
Dell iDRAC Service Module Security Configuration Guide
Data protection
Data protection secures and protects customer and application data that iDRAC Service Module (iSM) stores, manages, and uses.
iSM has few features that require data to be stored on the file system of the operating system. iSM stores iSM-specific configuration files in a location that is accessible only to administrators or root users. iSM configuration includes feature states and other intermediate files necessary for providing uninterrupted services.
iSM stores all the artifacts such as iSM binaries and configuration files on the operating system file system that is restricted to administrator accounts only.
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\