Managing Dell BIOS Passwords with Intune(Dell Command | Endpoint Configure)

Migrating from SCCM to Intune with a mixed Dell fleet? Here’s a practical way to handle legacy BIOS setup passwords (setuppwd) and apply BIOS settings consistently using Dell Command | Endpoint Configure for Microsoft Intune and Dell Command | Configure.

A Dell fleet that’s half “old SCCM-era BIOS password” and half “new devices with no password” will break BIOS policy consistency unless you plan for it.

  • Use Dell Command | Endpoint Configure for Microsoft Intune to apply BIOS settings through Intune.
  • Build/export your config with Dell Command | Configure (CCTK).
  • Run a two-track strategy: devices with an existing password vs devices without.
  • Critical gotcha: If devices already have a BIOS password and you’re not using Intune per-device BIOS password management, you must include ValSetupPwd= in your CCTK. If you don’t, policies fail with “Dell Agent reported error: 65” (also visible in policy monitoring).

The scenario: SCCM to Intune, mixed BIOS password state

This shows up a lot after a migration:

  • Older Dell devices were managed in SCCM and have a legacy setup password (setuppwd) configured.
  • Newer Dell devices were deployed later (often Autopilot-era) and either have no BIOS password or a different standard.
  • You now manage BIOS settings using:

That combination works great—as long as the password state is handled properly.

What Dell Command | Endpoint Configure + Intune actually changes

Conceptually, the flow is:

  1. You define the BIOS configuration in Dell Command | Configure.
  2. You export the settings into a CCTK config file/package.
  3. Intune delivers the policy, and the Dell agent applies it on the device.

If the BIOS is password-protected, the agent needs the correct password context to apply protected changes.

Use a two-track deployment model

Track A: Devices that already have a BIOS setup password

Goal: keep them manageable and move them toward your desired end-state.

  • If you know the current password, you can apply settings reliably (and optionally rotate).
  • If you don’t know the current password, you can’t apply protected settings consistently (you’ll need a servicing process).

Track B: Devices with no BIOS password

Goal: apply baseline + set your standard password from the start (or adopt per-device passwords if that’s your chosen model).

Lets fix the BIOS settings

1) Define your BIOS baseline once

In Dell Command | Configure, build a baseline that fits your standard: virtualization options, boot settings, security toggles, and device-specific options where relevant.

2) Export separate CCTK payloads (recommended)

Create at least two payload variants:

  • Payload 1: CCTK file with just the password change
  • Payload 2: Baseline for devices with the new password n existing BIOS password (include ValSetupPwd= in the CCTK if you are not using per-device password management)

This makes scoping and troubleshooting much easier.

During the export, skip the Certificate-Based Authentication, leave it as Unspecified. Then “Continue Without Encryption”.

3) Add valsyspwd or valsetuppwd

Now we have the cctk file, open the file that needs the current password in an text editor, Notepad Vs code or similar. Do the same for the new devics and our baseline (Track B).


Add the lines
valSetupPwd= “current password”
SetupPwd= “new fresh password”

3) Deploy in rings

Roll it out like you would with firmware: Pilot (IT devices), then a small production ring, then broad deployment.

Troubleshooting: quick checks when policies fail

If you see “Dell Agent reported error: 65”

Check these first:

  • Does the device already have a BIOS password?
  • Are you not using per-device password management?
  • Does the deployed CCTK include the correct ValSetupPwd=?
  • Did you accidentally target the “no password” payload to a passworded device?

When ValSetupPwd= is missing (or wrong), you’ll see:

This is listed in the Intune console under policy monitoring for the profile.

Full list of error codes can be found here.

FAQ

Can I manage BIOS settings without knowing the current password?

Not reliably for password-protected changes. If the password is unknown, you typically need an authorized servicing/reset workflow before the device can be brought into the managed baseline.

Should I use per-device BIOS passwords?

Operationally, it’s a stronger long-term model (no shared secret), but it requires process maturity (break-glass, access controls, auditing). If you don’t adopt it, you must be disciplined about how you handle ValSetupPwd= in CCTK and who knows that shared password.

Where does Dell portal integration fit into Intune?

If you’re using Dell’s integration (often surfaced as the Dell portal integration / Dell add-on experience inside the Intune admin center), it’s best to treat it as your “single pane” for Dell-specific lifecycle capabilities—typically things like visibility, vendor insights, and (depending on what you’ve enabled/licensed) extra Dell management surfaces that complement native Intune.

For BIOS management specifically, the practical takeaway is: don’t mix and match three different control planes for the same settings. Pick one primary path for BIOS configuration (for example, Dell Command | Endpoint Configure policies in Intune) and keep the Dell portal integration focused on what it’s good at (vendor-specific reporting and operational workflows), otherwise you’ll end up with the endpoint equivalent of two drummers and no tempo.

If you can go with Partner Portals I would recommend it, it is easy to handle bios passwords and settings that way instead of cctk files. I my last case we where not allowed to use that third-party provider because discussions on where the data was stored and who had access to it…

Leave a Reply

Your email address will not be published. Required fields are marked *