top anti-virus solutions1.

Dell Data Protection | Threat Defense is the solution that offers 99% protection against viruses, malware and ransomware when using Dell Wyse thin clients running WES7/7p or Win10 IoT Enterprise. This solution can also protect traditional physical PCs, MacOS systems as well as servers running Microsoft Windows Server in the datacenter for VDI infrastructure.

 

 

Protect physical PCs

Dell Data Protection | Endpoint Security Suite Enterprise also provides advanced threat prevention, enterprise-class encryption, and authentication for Dell and non-Dell traditional computers running Windows. By choosing Dell, you have access to a single source for all your VDI security solutions, making BYOD initiatives easier to deploy, manage and control. Dell Data Protection offers an extended range of data security solutions for all endpoints to better protect your vital assets and your business.

 

 

Related item

Dell Data Security Solutions: www.dell.com/DataSecurity 


1 Results from Cylance Unbelievable Demo Tour, Austin, Houston and Dallas Texas, May 2015. Also based on Dell internal testing, November 2016.

Tags: Zero Day Attack, Dell Threat Defense, ESSE, DDP, anti virus

Dell Client Command Suite Webcast

$
0
0
Current Revision posted to Enterprise Client - Wiki by Warren Byle on 1/11/2017 4:53:08 AM

Join our weekly webcast to discuss the Dell Client Command Suite and other systems management topics of interest to Dell customers.  

When: Thursdays at 10am US Central Time (see schedule below for details) Download a calendar invite (.ics) here

Where: http://delltechcenter.adobeconnect.com/command/

Upcoming Webcast Topics

DateTopic
January 12th, 2017Managing UEFI Settings for Windows 10

Previously Recorded Webcasts

DateTopic (Click the link below to view the recording)
January 5th, 2017Command Suite Overview
December 8th, 2016OS Deployment Basics
December 1st, 2016Command Suite Overview
November 17th, 2016Installation Demo - Part 2
November 10th, 2016Installation Demo - SCCM integration
November 3rd, 2016Command Suite Overview
October 27th, 2016BIOS Configuration Deep Dive
October 20th, 2016Command Suite Overview
October 13th, 2016vPro Discussion
September 29th, 2016Open Discussion
September 22nd, 2016Dell Client Command Suite Overview and Demo
September 15th, 2016Dell Command | Update and Dell Command | Power Manager - Deep Dive
September 8th, 2016Dell Client Command Suite Demo
September 1st, 2016Dell Client Command Suite Demo and Discussion

Dell Factory Imaging and Microsoft Deployment Toolkit

$
0
0
Current Revision posted to Enterprise Client - Wiki by Tyler McLaughlin on 1/11/2017 10:13:44 PM

Did you know it’s possible to integrate your Microsoft Deployment Toolkitimage into the Dell Factory with Dell Configuration Services  The whitepaper in step 1 below will walk you through the steps for preparing your MDT OSD task sequence to be sent to Dell so it can be pre-installed in the Dell factory on any of your new ordered business corporate client systems.  

Take advantage of Dell’s factory dynamic driver injection where we install the latest factory promoted drivers when your systems are built and shipped.

  1. Whitepaper – Configure Microsoft Deployment Toolkit 2013 for Dell factory image load by Configuration Services / Custom Factory Integration
  2. User Forum

Enterprise ready drivers

Ready to send us your image?  If you do not have a contact, use the links below to send it to the appropriate region.

Want Dell to build your image?  Dell provides fee-based Image Management Services.  Use the appropriate link below to contact one of our regional IMS teams for more information.

 

Join one of our weekly live OS Imaging Solutions eSeminars. 

Go to http://events.dell.com/?lang=en and search keywords for "os imaging"

Dell Factory Imaging and Microsoft SCCM OSD

$
0
0
Current Revision posted to Enterprise Client - Wiki by Tyler McLaughlin on 1/11/2017 10:21:31 PM

Did you know it’s possible to integrate your Microsoft SCCM Operating System Deployment image into the Dell Factory with Dell Configuration Services  The whitepaper in step 1 below will walk you through the steps for preparing your SCCM OSD task sequence to be sent to Dell so it can be pre-installed in the Dell factory on any of your new ordered business corporate client systems.  

Take advantage of Dell’s factory dynamic driver injection where we install the latest factory promoted drivers when your systems are built and shipped.

  1. Whitepaper– Configure Microsoft SCCM Operating System Deployment 2012 for Dell factory image load by Configuration Services / Custom Factory Integration
  2. User Forum

Enterprise ready drivers

Ready to send us your image?  If you do not have a contact, use the links below to send it to the appropriate region.

Want Dell to build your image?  Dell provides fee-based Image Management Services.  Use the appropriate link below to contact one of our regional IMS teams for more information.

 

Join one of our weekly live OS Imaging Solutions eSeminars. 

Go to http://events.dell.com/?lang=en and search keywords for "os imaging"

Dell Command | Configure

$
0
0
Revision 13 posted to Enterprise Client - Wiki by Tarun Kr Agrawal on 1/13/2017 5:57:59 AM

Overview

Dell Command | Configure is a packaged software application that provides configuration capability to business client platforms.

This product consists of a Command Line Interface (CLI) and Graphical User Interface (GUI) to configure various BIOS features. Dell Command | Configure supports following Windows and Linux operating systems: Windows 7, Windows 8, Windows 8.1, and Windows 10, Windows Pre-installation Environment (Windows PE), Red Hat Enterprise Linux 6, Red Hat Enterprise Linux 7, and Ubuntu Desktop 16.04.

This is the 3.2 version of Dell Command | Configure.

 

Downloads

New in the Release

  • New platforms.
  • Support for SMBIOS 3.0
  • Updated the default installation path for Linux (RHEL and Ubuntu) as /opt/dell/dcc.
  • Support for following new BIOS features/attributes:
    • Determining if BIOS should attempt to boot from the legacy boot list when the UEFI boot list fails (--attemptlegacyboot).
    • Configuring the Active State Power Management (ASPM) level (--aspm).
    • Configuring the automatic BIOS recovery without any user interaction if BIOS corruption is detected (--biosautorecovery).
    • Configuring the BIOS connect feature (--biosconnect).
    • Configuring the state of the available BiosConnect boot paths (--biosconnectactivation).
    • Allowing or restricting downgrading of the system BIOS (--biosdowngrade).
    • Configuring the BIOS integrity check during the booting process (--biosintegritycheck).
    • Allowing or restricting the BIOS event log to be cleared on the next boot (--bioslogclear).
    • Configuring the visibility of BIOS settings (--biossetupadvmode).
    • Configuring the time-out value for the keyboard backlight when an AC adapter is plugged into the system (--brightnessac).
    • Configuring the panel brightness to be used when the system is using battery power only (--brightnessbattery).
    • Configuring the Reliability Availability Serviceability (RSA) support on CPUs (--cpursa).
    • Configures the CPU snoop mode (--cpusnoop).
    • Configuring the platform external displays (--dgpuexterndisplay).
    • Configuring Configures the dock battery charge mode (--dockbattchrgcfg).
    • Allowing or restricting to use the docking station in the absence of AC power while the battery is charged for more than specified percentage (--docksupportonbattery).
    • Configuring the fan speed control if the fan speed is set to Auto using fanspeed attribute (--fanspeedctrllevel).
    • Configuring whether to clear the fault tolerant memory log during the next boot (--faulttolerantmemlogclear).
    • Configuring the full screen logo that appears during BIOS POST (--fullscreenlogo)
    • Configuring GPS WWAN Radio (--gpsonwwanradio).
    • Configuring System Isochronous mode (--isochronous).
    • Configuring the time-out value for the keyboard backlight when an AC adapter is plugged into the system (--kbdbacklighttimeoutac).
    • Configuring the time-out value for the keyboard backlight when the system is running only on battery power (--kbdbacklighttimeoutbatt).
    • Configuring lid switch functions (--lidswitch).
    • Configuring the liquid cooler 1, and the liquid cooler 2 (--liquidcooler1, and --liquidcooler2).
    • Configuring M2 PCIE SSD 0 and M2 PCIE SSD 1 (--m2pciessd0, and --m2pciessd1).
    • Configuring the master password settings (--masterpwdlockout).
    • Configuring the time limit value of the memory fault tolerance (--memfaulttoltimelmt).
    • Configuring Reliability Availability Serviceability (RSA) support on memory modules (--memoryrsa).
    • Configuring the memory performance monitor feature (--memperformancemonitor).
    • Configuring the Reliability Availability Serviceability (RSA) support on PCIe devices (--pciersa).
    • Allows or restricts the power event log to be cleared on the next boot (--powerlogclear).
    • Configuring the Stealth Mode control of the Intel 8260 card (--poweroffintel8260stealthmode).
    • Configuring the Dell recovery tool (--recoverytool).
    • Allowing or restricting the system to boot from SD card (--sdcardboot).
    • Configuring the read-only mode for SD card (--sdcardreadonly).
    • Configures Secure Guard Extensions (SGX) feature (--secureguardext).
    • Indicating that the power button has been pressed during POST (--signoflifeindication).
    • Determining which sleep mode to be used by the operating system (--sleepmode).
    • Configuring the boot flow for SupportAssist OS recovery tool in the event of certain system errors (--supportassistosrcvry).
    • Deleting the service OS non-volatile region (--svcosclear).
    • Allows or restricts the thermal event log to be cleared on the next boot (--thermallogclear).
    • Configuring the thunderbolt controller in the system (--thunderbolt).
    • Configuring the thunderbolt security level (--thunderboltsecuritylevel).
    • Configuring the maximum power for type-C connector (--typecbtryovrldprotection).
    • Determining whether the system should prompt the user to enter the Admin password, if set, while booting from a UEFI boot path from the F12 Boot Menu (--uefibootpathsecurity).
    • Configuring the provisioning of Intel AMT from a USB storage device (--usbprovision).
    • Configuring the USB wake from s4 power state of the system (--usbwakefroms4)
  • Support for additional possible values for the following BIOS features/attributes:
    • --cpucore
    • --speaker
    • --primaryvideodeviceslot
    • --processorcorecount
  • Withdrawal of support for the following BIOS features/attributes:
    • --clearsel
    • --speakervol

 

Previous Releases

Dell Command | Configure 3.1.2

Dell Command | Configure 3.1

Dell Command | Configure 3.0

 

Video

1. Activating the TPM with Dell Command | Configure

(Please visit the site to view this video)

 

2. Setting the BIOS defaults using Dell Command | Configure

 (Please visit the site to view this video)

 

White Papers

will be posted soon.....

Dell Client Command Suite

$
0
0
Current Revision posted to Enterprise Client - Wiki by Tarun Kr Agrawal on 1/13/2017 6:03:30 AM

The Dell Client Command Suite is the new name of our industry leading Client Systems Management tools.  These tools make Dell commercial client systems the world's most manageable client devices.

Here's how the existing tools you know and trust are included in the Dell Client Command Suite.

Check out our weekly webcast on Thursdays at 10am Central.

Easy link for this page is http://Dell.com/Command

(Please visit the site to view this video)

Dell Client Command Suite

Click on a link below for more details 

Dell Command | Monitor

Dell Command | Configure

Dell Command | Deploy

Dell Command | Integration Suite for System Center 2012

Dell Command | Update Catalog

Dell Command | Update

Dell Command | Power Manager

Dell Command | Intel vPro Out of Band

Dell Command | KACE K1000 Express

Dell Command | PowerShell Provider


Dell Command | Integration Suite for System Center

$
0
0
Current Revision posted to Enterprise Client - Wiki by Warren Byle on 1/13/2017 5:56:07 PM

NOTE: We have done preliminary validation on the 1511, 1602, 1606 and 1610 versions of ConfigMgr and with the the exception of our vPro console, it works with the 4.2 version of our integration.

 

The Dell Command | Integration Suite for System Center 2012 replaces the Dell Client Integration Pack (DCIP) for Microsoft System Center Configuration Manager and is a part of the Dell Client Command Suite

Features include:

Download the Dell Command | Integration Suite for System Center 2012 4.2 (released May 2016)

Documentation links (Installation Guide, User Guide, Warranty User Guide)

New Features in 4.2

Enhancements to Catalog and Driver Cabs for download and processing
Enhancements to OS and Database permissions

New features in 4.1:

• Support for System Center 2012 R2
• Updated GUIs
• Support for Windows 10 WinPE
• Support for Dell Command | Intel(c) vPro(tm) Out of Band 2.1.0
• Updated Dell Command | WinPE Driver Library Import
• Updated Dell Command | System Driver Library Import
• Support for Dell Command | Deploy Catalog (for WinPE Driver Libraries
and System Driver Libraries)

Instructions for using the DCIP 3.1 Warranty tool with the Integration Suite to retain the SCCM data table functionality.

1. Download and extract the Warranty.zip

2. Copy the Warranty folder to c:\Program Files (x86)\Dell\CommandIntegrationSuite folder (or the path to your installation)

3. Create the following registry key - HKLM\SOFTWARE\Wow6432Node\Dell\ClientIntegrationPack\Warranty

4. Use the Dell.WarrantyInfo.exe tool from a command line and follow the command line instructions or from here

Web-Scale Converged Appliance For Desktop Virtualization

$
0
0
Current Revision posted to Enterprise Client - Wiki by DHulama on 1/16/2017 8:10:30 AM

Reliable, predictable desktop virtualization

Take out the guesswork. You can procure, deploy and manage virtual desktops with predictable scaling and management costs. The Wyse Datacenter Appliance XC solution for desktop virtualization, based on the Dell XC Series of Web-Scale Converged Appliances, simplifies Virtual Desktop Infrastructure (VDI) with easy-to-order, prescriptive configurations and a combination of tools and user interfaces so you can manage your desktop environment more easily. Increase your time to value with these benefits:

  • Predictable per-seat costs that fit a broad range of use cases — Start with a single cluster of three nodes for around 300 seats and avoid step-function infrastructure costs by adding about 100 seats at a time, with predictable per-seat cost and performance.
  • Support for most broker- and hypervisor-compatible desktop virtualization software — Choose from Citrix® XenDesktop® and XenApp®, VMware®, Microsoft® and vWorkspace broker platforms with vSphere® or Hyper-V® hypervisors.
  • Flexible scaling and performance — Add additional nodes to increase the number of seats or scale up to a different configuration to improve performance.
  • Easy-to-order, appliance-based configurations — Simplify purchasing with one of three fixed configurations that support around 100 users.
  • Optimal lifecycle management (LCM) and low operating expenses (OPEX)— Get the maximum number of virtual desktops on the appliance up and running in a matter of hours versus days.
  • Supported by an Appliance Architecture — Learn about how to implement the Dell XC Series, with sizing guidance and endpoint recommendations to optimize your environment.
  • Reliable Dell ProSupport — Our highly trained experts deliver enterprise-level tech-to-tech support.

Dell has partnered with Nutanix®, the leader in web-scale virtualized infrastructure, to incorporate their web-scale application with Dell infrastructure. The result is a hyper-converged infrastructure appliance (HCIA) that reduces the complexity of procurement, deployment and management by lowering the need for separate SAN storage. 

Appliance Architectures:

Latest Version:

  1. Dell XC Web-Scale Converged Appliance for Citrix XenDesktop
  2. Dell XC Web-Scale Converged Appliance for VMware Horizon
    Tags: Desktop Virtualization, microsoft, vdi, Wyse, Nutanix, vWorkspace, VMware, Citrix, graphics, appliance, SDS

    Dell ImageAssist

    $
    0
    0
    Revision 121 posted to Enterprise Client - Wiki by Tyler McLaughlin on 1/18/2017 11:02:28 PM

    ImageAssist is a tool developed by Dell Configuration Services for capturing your Windows installation (incl. apps and settings).  The captured OS image (WIM) will be in a format that can be uploaded to Dell and then it will be pre-installed in the Dell factory on any of your new ordered business corporate client systems.  Drivers will be added when the system is built and shipped.

    BEFORE YOU BEGIN:  Retail & Server OS's are not supported.

    VLA Customers:  Build your image using your Volume License Agreement (VLA) / Windows Enterprise media.  For a full list of supported operating systems, refer to the documentation.

    OEM Customers:  If you are building an image from a system you received that has the operating system installed from the Dell factory, you must format your hard drive and re-install using the OEM restore media provided by Dell. If you require a copy of the Windows OEM installation media, please call Dell technical support at 1.800.BUY.DELL and request Dell OEM Windows OS re-installation media.  Please note, if using Dell OEM Windows Media for your factory image, the sales order must match exactly the OS version of the image submitted.  If the two don’t match, the OS will not activate.

    DOWNLOAD v7.1.0.6 (released Dec. 2, 2016) Release Notes

    1. Training Videos
    2. Documentation
    3. User Forum
    4. FAQ's& Articles

    Ready to send us your image?  If you do not already have a contact, please use the links below to contact one of our regional teams.

    Want Dell to build your image?  Dell provides fee-based Image Management Services.  Use the appropriate link below to contact one of our regional IMS teams for more information.

     

    Join one of our weekly live OS Imaging Solutions eSeminars. 

    Go to http://events.dell.com/?lang=en and search keywords for "os imaging"

    Intel® Unite™ v3 Downloads

    $
    0
    0
    Revision 28 posted to Enterprise Client - Wiki by Tami_Reisman on 1/25/2017 8:40:33 PM

    The Intel® Unite™ v3 solution requires the following components:

    Hub: The hub is an Intel® vPro system (OptiPlex 9020 micro and 7040 micro) that is connected to a conference room display and is intended to run without human interaction. This component will run a full-screen version of the Intel® Unite™ App, which will display a PIN, allow automatic incoming connections, and will allow users to display and collaborate.

    Client: The client software will reside on the end-user’s system. The application will allow users to connect to a hub, and also peer to peer. It communicates with the enterprise server and displays to the screen in the conference room

    Server: The enterprise server can be installed on a physical machine, or run as a virtual machine. This server provides the PINs, resolves the PINs, provides monitoring and alerting, and allows IT to manage the Intel® Unite™ deployment within their enterprise.

    Plugin– This term refers to a software component that is installed on the Hub which extends the functionality of the Intel Unite solution.

    For Intel® Unite™ v3 for Ipad please go to  https://itunes.apple.com/us/app/intel-unite/id1092339168?mt=8

     

    Deployment Guides:  http://en.community.dell.com/techcenter/enterprise-client/w/wiki/11646.reference-documentsguides

     

    Component

    Last Updated 2017-Jan

    Enterprise Mode

    Standalone Mode

    Server Installer v3.1MR

    link to server download

    N/A

    Hub Installer v3.1MR

    link to hub download

    link to hub download

    Client Installer v3.1MR

    link to client download

    link to client download

    Microsoft Outlook Add-In v3.1(Scheduled meetings)

    link to Outlook addin

    N/A

    Skype for Business Plug-In v3.1MR

    link to skype plugin download

    link to skype plugin download

    Protected Guest Access Plug-In v3.1MR

    link to Guest access download

    link to Guest access download

    Telemetry Add-In v3.1MR

    link to Telemetry Add-In

    link to Telemetry Add-In

     


     

    Tags: Intel Unite

    Dell Command | Monitor

    $
    0
    0
    Revision 26 posted to Enterprise Client - Wiki by DELL-Vibha G on 1/30/2017 12:23:08 PM

    Dell Command | Monitor is designed for Dell Enterprise Client systems, Dell IoT Gateway systems, as well as for Dell Embedded PCs.

    With Dell Command | Monitor, system administrators can remotely manage assets, monitor system health, and inventory deployed systems in an enterprise.

    NOTE: Dell Command | Monitor was formerly Dell OpenManage Client Instrumentation (OMCI). After the OMCI version 8.2.1, OMCI is rebranded as Dell Command | Monitor.

    Dell Command | Monitor interfaces with leading enterprise management consoles that support industry standards. This approach helps to ensure that Dell systems can be managed by a broad array of existing enterprise management tools. It also interfaces with the Dell Integration Suite for System Center 2012, Dell KACE K1000 Management Appliance,  Dell OpenManage Essentials and our Client Management Pack for System Center Operations Manager (SCOM). Finally, tight integration with Windows Management Instrumentation (WMI) allows customers to take advantage of the rich scripting capabilities for collecting information and customizing system settings. This product is provided at no additional charge to Dell customers.

    The latest version of Dell Command | Monitor is v9.2.

     Downloads

    (Please visit the site to view this video)

    (Please visit the site to view this video)

    Dell Command | Monitor Quick Links

    Dell Command | Monitor Sample Scripts  
    Dell Command | Monitor FAQs 
    Monitoring the health of RAID Controllers and its associated drives using Dell Command | Monitor whitepaper 
    Integrating Dell Command | Monitor with Microsoft® System Center Configuration Manager 2012 whitepaper

    Enhancements included in the latest release

    • Support for new platforms
    • Support for new OS: Embedded Standard 7 professional (WES7-P), Embedded Standard 7 Enterprise (WES7-E) — supported only on Dell Embedded PCs.
    • Support for Linux operating systems: Ubuntu Desktop 16.04, and Red Hat Enterprise Linux 7.0.
    • Support for Application log feature for systems running supported Linux operating systems.
    • Support for the following new BIOS settings:

    - GPS on WWAN Radio
    - Keyboard Backlight Timeout on AC
    - Keyboard Backlight Timeout on Battery
    - Lid Switch
    - M2 PCIE SSD 0
    - M2 PCIE SSD 1
    - Master Password Lockout
    - Memory Fault Tolerance Time Limit
    - Memory Performance Monitor
    - Memory RSA
    - Modern Standby Control
    - PCI Bus
    - PCIe RSA
    - Power Off Intel 8260 When Engaging Stealth Mode
    - SD Card Boot
    - Sign of Life Indication
    - Secure Guard Extension
    - SFP
    - SFP Wake on LAN
    - Thunderbolt Boot Support
    - Thunderbolt Pre Boot Module
    - Touch Screen
    - Type-C Battery Overload Protection
    - Uefi Boot Path Security
    - USB Provision
    - Wake on Dock
    - XD Card
    - Support for additional values for the following supported attributes:
    - CPU Snoop Mode
    - Secure Guard Extensions
    - Warning And Errors

    Installing Dell Command | Monitor

    Installing Dell Command | Monitor manually is pretty simple. Just download the latest version (links above) and install with administrative rights. 

    To perform an unattended installation to be used with your favorite software distribution tool, perform the following steps:

    1. Download the latest version of Dell Command | Monitor  (links above).
    2. Launch the executable with the following parameters:

    Systems-Management_Application_240JD_WN32_9.2.0.135_A00-00.EXE /s

    Sample Scripts

    Check if a BIOS password is set

    Tags: ConfigMgr, mofcomp, SCCM report, MOF, Dell Command | Monitor, dcm, SCCM Console, monitor, sccm

    Dell Command | Configure Error Codes

    $
    0
    0
    Current Revision posted to Enterprise Client - Wiki by Tarun Kr Agrawal on 1/30/2017 8:30:51 PM

    0. Success.
    1. Attempt to read write-only parameter '%s'.
    2. Password cannot exceed 16 characters.
    3. A BMC was either not detected or is not supported.
    4. This username is already in use. Enter a unique username.
    5. Access mode not supported.
    6. Cannot return number of requested data bytes.
    7. User ID 1 cannot be assigned a username.
    8. Cannot execute duplicated request.
    9. There was an error clearing the SEL.
    10. Clear SEL cannot be accompanied with any other option.
    11. racreset cannot be accompanied with any other option.
    12. Cannot execute command '%s'. Command, or request parameter(s), not supported in present state.
    13. Command not supported on given channel.
    14. The community string may only contain printable ASCII characters.
    15. Destination unavailable. Cannot deliver request to selected destination.
    16. Cannot execute command. Insufficient privilege level.
    17. Command illegal for specified sensor or record type.
    18. Invalid commstring value.
    19. Hardware subsystem error. Invalid data field in Request.
    20. Invalid destination IP address.
    21. The GUID is invalid.
    22. Invalid gateway.
    23. Invalid hostname.
    24. Invalid IP address.
    25. Invalid DNS IP address.
    26. Invalid sub net mask.
    27. Invalid value for PEF. PEF value should be between 1 and 16.
    28. Reservation Canceled or Invalid Reservation ID.
    29. Invalid Time to live value.
    30. Invalid VLANID value.
    31. Invalid Command. Used to indicate an unrecognized or unsupported command.
    32. Command invalid for given LUN.
    33. Load defaults cannot be accompanied with any other option.
    34. There was an error loading the defaults.
    35. Node Busy. Command could not be processed because command processing resources are temporarily unavailable.
    36. Out of space. Command could not be completed because of a lack of storage space required to execute the given command operation.
    37. This parameter is not supported.
    38. Parameter out of range. One or more parameters in the data field of the Request are out of range.
    39. The password may only contain printable ASCII characters.
    40. Password test failed.
    41. Requested data length invalid.
    42. Requested data field length limit exceeded.
    43. Requested Sensor, data, or record not present.
    44. Request data truncated.
    45. Command response could not be provided.
    46. Command response could not be provided. BMC initialization or initialization agent in progress.
    47. Command response could not be provided. Device in firmware update mode.
    48. Command response could not be provided. SDR Repository in update mode.
    49. Cannot execute command, SEL erase in progress.
    50. Attempt to set the 'set in progress' value when not in the 'set in complete' state.
    51. The SOL character 'accumulate interval' is invalid.
    52. The SOL character 'send threshold' is invalid.
    53. The SOL 'retry interval' is invalid.
    54. Command completed successfully.
    55. Timeout while processing command. Response unavailable.
    56. Unspecified error.
    57. The password may only contain printable ASCII characters.
    58. Username cannot exceed 16 characters.
    59. Invalid VLANID value. Enter in 'dddd' format.
    60. Attempt to write read-only parameter '%s'.
    61. BMC is busy.
    62. Response data did not return successfully.
    63. BMC time out error.
    64. Invalid Configuration Option.
    65. Cannot execute command.Parameter is illegal because command sub-function has been disabled or is unavailable.
    66. Option '%s' requires an argument.
    67. The asset tag for this system is not available.
    68. The asset tag cannot be more than 10 characters long.
    69. The required BIOS interfaces cannot be found on this system.
    70. The BIOS version information is not available.
    71. There is not enough free system memory to complete the BIOS update.
    72. The BIOS update file version is a different version class (A00, X00) than the current system BIOS. Use the --force option to use this BIOS image.
    73. The BIOS update file version is older than the current system bios. Use the --force option to use this BIOS image.
    74. The BIOS update file version is identical to the current system bios. Use the --force option to use this BIOS image.
    75. The sequence list must be a comma-separated numerical list of valid unique boot device numbers (ex: 2, 1, 3).
    76. The sequence list must be a comma-separated list of valid unique device names (ex: nic.emb.1, hdd.emb.1) or a comma-separated numerical list of valid unique boot device numbers (ex: 2, 1, 3).
    77. There was an error setting the sequence.
    78. The list is not formatted correctly. See the help for more details.
    79. The size of returned buffer is larger than the size of allocated buffer.
    80. There was a problem getting the state byte.
    81. The state byte is not available on this system.
    82. There was a problem setting the state byte.
    83. The state byte must be a value between 0 and 255 decimal.
    84. The CPU information is not available.
    85. The dependent option '%s' required for this subcommand is missing in the command line.
    86. Duplicate sub command '%s' has been entered.
    87. The script file does contain not a valid DTK environment script signature. (%s)
    88. The format of the environment variable is incorrect.
    89. The --envar/-s option can only be used for a single option.
    90. The --envar/-s option can only be used for report operations.
    91. The individual sub commands should be specified for the -s option.
    92. Getting external serial connector settings failed.
    93. Setting external serial connector settings failed.
    94. There was an error opening the file %s.
    95. File '%s' does not have write permission.
    96. The file contains invalid option '%s'.
    97. The replication information does not match for this system.
    98. There can only be one section in the input file.
    99. Bad ini file, the required section [%s] cannot be found.
    100. The format of the bios image file is incorrect.
    101. Report operations and set operations must be separate.
    102. Help is not available for the option '%s'.
    103. The -x (--hex) option can only be used with -b or -r.
    104. Input file '%s' not found.
    105. Input file '%s' cannot be read.
    106. Invalid argument for the provided option '%s'.
    107. Function table lookup error.
    108. The machine ID was not found in the file '%s'.
    109. The system memory information is not available.
    110. Mode can only be used with the --pci option.
    111. The device name or index must be present in the boot order.
    112. The output file '%s' could not be opened. Please make sure the path exists and the media is not write protected.
    113. Could not write to output file, disk may be full.
    114. The old password must be provided to set a new password using --valsyspwd.
    115. The old password must be provided to set a new password using --valsetuppwd.
    116. The current password can only be provided when setting a new password.
    117. Actions are not allowed for this filter. Only alerts are allowed.
    118. There was an error getting the option '%s'.
    119. The option '%s' is not available or cannot be configured through this tool.
    120. There was an error setting the option '%s'.
    121. The -n (--namefile) option can only be used with --pci.
    122. The password may only contain alphanumeric characters.
    123. The BIOS passwords have been disabled via jumper.
    124. The password length must be between 1 and 32.
    125. This password is locked and can only be unlocked by the admin user.
    126. There was an error setting the password.
    127. The LCD string length must be between 1 and the maximum value %s.
    128. The LCD string may only contain alphanumeric characters.
    129. There was an error setting the LCD string.
    130. The second channel can only be set if the RAID controller is set to RAID.
    131. The set operation, '%s', requires sub commands.
    132. The service tag for this system is not available.
    133. The system ID value is not available.
    134. The system information string is not available.
    135. A system error has occured.
    136. Usage error.
    137. The uuid information is not present on this system.
    138. The manufacturing/first-power-on date information is not present on this system.
    139. Version cannot be accompanied with any other option.
    140. The self-identify blinker timer should be set to 0..255 second(s).
    141. Encrypt key is too long.
    142. Encrypt key is invalid, accepted characters are 0 to 9 or A to F.
    143. Parameter has been temporarily disabled due to a dependancy on other settings.
    144. The old password provided is incorrect. The new password will not be set. Please try again.
    145. Cannot start /etc/omreg.cfg file. Please ensure /etc/omreg.cfg file is present and is valid for your environment. You can copy this file from the DTK iso.
    146. Getting nicselection settings failed.
    147. HAPI Driver Load Error.
    148. Filter action power reduction is only supported for the system power warn/fail filters.
    149. TPM Clear settings requires setup password.
    150. There is currently no TPM Clear request pending.
    151. Password is not required for retrieving the TPM options.
    152. Setup password is required for setting the TPM options.
    153. Invalid Password override.
    154. Invalid TPM set option.
    155. There was an error setting the TPM option.
    156. There is no setup password installed on this system.
    157. The setup password provided is incorrect. Please try again.
    158. Profile should be custom for setting cpupowermode, memorypowermode and fanmode.
    159. There was an error setting the Power Option.
    160. The power cap value entered is out of range. Please try again.
    161. The power cap value entered must be between 0 to 100 if unit is percent.
    162. Invalid IPv6 address. The IPv6 address cannot be link-local or multicast.
    163. Invalid IPv6 address. The IPv6 address specified has incorrect address format.
    164. Invalid IPv6 address. The gateway address specified has incorrect address format.
    165. Invalid IPv6 address. The Primary DNS server address specified has incorrect address format.
    166. Invalid IPv6 address. The Secondary DNS server address specified has incorrect address format.
    167. Invalid IPv6 address. The gateway address specified is invalid.
    168. Invalid configuration. Attempting to apply IPv6 configuration on a non supported platform.
    169. Invalid IPv6 configuration. Attempt to set DNS server address manually while DNS address source is set to auto.
    170. Invalid IPv6 configuration. Attempt to set IPv6 address manually while IPv6 address source is set to auto.
    171. Invalid IPv6 configuration. Attempting to apply IPv6 configuration without loading IPv6 stack.
    172. Invalid IPv4 configuration. Attempting to apply IPv4 configuration with IPv4 disabled.
    173. Invalid IPv6 configuration. Ipv6 address cannot be specified without specifying prefix-length.
    174. Invalid IPv6 configuration. dnssrcv6 cannot be set to auto when ipsrcv6 is set to manual.
    175. Error while executing IPMI Set command.
    176. Error while executing IPMI Get command.
    177. Error during Trap Alert.
    178. Unspecified error.
    179. Unsupported device. Re-try with supported device
    180. Setup password is installed. Re-try providing setup/admin password
    181. System password is required. Re-try providing system password
    182. The password provided is incorrect. Please try again.
    183. Password verification failed.
    184. Password not changed, new password does not meet criteria.
    185. Password not installed in the system.
    186. Password is DISABLED by jumper.
    187. Error in Validation.
    188. Error in Setting the Value.
    189. The password length should not exceed the maximum value %s.
    190. This is not a Dell machine. DCC supports only Dell machines.
    191. Setup Password is required to change the setting. Use --valsetuppwd to provide password.
    192. System Password is required to change the setting. Use --valsyspwd to provide password.
    193. Password is not Installed. so use only --setuppwd
    194. Password is not Installed. so use only --syspwd
    195. The system password provided is incorrect. Please try again.
    196. The Sequence list must be a comma-separated list of valid unique device names (ex: hdd,cdrom).
    197. The system revision information is not available for this system.
    198. The completion code information is not available for this system.
    199. The BIOS characteristics information is not available for this system.
    200. The password should not contain special characters. Password characters are limited to alphanumeric (A-Z, a-z, 0-9).
    201. Please use 64-bit version of this application.
    202. %s cannot be modified when TPM is OFF.
    203. System password cannot be set when pwdlock option is in locked state (pwdlock=lock).
    204. adddevice option not supported by this machine's BIOS
    205. usb device already present in this machine.
    206. Unable to get information from BIOS.
    207. %s - Error : Unable to store BIOS information.
    208. Duplicate entry found in the input list : %s , Operation Aborted.
    209. Typo found in the input list : %s , Operation Aborted.
    210. Asset tag can have only printable ASCII characters.
    211. Multiple inputs will not be accepted.
    212. Invalid Hex format.
    213. Hex value range should be 0x0 to 0xffff.
    214. %s - Only positive numeric values are acceptable.
    215. %s - Length cannot exceed two characters.
    216. Range for autoon hour value should be 0 to 23(24 hour format).
    217. Range for autoon minute value should be 0 to 59.
    218. This option Not supported on UEFI Bios.
    219. Unable to Set Bootorder.
    220. Invalid Arguments. Unable to Set Bootorder.
    221. The provided command %s should not combine with other suboptions.
    222. The property ownership tag for this system is not available.
    223. The property ownership tag cannot be more than 80 characters for non portable machines.
    224. The property ownership tag is limited to 48 characters for portable systems.
    225. Property ownership tag can have only printable ASCII characters.
    226. Error in Setting the Value. Note : In some machines, If Hdd password or System password is set, you can't set Setup password.
    227. 'admin/root' privileges required to execute this application.
    228. The option related BIOS information is not available in this machine.
    229. Improper Output from Bios. Please try again.
    230. ;Error in Bootorder.
    231. The manufacturing/first-power-on date information is not present on this system.
    232. Not Applicable.
    233. ;Uefi bootlisttype is not supported in this Machine.
    234. ;Error in Bootorder.
    235. Unable to get information specific to machine.
    236. The input file is invalid.
    237. No Status Present.
    238. File Do not have configurable Options.
    239. Please provide the days to enable.
    240. Password is not Installed. Please try again without providing --val%s
    241. Please provide the old password to set the new password using --valownerpwd.
    242. The owner password is incorrect. Please try again.
    243. Error in setting the value. Note : Setup or system password might be set on the system. Clear the password(s) and try again.
    244. Owner password is not supported in file operations.
    245. Password operation is not supported on the system.
    246. The owner of the system has enabled the Owner Access feature. To set the Bios configuration, create setup or system password.
    247. Either the system hardware or the BIOS version does not support the option. To resolve the BIOS version issue, upgrade the BIOS to the latest version.
    248. Unable to get password information.
    249. Please provide the start and stop values. Example: custom:start-end.
    250. The start and stop values should be in the range '%s'.
    251. The stop value should be greater than the start value by 5 percentage.
    252. The option '%s' is not supported in this machine.
    253. Unable to set '%s'. Note: To set this Option Legacy Option rom(legacyorom) should be enable and secureboot should be disable.
    254. Unable to set '%s'. Note: To set this Option bootmode(activebootlist) should be uefi and legacy option rom (legacyorom) should be disable.
    255. Unable to set '%s'. Note: To enable this Option secureboot should be disable. To disable this Option secureboot should be disable and bootmode(activebootlist) should be uefi.
    256. The allowed value for the option in the system are in between %s.
    257. The option '%s' is not enabled.
    258. Invalid argument! The possible values are: 0, 1-15, and 255.
    259. Invalid argument. The arguments must be set in such a way that [Start time] less than or equal [End time] less than or equal [Charge Start time].
    260. Unable to set the Non critical Threshold values.
    261. Cannot set the passed value as it is not within the range. The value should be less than or equal to 'Upper Threshold Critical' and greater than or equal to 'Minimum value'
    262. Error in Setting the Value. Note: To set TPM - 1. Admin Password must be set , 2. TPM must not be owned and 3. TPM must be deactivated.
    263. Invalid format! Enter the value in the 'R,G,B' format.
    264. Invalid value! Expected values are 'white', 'red', 'green', 'blue', 'customcolor1', 'customcolor2' and 'none'
    265. Invalid value! Expected values are 'white', 'red', 'green', 'blue', 'customcolor1' and 'customcolor2'
    266. Invalid format! Enter only one value.
    267. Invalid format! No other value is allowed with 'none'
    268. Invalid format! Duplicate entry found in the input list:'%s'
    269. Invalid operation! Set operation for '%s' attribute is not allowed using file mode
    270. Invalid format! String for '%s' attribute should contain maximum 4 characters. Supported characters are 0-9, A-F and a-f.
    271. Invalid format! String for '%s' attribute should contain maximum 8 characters. Supported characters are 0-9, A-F and a-f.
    272. Invalid set operation! '%s' attribute is read-only attribute.
    273. The allowed possible values are %s.
    274. The option '%s' is not disabled.

    Tags: bios, Command Configure, configuration, system management

    Ultimate VDI protection, end-to-end, from the edge all the way to the datacenter

    $
    0
    0
    Current Revision posted to Enterprise Client - Wiki by DHulama on 1/31/2017 11:09:10 PM

    Proactively protect virtual desktops and thin clients

    Viruses and malware continue to evolve with greater sophistication and more ways to infect organizations’ digital assets. Dell differentiates with a unique Advanced Threat Prevention (ATP) technology, using new dynamic mathematical models, artificial intelligence and machine learning that doesn’t depend on previously seen patterns and behaviors and doesn’t require human intervention. This enables a revolutionary level of security and management efficiency that extends into Windows Embedded thin clients and VDI hosted environments, in addition to conventional physical PCs.

    (Please visit the site to view this video)

    Protect virtual desktops

    End users using virtual desktops can also be infected by a virus or malware, even though the risk is much lower than for those using physical PCs.

    Dell Data Protection | Endpoint Security Suite Enterprise includes advanced threat prevention and enterprise-class encryption for both physical PCs and Windows virtual desktops running either on Citrix or VMware. Revolutionary advanced threat prevention offers unparalleled efficacy against zero-day threats, advanced persistent threats and commodity malware. In fact, testing shows that our protection prevents 99% of malware, far above the average 50% of threats identified by the top anti-virus solutions1. The suite is managed via a single, central console, greatly simplifying data security management and compliance reporting.

     

     

    Protect Windows-based thin clients

    The Dell Wyse zero clients and ThinOS based thin clients natively offer maximum security and are malware resistant with an unpublished API and zero attack surface. They thus do not need any threat protection solution.

    Other thin clients running Windows® Embedded Standard™ (WES) can offer increased flexibility but require a more cautious approach to security as they can still be the target of cyber-attacks via malicious websites or locally through an installed web browser or an infected USB key. Advanced threat protection can now also be installed on Windows-based thin clients to prevent 99% of executable malware, far above the average 50% of threats identified by the top anti-virus solutions1.

    Dell Data Protection | Threat Defense is the solution that offers 99% protection against viruses, malware and ransomware when using Dell Wyse thin clients running WES7/7p or Win10 IoT Enterprise. This solution can also protect traditional physical PCs, MacOS systems as well as servers running Microsoft Windows Server in the datacenter for VDI infrastructure.

     

     

    Protect physical PCs

    Dell Data Protection | Endpoint Security Suite Enterprise also provides advanced threat prevention, enterprise-class encryption, and authentication for Dell and non-Dell traditional computers running Windows. By choosing Dell, you have access to a single source for all your VDI security solutions, making BYOD initiatives easier to deploy, manage and control. Dell Data Protection offers an extended range of data security solutions for all endpoints to better protect your vital assets and your business.

     

     

    Related item

    Dell Data Security Solutions: www.dell.com/DataSecurity 


    1 Results from Cylance Unbelievable Demo Tour, Austin, Houston and Dallas Texas, May 2015. Also based on Dell internal testing, November 2016.

    Tags: Zero Day Attack, Dell Threat Defense, ESSE, DDP, anti virus

    Dell Command | PowerShell Provider

    $
    0
    0
    Current Revision posted to Enterprise Client - Wiki by Tarun Kr Agrawal on 2/1/2017 6:59:52 PM

    Note - Dell Command | PowerShell Provider 1.2 release has updated the names of attributes and possible values used in 1.1 and 1.0 releases.  To see the complete list please click Reference list for updated names of attributes and possible values link.

     

    Overview

    Dell Command | PowerShell Provider is a PowerShell module that provides BIOS configuration capability to Dell client Enterprise systems such as OptiPlex, Latitude, Venue 11 Pro, XPS Notebook, and Precision using Windows PowerShell Interface.

    Dell Command | PowerShell Provider can be installed as plug-in software registered within Windows PowerShell environment. Dell Command | PowerShell Provider works for local and remote systems, and even in Windows pre-installation environment. This module, with its native configuration capability, makes BIOS configuration most manageable for system administrators.

    Dell Command | PowerShell Provider can be used on Windows 7, Windows 8, Windows 8.1, Windows 10 and Windows Pre-installation Environment (Windows PE 4.0 onwards) operating systems.

    This is the 1.2 version of Dell Command | PowerShell Provider. 

     

    Downloads

    Dell Command | PowerShell Provider module is available at PowerShell Gallery. To install the module from PowerShell Gallery, refer to PowerShell Gallery.  

    64-bit Dell Command | PowerShell Provider v1.2                 (Released - 01/09/2017)

    Dell Command | PowerShell Provider Documentation

    32-bit Dell Command | PowerShell Provider v1.2              (Released - 01/09/2017)

    Dell Command | PowerShell Provider FAQ

    Alternatively, Dell Command | PowerShell Provider is also available at Dell Support site for Download.

    Download Dell Command | PowerShell Provider v1.2

    (Released - 01/06/2017)

     

    What's new 

    • Desired State Configuration (DSC) support
    • New Platforms support
    • Updated attribute names and Possible values. To see the complete list please click Reference list for updated names of attributes and possible values link
    • Support for displaying platform-specific possible values for the attributes in PossibleValues property
    • Support for new property: UnSupportedPossibleValuesfor showing additional possible values for the attribute that are not supported on current platform
    • Support for displaying the meaningful attribute names that are similar to BIOS setup screen names, in a ShortDescription column
    • Support for new BIOS attributes. To see the complete list of new BIOS attributes please refer What's new section is user guide. To download the user guide, click Dell Command | PowerShell Provider Documentation link in the Downloads section.

     

    Fixes 

    • Value of KeyboardIllumination can be set as 'Bright' (100%).
    • MemoryTechnology attribute is now shown on the platforms with the latest technology such as DDR4, LPDDR, etc.
    • HTCapable attribute displays the accurate information

     

    Installation and Configuration

    To know about installing and configuring Dell Command | PowerShell Provider module in your system, refer Download and Installation section in user guide. To download the user guide, click Dell Command | PowerShell Provider Documentation link in the Downloadssection.

     

    Articles/Blogs 

     

    Videos

    Changing boot sequence using Dell Command | PowerShell Provider

    (Please visit the site to view this video) 

     

    Previous Releases

    Dell Command | PowerShell Provider 1.1  (Released - 08/09/2016)

    Dell Command | PowerShell Provider 1.0  (Released - 10/26/2015)

     

    Tags: Cmdlets, Desired State Configuration, Precision, dcpp, PowerShell Provider, Venue, DSC, latitude, optiplex, PowerShell Gallery, dell client, XPS, Desired State, PowerShell

    Dell Client Command Suite Webcast

    $
    0
    0
    Current Revision posted to Enterprise Client - Wiki by Warren Byle on 2/2/2017 4:12:19 AM

    Join our weekly webcast to discuss the Dell Client Command Suite and other systems management topics of interest to Dell customers.  

    When: Thursdays at 10am US Central Time (see schedule below for details) Download a calendar invite (.ics) here

    Where: http://delltechcenter.adobeconnect.com/command/

    Upcoming Webcast Topics

    DateTopic
    February 2nd, 2017Command Suite Overview

    Previously Recorded Webcasts

    DateTopic (Click the link below to view the recording)
    January 12th, 2017Managing UEFI settings for Windows 10
    January 5th, 2017Command Suite Overview
    December 8th, 2016OS Deployment Basics
    December 1st, 2016Command Suite Overview
    November 17th, 2016Installation Demo - Part 2
    November 10th, 2016Installation Demo - SCCM integration
    November 3rd, 2016Command Suite Overview
    October 27th, 2016BIOS Configuration Deep Dive
    October 20th, 2016Command Suite Overview
    October 13th, 2016vPro Discussion
    September 29th, 2016Open Discussion
    September 22nd, 2016Dell Client Command Suite Overview and Demo
    September 15th, 2016Dell Command | Update and Dell Command | Power Manager - Deep Dive
    September 8th, 2016Dell Client Command Suite Demo
    September 1st, 2016Dell Client Command Suite Demo and Discussion

    ImageAssist Virtual Machine Tutorials

    $
    0
    0
    Current Revision posted to Enterprise Client - Wiki by David Urdiales on 2/2/2017 7:45:51 PM

    ImageAssist Virtual Machine Tutorials by David Urdiales

    One of ImageAssist best practices is to use a virtual environment to create our golden image. We can leverage ImageAssist with a Virtual Machine to create and maintain a cross-platform deployable Windows image. Using a virtual environment provides an advantage with keeping up with operating system changes and upgrades, as well as, avoiding issues with system drivers. 

    This is why, though we can create our image using a physical Dell system, we still recommend the use of a virtual machine. Below are some video tutorials for three different virtual machine solutions. The tutorials were made using an OEM download copy of Windows 10. In the videos we demonstrate how to create our Reference image that will later progress to your maintenance image then finally your Golden image for deployment. The virtual machine solutions used are:

    Microsoft Hyper-V can be added as a feature in Windows 10 with no additional cost. VirtualBox is also a free solution download as to VMWare Workstation is not. Below are the Tutorial video for each platform. We don't recommend using the VM to create the USB Drive for our Dell PE Key. It's best to use the host to create the USB Drive. Please see the link ImageAssist - Create USB Drive  for more information.

    NOTE: Depending on your VM host, in regards to VM resources, 2GB of Memory and 2 Processors is acceptable as a bare minimum. However, the process may take longer. All videos listed were trimmed to save time for the purpose of the tutorial.

    ImageAssist - Hyper-V Tutorial

    Hyper-V does not support Win7 UEFI (Generation 2), it only supports Win7 MBR (Generation 1).  

    ImageAssist - VirtualBox Tutorial

    (Please install 'Oracle VM VirtualBox Extension Pack' along with VirtualBox)

     ImageAssist - VMWare Tutorial

     ImageAssist - Non OEM Windows install Tutorial

    The purpose of this video is to illustrate how a non OEM version of Windows 10 procedure looks like. The build of the VM was done in VMWare Workstation, but the capture process remains the same as illustrated in the VirtualBox and Hyper-V tutorials.

     The links below provide a more comprehensive understanding to each process of the Dell ImageAssist tool:

    Feel free to either call or email us with any additional assistance needed or questions you may have. Here's how to contact our ImageAssist Help Desk:

    Phone866-340-0541
    Email: US_OSImaging@dell.com 

    Tags: configuration, Microsoft Windows OS, Drivers and Software Help, client

    ImageAssist: Removing unwanted Windows 10 Apps

    $
    0
    0
    Current Revision posted to Enterprise Client - Wiki by David Urdiales on 2/2/2017 9:09:40 PM

    ImageAssist: Removing unwanted Windows 10 Apps by David Urdiales

    Windows 10 comes loaded with a lot of default apps. Depending on which version you have, you will see various apps in your start menu that you don’t want. The very first thing you should try is simply right-clicking on an app on the start menu and see if there is the uninstall option. If that option isn't available, please read on.

    We have placed some of the most common apps for demonstration purposes for removal. Feel free to use any of the links below for different methods that may be better suited for you. Copy and paste one or more of the following commands into the PowerShell prompt, pressing Enter after each one to remove the apps you don’t want on your Windows 10 system. 

    Seeing extra apps? Turn them off.

    How to Remove All Built-in Apps in Windows 10

    Removing Windows 10 in-box apps during a task sequence

    Removing Built-in apps from Windows 10 WIM-File with PowerShell - Version 1.2

    Follow the instructions below to start up PowerShell and simply copy and paste the cmdlet below to begin the removal of the unwanted apps.

    1. Open the Start menu, search for “PowerShell.
    2. Right-click the PowerShell shortcut, and select “Run as administrator.
    3. Select Agree to the UAC prompt. 
    4. Copy the command line for the app needing removal.
    5. Paste it on the PowerShell 

    Uninstall 3D Builder:

    Get-AppxPackage *3dbuilder* | Remove-AppxPackage

    Uninstall Alarms and Clock:

    Get-AppxPackage *windowsalarms* | Remove-AppxPackage

    Uninstall Calculator:

    Get-AppxPackage *windowscalculator* | Remove-AppxPackage

    Uninstall Calendar and Mail:

    Get-AppxPackage *windowscommunicationsapps* | Remove-AppxPackage

    Uninstall Camera:

    Get-AppxPackage *windowscamera* | Remove-AppxPackage

    Uninstall Contact Support:

    This app can’t be removed.

    Uninstall Cortana:

    This app can’t be removed.

     Uninstall Get Office:

    Get-AppxPackage *officehub* | Remove-AppxPackage

    Uninstall Get Skype:

    Get-AppxPackage *skypeapp* | Remove-AppxPackage

    Uninstall Get Started:

    Get-AppxPackage *getstarted* | Remove-AppxPackage

    Uninstall Groove Music:

    Get-AppxPackage *zunemusic* | Remove-AppxPackage

    Uninstall Maps:

    Get-AppxPackage *windowsmaps* | Remove-AppxPackage

    Uninstall Microsoft Edge:

    This app can’t be removed.

    Uninstall Microsoft Solitaire Collection:

    Get-AppxPackage *solitairecollection* | Remove-AppxPackage

    Uninstall Money:

    Get-AppxPackage *bingfinance* | Remove-AppxPackage

    Uninstall Movies & TV:

    Get-AppxPackage *zunevideo* | Remove-AppxPackage

    Uninstall News:

    Get-AppxPackage *bingnews* | Remove-AppxPackage

    Uninstall OneNote:

    Get-AppxPackage *onenote* | Remove-AppxPackage

    Uninstall People:

    Get-AppxPackage *people* | Remove-AppxPackage

    Uninstall Phone Companion:

    Get-AppxPackage *windowsphone* | Remove-AppxPackage

    Uninstall Photos:

    Get-AppxPackage *photos* | Remove-AppxPackage

    Uninstall Store:

    Get-AppxPackage *windowsstore* | Remove-AppxPackage

    Uninstall Sports:

    Get-AppxPackage *bingsports* | Remove-AppxPackage

    Uninstall Voice Recorder:

    Get-AppxPackage *soundrecorder* | Remove-AppxPackage

    Uninstall Weather:

    Get-AppxPackage *bingweather* | Remove-AppxPackage

    Uninstall Windows Feedback:

    This app can’t be removed.

    Uninstall Xbox:

    Get-AppxPackage *xboxapp* | Remove-AppxPackage

     

     Removing Windows apps for new user accounts:

    If the project requires to remove Windows 10 apps from systems that are used by more than one user, this script examples will work well. The sleep timer can be increased if necessary, depending how fast the system is. For additional apps, edit the cmdlet for the app needing removal.Simply copy and paste the following in a PowerShell prompt as follows:

    Removing windows maps for new accounts:

    write-output "Removing windowsmaps for new accounts"

    Get-appxprovisionedpackage –online | where-object {$_.packagename –like "*windowsmaps*"} | remove-appxprovisionedpackage –online

    Start-Sleep -s 4

     

    Removing Xbox app for new accounts:

    write-output "Removing xboxapp for new accounts"

    Get-appxprovisionedpackage –online | where-object {$_.packagename –like "*xboxapp*"} | remove-appxprovisionedpackage –online

    Start-Sleep -s 4

     

    Removing Zune Music app for new accounts:

    write-output "Removing zunemusic for new accounts"

    Get-appxprovisionedpackage –online | where-object {$_.packagename –like "*zunemusic*"} | remove-appxprovisionedpackage –online

    Start-Sleep -s 4 

    Tags: Cmdlets, Consumer Client, Command Configure, Microsoft OS, configuration, Drivers and Software Help, client

    Precision 7710 Windows 10 Driver Pack

    $
    0
    0
    Current Revision posted to Enterprise Client - Wiki by Warren Byle on 2/6/2017 5:17:20 AM

    Current Driver CAB Summary

    ModelPlatformIDVersionRelease DateSizeLink
    Precision 7710Windows109VF1HA0601/10/2017798 MBDownload Now

    Driver CABs Homepage | Understanding Delta Report

    Delta Report for Previous Driver CAB v/s Current Driver CAB

    (CKF1X-A05-09/12/2016) v/s (9VF1H-A06-01/10/2017)

    ----Comparison Report----

    ArchCategoryDevice DescriptionPrevious CABCurrent CABStatus
    x64audio

    Realtek High-Definition Audio Driver

    ReleaseID: T8FF0
    DellVersion: A05
    VendorVersion: 6.0.1.6105
    ReleaseID: DDG39
    DellVersion: A06
    VendorVersion: 6.0.1.6111

    Updated

    x64chipset

    Intel(R) Management Engine Interface Driver

    ReleaseID: 316K0
    DellVersion: A02
    VendorVersion: 11.0.0.1167
    ReleaseID: 316K0
    DellVersion: A02
    VendorVersion: 11.0.0.1167

    No Change

    x64chipset

    Intel Chipset Device Software

    ReleaseID: 320CP
    DellVersion: A01
    VendorVersion: 10.1.1.9
    ReleaseID: 320CP
    DellVersion: A01
    VendorVersion: 10.1.1.9

    No Change

    x64chipset

    Intel(R) Thunderbolt(TM) Controller Driver

    ReleaseID: D91CC
    DellVersion: A02
    VendorVersion: 16.1.47.275
    ReleaseID: D91CC
    DellVersion: A02
    VendorVersion: 16.1.47.275

    No Change

    x64chipset

    Realtek PCI-E Memory Card Reader Driver

    ReleaseID: 74XM1
    DellVersion: A01
    VendorVersion: 10.0.10240.21281
    ReleaseID: MDR6D
    DellVersion: A03
    VendorVersion: 10.0.10586.21289

    Updated

    x64chipset

    Intel Dynamic Platform and Thermal Framework

    ReleaseID: JXYJD
    DellVersion: A02
    VendorVersion: 8.1.10605.221
    ReleaseID: NWWR5
    DellVersion: A03
    VendorVersion: 8.2.10900.330

    Updated

    x64chipset

    ST Microelectronics Accelerometer Driver for Free Fall Data Protection

    ReleaseID: KKRTP
    DellVersion: A01
    VendorVersion: 4.10.71
    ReleaseID: DFDP5
    DellVersion: A02
    VendorVersion: 4.10.79

    Updated

    x64communication

    Dell Wireless 5811e LTE Mobile Broadband Driver and GPS Driver

    ReleaseID: MGMMF
    DellVersion: A04
    VendorVersion: 7.16.4439.504
    ReleaseID: JDTD5
    DellVersion: A06
    VendorVersion: 7.24.4518.504

    Updated

    x64docks

    ASIX USB to Serial / Parallel Port Driver

    ReleaseID: 0G3VF
    DellVersion: A02
    VendorVersion: 2.0.1.0

    Updated

    x64docks

    Intel(R) Thunderbolt Controller Driver

    ReleaseID: 8J86F
    DellVersion: A01
    VendorVersion: 15.3.39.250

    Not Included

    x64docks

    Realtek USB GBE Ethernet Controller Driver

    ReleaseID: 9YCY0
    DellVersion: A01
    VendorVersion: 2.43.2015.1225
    ReleaseID: 3FKMW
    DellVersion: A03
    VendorVersion: 2.43.2016.1026

    Updated

    x64docks

    Realtek USB Audio Driver for Dell Wireless Dock, Dell Thunderbolt Dock, Dell Docking Monitor Stand and Dell Dock.

    ReleaseID: GG4M6
    DellVersion: A02
    VendorVersion: 6.3.9600.44
    ReleaseID: DTW9T
    DellVersion: A03
    VendorVersion: 6.3.9600.50

    Updated

    x64docks

    ASMedia USB 3.0 Extended Host Controller Driver

    ReleaseID: YM9TJ
    DellVersion: A02
    VendorVersion: 1.16.33.1
    ReleaseID: CH1P1
    DellVersion: A03
    VendorVersion: 1.16.41.3

    Updated

    x64input

    Dell USB Smartcard Keyboard Driver

    ReleaseID: 7P3TV
    DellVersion: A00
    VendorVersion: 4.0.8.7
    ReleaseID: 7P3TV
    DellVersion: A00
    VendorVersion: 4.0.8.7

    No Change

    x64input

    Dell Multi-Touch Touchpad Driver

    ReleaseID: Y5Y8F
    DellVersion: A06
    VendorVersion: 10.1207.101.113
    ReleaseID: Y5Y8F
    DellVersion: A06
    VendorVersion: 10.1207.101.113

    No Change

    x64network

    Dell WLAN Radio Switch Driver

    ReleaseID: 9CR04
    DellVersion: A03
    VendorVersion: 1.0.0.7
    ReleaseID: 9CR04
    DellVersion: A03
    VendorVersion: 1.0.0.7

    No Change

    x64network

    Intel 18260/17265/8260/7265/3165 WiFi Driver

    ReleaseID: PX32H
    DellVersion: A19
    VendorVersion: 18.40.0.9
    ReleaseID: PX32H
    DellVersion: A19
    VendorVersion: 18.40.0.9

    No Change

    x64network

    Intel 8260/7265/3165/7260 Bluetooth Driver

    ReleaseID: N7VN8
    DellVersion: A11
    VendorVersion: 18.1.1611.3223
    ReleaseID: N7VN8
    DellVersion: A11
    VendorVersion: 18.1.1611.3223

    No Change

    x64network

    Dell Wireless 1820A Bluetooth Driver

    ReleaseID: KXHF0
    DellVersion: A01
    VendorVersion: 12.0.1.731
    ReleaseID: KXHF0
    DellVersion: A01
    VendorVersion: 12.0.1.731

    No Change

    x64network

    Dell Wireless 1810/1820 WiFi/Bluetooth Driver

    ReleaseID: JY9NY
    DellVersion: A03
    VendorVersion: 12.0.0.242
    ReleaseID: JY9NY
    DellVersion: A03
    VendorVersion: 12.0.0.242

    No Change

    x64network

    Dell Wireless 1820A WiFi Driver

    ReleaseID: 50XMJ
    DellVersion: A03
    VendorVersion: 1.558.56.0
    ReleaseID: 50XMJ
    DellVersion: A03
    VendorVersion: 1.558.56.0

    No Change

    x64network

    Dell Airplane Mode Switch Driver

    ReleaseID: PX8MM
    DellVersion: A00
    VendorVersion: 1.0.0
    ReleaseID: RN8CN
    DellVersion: A01
    VendorVersion: 1.4.4

    Updated

    x64network

    Intel I2xx/825xx Gigabit Ethernet Network Controller Drivers

    ReleaseID: KJTXR
    DellVersion: A00
    VendorVersion: 20.2.0.0
    ReleaseID: CY5NJ
    DellVersion: A01
    VendorVersion: 20.4.0.0

    Updated

    x64security

    Dell ControlVault2 Driver

    ReleaseID: 3N9T0
    DellVersion: A04
    VendorVersion: 4.2.9.52
    ReleaseID: P62GJ
    DellVersion: A07
    VendorVersion: 4.5.17.305

    Updated

    x64storage

    Intel Rapid Storage Technology Driver and Management Console

    ReleaseID: PFJ82
    DellVersion: A06
    VendorVersion: 14.8.9.1053
    ReleaseID: 58JD8
    DellVersion: A09
    VendorVersion: 15.2.2.1030

    Updated

    x64video

    Nvidia Quadro M1000M/ M2000M / M3000M / M4000M / M5000M Graphics Driver

    ReleaseID: 5KTV4
    DellVersion: A02
    VendorVersion: 10.18.13.6246
    ReleaseID: 5KTV4
    DellVersion: A02
    VendorVersion: 10.18.13.6246

    No Change

    x64video

    AMD FirePro W5170M/W7170M Graphics Driver

    ReleaseID: 2TTXH
    DellVersion: A03
    VendorVersion: 15.201.2901
    ReleaseID: 2TTXH
    DellVersion: A03
    VendorVersion: 15.201.2901

    No Change

    x64video

    Intel HD, 4200, 4400, 4600, 5000, 5100, 5200, 5300, 5500, 6000, 515, 520, 530, P530, Iris 540 Graphics Driver

    ReleaseID: N8YN8
    DellVersion: A03
    VendorVersion: 20.19.15.4454
    ReleaseID: MKHKR
    DellVersion: A04
    VendorVersion: 20.19.15.4483

    Updated

    Viewing all 1843 articles
    Browse latest View live


    <script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>