NOTE: Dell Command | Configure 4.0 or later requires platforms supporting WMI-ACPI BIOS. The complete functionalities of Dell Command | Configure is available for the supported platforms, refer the Supported Platforms for more information.
NOTE: Ensure SMM Security Mitigation BIOS Feature is Disabled on applicable platforms running Linux operating systems. Dell Command | Configure on Linux operating systems will not work as intended if SMM Security Mitigation BIOS feature is Enabled.
NOTE: Dell Command | Configure 4.1 or later Supported Features Nomenclature (Names along with its Configuration Possible Value Names) have been refreshed across CLI and GUI. Dell Command | Configure even though is Backward Compatible for the Older Nomenclature, it is highly advisable to migrate/create Scripts to start using these Newer Features Nomenclature.
View the complete list of the Newer and the Older Nomenclature here
For the limited functionalities on non WMI-ACPI complaint platforms, see Windows SMM Security Mitigations Table Compliance section in Dell Command | Configure User's guide.
Dell Command | Configure is a packaged software application that provides configuration capability to business client platforms.
This product consists of a Command Line Interface (CLI) and Graphical User Interface (GUI) to configure various BIOS features. Dell Command | Configure supports following Windows and Linux operating systems: Windows 7, Windows 8, Windows 8.1, and Windows 10, Windows Pre-installation Environment (Windows PE), Red Hat Enterprise Linux 6, Red Hat Enterprise Linux 7, and Ubuntu Desktop 16.04.
This is the 4.1 version of Dell Command | Configure.
Fixes in the Release
Fix: Dell Command | Configure sets an unknown password for the BIOS issue has been resolved
Description: While running the following command cctk.exe --setuppwd --valsetuppwd=abcd1234, Dell Command | Configure displays Only validation option. No actions will be performed. Password is set successfully message issue has been resolved now.
Fix: Local package takes few seconds to load for the first time issue has been resolvedDescription: Once you launch the GUI Application for the first time, the local system package takes few seconds to load. As a result of that, the application takes few seconds to display the data grid. This delay is not observed during the next cycle onwards issue has been resolved now.
Fix: GUI Application takes few seconds to exit if closed immediately after launch issue has been resolvedDescription: Once you launch the GUI Application and close it immediately, the closure is delayed by few seconds. This happens for the first time and is not observed during the next cycle onwards issue has been resolved now.
Fix: Issue in validating the feature for non enum types has been resolved
New in the Release
– GUI launch time has been improved
– SCE execution time has been improved
– Configuration read and write time using command line has been improved
Dell Command | Configure 4.0
Dell Command | Configure 3.3
Dell Command | Configure 3.2
Dell Command | Configure 3.1.2
Dell Command | Configure 3.1
Dell Command | Configure 3.0
1. Activating the TPM with Dell Command | Configure
2. Setting the BIOS defaults using Dell Command | Configure
Why can we not disable Secure Boot with the CCTK ?
Secure boot cannot be disabled with remote BIOS configuration tools like Dell Command Configure(CCTK) as it is not allowed by BIOS by design.
This has been done in order to ensure that the system is always booted with trusted OS only in UEFI.
Check the link below to find more details on disabling Secure boot.
There is a setting under the Optiplex series BIOS in the Security Section 'Password Change' with the checkbox 'Allow Non-Admin Password Changes'. Can I toggle this on/off with CCTK?
I believe you are looking for the --admsetuplockout option. If you disable this a user cans still view the BIOS screens without having to have a BIOS password.
@Warren Byle - that's great, thanks for confirming!
What are the supported systems for this software?
The user's guide says "For the list of Dell client systems and operating systems, see the Release notes available in the Command | Configure installation files or at dell.com/clientsystemsmanagement." However, there are no release notes the and website is difficult to find the information.
Release notes are in the "Documentation Link" above. Here's the direct link to the release notes.. http://ftp.dell.com/Manuals/all-products/esuprt_software/esuprt_client_sys_mgmt/esuprt_client_sys_mgmt_clnt_config_tlkt/dell-cmnd-config-v3.0_Release%20Notes1_en-us.pdf
In short, the Latitude, Optiplex, Precision and Venue Pro 11 platforms are supported.
<p><p><p><p>Release notes are in the "Documentation Link" above. Here's the direct link to the release notes.. <a rel="nofollow" target="_blank">ftp.dell.com/.../dell-cmnd-config-v3.0_Release%20Notes1_en-us.pdf</a></p></p></p></p>
<p><p><p><p>In short, the Latitude, Optiplex, Precision and Venue Pro 11 platforms are supported.</p></p></p></p>
<p><p><p><p><a rel="nofollow" target="_blank">ftp.dell.com/.../dell-cmnd-config-v3.0_Release%20Notes1_en-us.pdf</a></p></p></p></p>
Thanks Warren. I'm sure it would be nice if you could just reply to existing comments. The release notes do not list Win7 Enterprise as a supported OS, which I'm sure is just an oversight.
Correct. Win7 is supported.
First, you guys need to advertise these tools more. We had no idea they existed. These tools actually allow us to automate some annoying processes enough that we could even start rethinking the need for VDI.
Second, as a test, I deployed a BIOS settings executable to a lab of about 40 OptiPlex 7010 (desktop/slimline) machines that all have the A19 BIOS version. Here are the main settings I set: an administrator password (so not just anyone can edit the BIOS settings), disable booting from all devices but the internal HDD, disable deep sleep, and enable wake-on-LAN with PXE boot.
The last setting is the one I am having issues with. When I deployed it, about 35 machines took all the settings except the "wake-on-LAN with PXE boot" setting. The last 5 machines took all settings, including the "wake-on-LAN with PXE boot" setting.
Any ideas on what would cause this? Seems like it would have to be some kind of bug, wouldn't it?
Is it possible to view\report if hard drive encryption (using a FDE hard drive) is enabled on a device?
I know that I can use cctk.exe on 64bit WinPE5, but I then have to use plain text passwords. Is there or will there be a way to make 64bit SCE executables so that I can encrypt my passwords?
I have found a bug and problem with DCC 3.0.1. In the GUI, it will not allow for creating an .exe for the --setuppwd WHEN the value is empty. So how does someone clear the BIOS setup password?!
Furthermore, if just trying to use the cctk.exe (and all folders/files) as part of a ConfigMgr package, the cctk.exe fails ... however, it does succeed if the DCC software is installed. So this is a bug that it can be run manually and succeed, but can't run successfully in a ConfigMgr package.