
Dell iDRAC Service Module Security Configuration Guide
Tamper evidence and resistance
The binaries that are installed by iSM are signed and the signature is verified by the iSM process at run time before loading. Any failure to verify the signature of the library prompts an audit logging with critical severity. The iSM service exits after logging the audit message as a security measure. This message is logged in the default operating system log location. The message is as follows:
SEC0704: The authentication check operation performed by iSM has failed for the following module or application because either the binary load path is incorrect or the binary or configuration file is tampered, replaced, or untrusted : <list of app and modules>. iSM has integrity verification for certain TechSupport Report artifacts like SPD logs.
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\