Dell iDRAC Service Module Security Configuration Guide

PDF

Data protection

Data protection secures and protects customer and application data that iDRAC Service Module (iSM) stores, manages, and uses.

iSM has few features that require data to be stored on the file system of the operating system. iSM stores iSM-specific configuration files in a location that is accessible only to administrators or root users. iSM configuration includes feature states and other intermediate files necessary for providing uninterrupted services.

iSM stores all the artifacts such as iSM binaries and configuration files on the operating system file system that is restricted to administrator accounts only.


Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\