Did you just download a file that is digitally signed by Dell and wonder if the file is safe? If that's the case, please read on.
You'll probably notice Dell when double-clicking to run the file. The publisher name shows up as the "Verified publisher" in the UAC dialog as the screengrab shows:
You can view the additional details from the Dell digital signature with the following procedure:
Here's a screencap of a file digitally signed by Dell:
As you can see in the screenshot above, Windows states that "This digital signature is OK". This means that the file has been published by Dell and that the file has not been tampered with.
If you click the View Certificate button shown in the screenshot above, you can see all the details of the certificate, such as when it was issued, who issued the certificate, how long it is valid, and so on. You can also see the address for Dell, such as the street name, city and country.
VeriSign Class 3 Code Signing 2010 CA and Symantec Class 3 SHA256 Code Signing CA has issued the Dell certificates. You can also see the details of the issuer by clicking the View Certificate button shown in the screenshot above.
The following are the Dell files I've collected, thanks to the FreeFixer users.
Detection Ratio | File Name |
---|---|
0/57 | sedfilter.sys |
0/57 | KUsrInit.exe |
0/57 | cmgffe.sys |
0/55 | KUsrInit.exe |
0/56 | KUsrInit.exe |
0/56 | KUsrInit.exe |
0/55 | cmgfve.sys |
0/54 | credfltl.sys |
0/56 | Dell.SecurityManager.SystrayApp.exe |
0/54 | KUsrInit.exe |
The detection percentage is based on that I have gathered 2166 scan reports for the Dell files. 0 of these scan reports came up with some sort of detection. If you like, you can review the full details of the scan results by examining the files listed above.
The analysis is done on certificates with the following serial numbers: