About Events and Incidents

About Events and Incidents

This document provides a structured overview of key security-related incidents logged by ThinkShield Firmware Assurance. Events are categorized based on their nature, severity, and potential impact. Each event includes a brief description, its severity level, and key considerations for security monitoring. By analyzing these logs, administrators and security teams can:
  1. Detect unauthorized hardware modifications and tampering attempts.
  2. Identify potential firmware intrusions and security breaches.
  3. Monitor critical system operations, including boot processes and updates.
  4. Ensure compliance with security policies and forensic investigations.

BIOS Event Log

BIOS events are generated at boot through a combination of hardware monitoring, firmware diagnostics, and security checks.

1. Power On (From Year: 2023)

Summary:
  1. Wake-on-LAN detected – Occurs when the system powers on remotely via Wake-on-LAN, used for remote management. May indicate authorized remote access or potential unauthorized activity.
  2. Detected – A generic power-on event that signifies system startup by any other means than Wake-on-Lan
Default Severity: Moderate (Wake-on-LAN), Normal (Generic power-on).
Note: If unexpected Wake-on-LAN events occur, administrators should investigate network activity and other events from the device for suspicious chains of events.

2. Subcomponent Code Measurement (From Year: 2023)

Summary:
  1. Trusted – All firmware subcomponents passed integrity checks. No unauthorized modifications have occurred.
  2. Corrupted – At least one firmware subcomponent failed integrity checks, indicating potential tampering or corruption.
Severity: Normal (Trusted), High (Corrupted).
Notes:
  1. This event helps monitor firmware integrity, which is critical for system security.
  2. Administrators should immediately investigate any "Corrupted" status.

3. System Preboot Authentication (From Year: 2023)

Summary:
  1. Pass – Preboot authentication completed successfully.
  2. Fail – Authentication attempt failed, possibly due to incorrect credentials or unauthorized access attempts.
Severity: Normal (Pass), Moderate (Fail).
Note: Frequent failures may indicate brute-force attacks or unauthorized access attempts.

4. BIOS Password Change (From Year: 2023)

Summary:
  1. Created – A new BIOS password was set.
  2. Changed – The existing BIOS password was modified.
  3. Removed – The BIOS password was removed, potentially reducing security.
Default Severity: Normal (Created), Low (Changed), High (Removed).
Note: Password removal should be reviewed to confirm it was intentional.

5. Subcomponent Self-Healing (From Year: 2023)

Summary:
  1. Pass – Self-healing process was executed successfully, subcomponent was restored.
  2. Fail – Self-healing process failed, the issue persists.
Severity: Low (Pass), High (Fail).
Notes:
  1. Failed self-healing suggests deeper firmware issues requiring manual intervention.
  2. This event helps monitor firmware integrity, which is critical for system security.

6. BIOS Setup Configuration Change (From Year: 2023)

Summary:
  1. Detected – BIOS setting was modified, which could impact performance, security, or system behavior.
  2. BIOS Setup –BIOS setting was modified via BIOS Setup.
  3. WMI – BIOS setting was modified via WMI command.
Severity: Moderate.
NoteUnauthorized configuration changes should be investigated to prevent security risks.

7. Runtime Intrusion Detection of SPI Flash (From Year: 2024)

Summary:
  1. Detected – Detected potential intrusion or unauthorized modification of SPI flash memory.
Severity: Moderate.
NoteSPI flash memory stores firmware; unauthorized changes may indicate an attack on system integrity.

8. Device Change (From Year: 2023)

Summary:
  1. Attached – A new hardware device was connected to the system.
  2. Replaced – A previously connected device was swapped with another.
  3. Removed – A hardware device was disconnected from the system.
Severity: Moderate (Attached, Replaced); High (Removed).
Notes: 
  1. Helps track unauthorized hardware modifications.
  2. Unexpected removals should be checked to ensure critical components remain intact.

9. System Boot (From Year: 2023)

Summary –  System successfully booted up.
Severity: Low
Note: Regular system boots are expected, but unusual boot sequences may warrant investigation.

10. System Tamper (From Year: 2023)

Summary:
  1. Open – The system’s chassis was opened, indicating possible physical tampering.
  2. Close – The chassis is closed.
Severity:
  1. High (Open)
  2. Normal (Close)
NoteDetects unauthorized physical access.

11. POST Error (From Year: 2023)

Summary:
  1. Detected – Hardware or firmware-related error during Power-On Self-Test (POST).
Severity: Moderate
Note: May Indicate hardware failure or misconfiguration; requires further investigation.


12. Flash Update (From Year: 2023)

Summary:
  1. Pass –  firmware update successful.
  2. Fail –  firmware update failed.
Severity: Low (Pass), High (Fail)
Note: Failed firmware updates may render the system unusable requiring recovery procedures.

13. Log Cleared (From Year: 2023)

Summary:
  1. BIOS event log menu – Logs were manually cleared from the BIOS event log.
  2. BIOS initialization to factory default – BIOS settings were restored to factory defaults.
  3. Service – Log was cleared as part of a service process.
Severity: High (BIOS event log menu), Normal (BIOS initialization to factory default, Service)
Note: Unauthorized log clearance may indicate security concealment.

14. Set On-Premise (From Year: 2023)

Summary:
  1. Detected – System setting change marked the device as being physically located on-premises.
Severity: Low
Notes : Relevant for enforcing enforcing location-based security policies.

15. Capsule Update (From Year: 2023)

Summary:
  1. Pass – Capsule update (firmware) was successful.
  2. Fail – Capsule update failed.
Severity: High
Note: Ensures firmware integrity and security patching. Failed updates may require manual intervention.

16. Shutdown/Reboot (From Year: 2023)

Summary:
  1. Detected – Shutdown or reboot event was logged.
  2. Severity: Normal
Note: Usually normal, but can be useful for tracking unexpected system restarts.

17. Secure Wipe (From Year: 2024)

Summary:
  1. Completed Successfully – Secure wipe operation was successful.
  2. Failed – Secure wipe operation failed.
Severity: Low (Completed Successfully), Moderate (Failed)
Note: Ensures data is permanently erased before disposal or reuse.

18. TCG PPI Operation (From Year: 2024)

Summary:
  1. Detected – Trusted Computing Group (TCG) Physical Presence Interface (PPI) operation was performed.
Severity: Moderate
Note: 
TCG PPI operations involve security settings like enabling/disabling TPM. Unexpected changes should be reviewed.

19. HTTP Boot (From Year: 2024)

Summary:
  1. Detected – Network-based boot via HTTP.
Severity: Moderate
Note: Used for remote deployment. Unauthorized usage may indicate external boot attempts.

20. Device Firmware Failure (From Year: 2025)

This event indicates that a hardware component's firmware has encountered an issue, failed to initialize, or is corrupted. Possible causes include a failed firmware update, corrupt or incompatible firmware, hardware malfunction, or security policies such as Secure Boot or BIOS restrictions blocking unauthorized firmware. Currently, the following hardware components are monitored for this issue: TBT Retimer, TPM, TrackPoint, Touchpad, WLAN, and SSD0 (primary SSD).

Summary:
  1. TBT Retimer - FW corrupted  
  2. TBT Retimer - Not found  
  3. TBT Retimer - Response timeout  
  4. TPM - FW corrupted  
  5. TPM - Not found  
  6. TPM - Response timeout  
  7. Trackpoint - FW corrupted  
  8. Trackpoint - Not found  
  9. Trackpoint - Response timeout  
  10. Touchpad - FW corrupted  
  11. Touchpad - Not found  
  12. Touchpad - Response timeout  
  13. WLAN - FW corrupted  
  14. WLAN - Not found  
  15. WLAN - Response timeout  
  16. SSD0 - FW corrupted  
  17. SSD0 - Not found  
  18. SSD0 - Response timeout  
Severity: High
Note: this issue can result from corruption, failed updates, or hardware issues; update or reflash firmware, check BIOS settings, and replace the affected component if necessary.

OS Event Log

OS events are generated at runtime whenever the ThinkShield Firmware Assurance agent detects a changes in the system.


1. TPM PCR Change

Summary:
  1. Detected – A change in the Platform Configuration Registers (PCRs) was detected.
Severity: High
Notes:
  1. PCR changes indicate modifications to measured boot components
  2. Unexpected PCR changes may indicate tampering or unauthorized configuration adjustments.
  3. Review BIOS logs to identify reasons for changes.

2. BIOS Mode Change

Summary:
  1. Switched to UEFI – Firmware mode changed to UEFI.
  2. Switched to Legacy BIOS – Firmware mode changed to Legacy BIOS.
Severity: High
NoteBIOS mode changes can impact boot security and compatibility. It should be reviewed for unauthorized modifications.

3. BIOS Version Change

Summary:
  1. Detected – BIOS/UEFI firmware version changed.
Severity: High
NoteBIOS updates can introduce security fixes or vulnerabilities. Ensure updates are authorized and from a trusted source.

4. Secure Boot Status Change

Summary:
  1. Disabled – Secure Boot was turned off.
  2. Enabled – Secure Boot was turned on.
Severity: High
NoteSecure Boot ensures only signed bootloaders run. Disabling it can expose the system to malware.

5. Drive Encryption Status Change

Summary:
  1. Detected – Encryption status of a storage drive has changed.
Severity: High
Note: Changes in drive encryption may indicate unauthorized access attempts or security misconfigurations. Review for potential data protection risks.

6. Disk Drive Firmware Version Change

Summary:
  1. Detected – Firmware version of a storage drive has changed.
Severity: High
Note : Firmware updates can improve performance or security but should be verified as intentional and from a trusted source.

EC Event Log

This event is generated in runtime through communication between the Embedded Controller (EC) and the ThinkShield Firmware Assurance agent.

1. On-Demand Measurement (From Year: 2025)

Summary: 
  1. Trusted: All firmware subcomponents successfully passed integrity checks, ensuring no unauthorized modifications have occurred.
  2. Corrupted: At least one firmware subcomponent failed an integrity check, indicating possible tampering or corruption.
Default Severity: Normal (Trusted), High (Corrupted).
Notes
  1. This event helps monitor firmware integrity, which is essential for system security.
  2. Administrators should promptly investigate any "Corrupted" status.
  3. Admins can initiate new checks on the portal at any time.
    • Related Articles

    • Running On-demand Measurements

      This feature introduces the ability to perform on-demand measurements on the device, run the measurement (verify firmware integrity) of each component, and display the latest logs on the Cloud UI. It also enables a two-step attestation of ...
    • Viewing and Setting Incident Severity Levels

      About Incident Severity Each incident, issue, or event on ThinkShield Firmware Assurance (TSFA) is assigned a Severity Level, which indicates the level of importance and suggests potential actions needed for a specific device. These severity levels ...
    • Viewing Incidents Report

      To access this report, navigate to the Incidents section. Here, you'll find a comprehensive list of all recorded incidents, including any issues or errors identified based on criteria set by the IT Admin. Incidents are a specific type of event that ...
    • Setting Incident Notifications

      Incidents This feature allows users to customize their alert preferences based on the severity level of incidents: Low and higher, Moderate and higher, or High only. When an incident matches the selected severity level, users are promptly notified ...
    • About Device Statuses

      Status The Status refers to the platform state of a device and indicates its onboarding stage. Devices can have one of three statuses: Active: The device is fully onboarded, provisioned, and actively reporting data. Pending: The device is either ...