
PowerEdge Servers Error and Event Messages Reference Guide
SEC—Security Event Event Messages
SEC0000
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The chassis is open.
- Detailed Description
- The chassis is open. System performance may be degraded, and security may be compromised.
- Recommended Response Action
- Close the chassis. Check system logs.
- Category
- System Health (SEC = Security Event)
- Severity
- Critical
- Trap/EventID
- 2385
- LCD Message
- Intrusion detected. Check chassis cover
- OMSA Event ID
- 5254
- OMSA Trap ID
- 5254
- Redfish Event Type
- Alert
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, IPMI Alert*, SNMP Alert, Email Alert, Remote System Log, WS Eventing, Redfish Eventing*, LC Log*, OS Log, Power Off, Power Cycle, Reset
- Applicable Event or Alert Types
- CMC—Filter Visibility, SNMP Alert*, Email Alert*, Remote System Log*, LC Log*, Chassis Event Proxy*
SEC0001
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The drive bay is open.
- Detailed Description
- The drive bay is open. A drive may be added or removed. System performance may be degraded.
- Recommended Response Action
- Close the drive bay. Check system logs.
- Category
- System Health (SEC = Security Event)
- Severity
- Critical
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0002
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The I/O card area is open.
- Detailed Description
- The I/O card area is open. I/O cards may be added or removed. System performance may be degraded.
- Recommended Response Action
- Close the I/O card area. Check system logs.
- Category
- System Health (SEC = Security Event)
- Severity
- Critical
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0003
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The processor area is open.
- Detailed Description
- The processor area is open. A drive may be added or removed. System performance may be degraded.
- Recommended Response Action
- Close the processor area. Check system logs.
- Category
- System Health (SEC = Security Event)
- Severity
- Critical
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0004
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The LAN is disconnected.
- Detailed Description
- The LAN is disconnected. Network performance may be degraded.
- Recommended Response Action
- If unintentional, connect network cable.
- Category
- System Health (SEC = Security Event)
- Severity
- Critical
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0005
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- Unauthorized docking is detected.
- Detailed Description
- A removable component may have been tampered with, or installed incorrectly, or does not meet system requirements.
- Recommended Response Action
- Check removable hardware components for correct installation. Review installation documentation.
- Category
- System Health (SEC = Security Event)
- Severity
- Critical
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0006
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The fan area is open.
- Detailed Description
- The fan area is open. System performance may be degraded.
- Recommended Response Action
- Close the fan area. Check system logs.
- Category
- System Health (SEC = Security Event)
- Severity
- Critical
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0016
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The chassis is closed.
- Detailed Description
- No detailed description available.
- Recommended Response Action
- No response action is required.
- Category
- System Health (SEC = Security Event)
- Severity
- Informational
- Trap/EventID
- 2387
- OMSA Event ID
- 5252
- OMSA Trap ID
- 5252
- Redfish Event Type
- Alert
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, IPMI Alert*, SNMP Alert, Email Alert, Remote System Log, WS Eventing, Redfish Eventing*, LC Log*, OS Log
- Applicable Event or Alert Types
- CMC—Filter Visibility, SNMP Alert*, Email Alert*, Remote System Log*, LC Log*, Chassis Event Proxy*
SEC0017
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The drive bay is closed.
- Detailed Description
- No detailed description available.
- Recommended Response Action
- No response action is required.
- Category
- System Health (SEC = Security Event)
- Severity
- Informational
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0018
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The I/O card area is closed.
- Detailed Description
- No detailed description available.
- Recommended Response Action
- No response action is required.
- Category
- System Health (SEC = Security Event)
- Severity
- Informational
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0019
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The processor area is closed.
- Detailed Description
- No detailed description available.
- Recommended Response Action
- No response action is required.
- Category
- System Health (SEC = Security Event)
- Severity
- Informational
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0020
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The LAN is connected.
- Detailed Description
- No detailed description available.
- Recommended Response Action
- No response action is required.
- Category
- System Health (SEC = Security Event)
- Severity
- Informational
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0021
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The docking is authorized.
- Detailed Description
- No detailed description available.
- Recommended Response Action
- No response action is required.
- Category
- System Health (SEC = Security Event)
- Severity
- Informational
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0022
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The fan area is closed.
- Detailed Description
- No detailed description available.
- Recommended Response Action
- No response action is required.
- Category
- System Health (SEC = Security Event)
- Severity
- Informational
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0023
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The arg1 drive bay is open.
- Arguments
- arg1 = name
- Detailed Description
- The drive bay identified in the message is open.
- Recommended Response Action
- Close the drive bay as soon as possible. For information about drive bays, see the Installation and Service Manual of the respective server on the support site.
- Category
- System Health (SEC = Security Event)
- Severity
- Informational
- Trap/EventID
- 2387
- Redfish Event Type
- Alert
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, IPMI Alert*, SNMP Alert, Email Alert, Remote System Log, WS Eventing, Redfish Eventing*, LC Log*, OS Log
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0024
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The arg1 drive bay is closed.
- Arguments
- arg1 = name
- Detailed Description
- The drive bay identified in the message is closed.
- Recommended Response Action
- No response action is required.
- Category
- System Health (SEC = Security Event)
- Severity
- Informational
- Trap/EventID
- 2387
- Redfish Event Type
- Alert
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, IPMI Alert*, SNMP Alert, Email Alert, Remote System Log, WS Eventing, Redfish Eventing*, LC Log*, OS Log
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0025
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The arg1 drive bay is kept open for an extended period of time.
- Arguments
- arg1 = name
- Detailed Description
- The drive bay identified in the message is kept open for an extended period of time. This may result in excessive cooling of the components.
- Recommended Response Action
- Close the drive bay immediately. For information about drive bays, see the Installation and Service Manual of the respective server on the support site. if the issue persists, Collect a SupportAssist collection (TSR) report using iDRAC. Visit https://www.dell.com/support/incidents-online/contactus/dynamic to use the Virtual Assistant to analyze the collection and recommend a resolution.
- Category
- System Health (SEC = Security Event)
- Severity
- Critical
- Trap/EventID
- 2385
- LCD Message
- The <name> drive bay is kept open for an extended period of time.
- Redfish Event Type
- Alert
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, IPMI Alert*, SNMP Alert, Email Alert, Remote System Log, WS Eventing, Redfish Eventing*, LC Log*, OS Log, Power Off, Power Cycle, Reset
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0031
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The chassis is open while the power is on.
- Detailed Description
- The chassis is open. System performance may be degraded, and security may be compromised.
- Recommended Response Action
- Close the chassis. Check system logs.
- Category
- System Health (SEC = Security Event)
- Severity
- Critical
- Trap/EventID
- 2385
- LCD Message
- Intrusion detected. Check chassis cover
- Redfish Event Type
- Alert
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, IPMI Alert*, SNMP Alert, Email Alert, Remote System Log, WS Eventing, Redfish Eventing*, LC Log*, OS Log, Power Off, Power Cycle, Reset
- Applicable Event or Alert Types
- CMC—Filter Visibility, SNMP Alert*, Email Alert*, Remote System Log*, LC Log*, Chassis Event Proxy*
SEC0032
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The chassis is closed while the power is on.
- Detailed Description
- No detailed description available.
- Recommended Response Action
- No response action is required.
- Category
- System Health (SEC = Security Event)
- Severity
- Informational
- Trap/EventID
- 2387
- Redfish Event Type
- Alert
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, IPMI Alert*, SNMP Alert, Email Alert, Remote System Log, WS Eventing, Redfish Eventing*, LC Log*, OS Log
- Applicable Event or Alert Types
- CMC—Filter Visibility, SNMP Alert*, Email Alert*, Remote System Log*, LC Log*, Chassis Event Proxy*
SEC0033
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The chassis is open while the power is off.
- Detailed Description
- The chassis is open while the power is off. System security may have been compromised.
- Recommended Response Action
- Close the chassis and verify hardware inventory. Check system logs.
- Category
- System Health (SEC = Security Event)
- Severity
- Critical
- Trap/EventID
- 2385
- LCD Message
- Intrusion detected. Check chassis cover
- Redfish Event Type
- Alert
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, IPMI Alert*, SNMP Alert, Email Alert, Remote System Log, WS Eventing, Redfish Eventing*, LC Log*, OS Log, Power Off, Power Cycle, Reset
- Applicable Event or Alert Types
- CMC—Filter Visibility, SNMP Alert*, Email Alert*, Remote System Log*, LC Log*, Chassis Event Proxy*
SEC0034
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The chassis is closed while the power is off.
- Detailed Description
- No detailed description available.
- Recommended Response Action
- No response action is required.
- Category
- System Health (SEC = Security Event)
- Severity
- Informational
- Trap/EventID
- 2387
- Redfish Event Type
- Alert
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, IPMI Alert*, SNMP Alert, Email Alert, Remote System Log, WS Eventing, Redfish Eventing*, LC Log*, OS Log
- Applicable Event or Alert Types
- CMC—Filter Visibility, SNMP Alert*, Email Alert*, Remote System Log*, LC Log*, Chassis Event Proxy*
SEC0040
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- A critical stop occurred during OS load.
- Detailed Description
- Operating system generated critical stop IPMI event. (Sensor type code = 20H).
- Recommended Response Action
- Check video and operating system logs for additional information.
- Category
- System Health (SEC = Security Event)
- Severity
- Critical
- Trap/EventID
- 2385
- Redfish Event Type
- Alert
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, SNMP Alert, Email Alert, Remote System Log, WS Eventing, Redfish Eventing*, LC Log*, OS Log
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0041
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- BIOS is unable to configure the Intel Trusted Execution Technology (TXT).
- Detailed Description
- TXT initialization cannot be completed because system configuration may have changed.
- Recommended Response Action
- Check system hardware inventory for TPM presence, clear and reconfigure TPM and TXT in BIOS setup menu.
- Category
- System Health (SEC = Security Event)
- Severity
- Critical
- Trap/EventID
- 2385
- LCD Message
- Unable to configure TXT. Reconfigure TPM and TXT in BIOS.
- Redfish Event Type
- Alert
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, SNMP Alert, Email Alert, Remote System Log, WS Eventing, Redfish Eventing*, LC Log*, OS Log
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0042
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- Processor detected a problem while performing an Intel Trusted Execution Technology (TXT) operation.
- Detailed Description
- TXT CPU microcode boot cannot be completed because system configuration may have changed.
- Recommended Response Action
- Check system hardware inventory for TPM presence, clear and reconfigure TPM and TXT in BIOS setup menu.
- Category
- System Health (SEC = Security Event)
- Severity
- Critical
- Trap/EventID
- 2385
- LCD Message
- Problem with TXT operation. Reconfigure TPM and TXT in BIOS.
- Redfish Event Type
- Alert
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, SNMP Alert, Email Alert, Remote System Log, WS Eventing, Redfish Eventing*, LC Log*, OS Log
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0043
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- BIOS Authenticated Code Module detected an Intel Trusted Execution Technology (TXT) problem during POST.
- Detailed Description
- TXT POST cannot be completed because system configuration may have changed.
- Recommended Response Action
- Check system hardware inventory for TPM presence, clear and reconfigure TPM and TXT in BIOS setup menu.
- Category
- System Health (SEC = Security Event)
- Severity
- Critical
- Trap/EventID
- 2385
- LCD Message
- TXT problem during POST. Reconfigure TPM and TXT in BIOS.
- Redfish Event Type
- Alert
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, SNMP Alert, Email Alert, Remote System Log, WS Eventing, Redfish Eventing*, LC Log*, OS Log
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0044
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- SINIT Authenticated Code Module detected an Intel Trusted Execution Technology (TXT) problem at boot.
- Detailed Description
- TXT initialization cannot be completed because system configuration may have changed.
- Recommended Response Action
- Check system hardware inventory for TPM presence, clear and reconfigure TPM and TXT in BIOS setup menu.
- Category
- System Health (SEC = Security Event)
- Severity
- Critical
- Trap/EventID
- 2385
- LCD Message
- TXT problem at boot. Reconfigure TPM and TXT in BIOS.
- Redfish Event Type
- Alert
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, SNMP Alert, Email Alert, Remote System Log, WS Eventing, Redfish Eventing*, LC Log*, OS Log
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0045
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- Intel Trusted Execution Technology (TXT) is operating correctly.
- Detailed Description
- No detailed description available.
- Recommended Response Action
- No response action is required.
- Category
- System Health (SEC = Security Event)
- Severity
- Informational
- Trap/EventID
- 2387
- Redfish Event Type
- Alert
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, SNMP Alert, Email Alert, Remote System Log, WS Eventing, Redfish Eventing*, LC Log*, OS Log
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0046
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The sled is inserted back into the chassis.
- Detailed Description
- The sled is inserted back into the chassis. Make sure that only an authorized person removes the sled out of the chassis slot.
- Recommended Response Action
- No response action is required.
- Category
- System Health (SEC = Security Event)
- Severity
- Informational
- Trap/EventID
- 2387
- Redfish Event Type
- Alert
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, SNMP Alert, Email Alert, Remote System Log, WS Eventing, Redfish Eventing*, LC Log*, OS Log
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0051
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- Unable to determine the redundancy status of the chassis intrusion sensor.
- Detailed Description
- The chassis may be open. This condition can lead to degraded system performance because of insufficient cooling and the system security may be compromised.
- Recommended Response Action
- Close the chassis.
- Category
- System Health (SEC = Security Event)
- Severity
- Warning
- OMSA Event ID
- 5251
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- No alerts are applicable for this message
SEC0052
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- Chassis intrusion sensor may have failed.
- Detailed Description
- The chassis intrusion sensor may have failed, because of this it cannot be determined whether the chassis is closed or opened. This condition can lead to degraded system performance because of insufficient cooling. The system security may be compromised.
- Recommended Response Action
- Replace the chassis intrusion sensor. For more information, contact your service provider.
- Category
- System Health (SEC = Security Event)
- Severity
- Critical
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- No alerts are applicable for this message
SEC0053
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- Unable to verify identity certificate for arg1 in Slot arg2.
- Arguments
- arg1 = Component name
- arg2 = slot
- Detailed Description
- The Factory Identity certificate for the component identified in the message cannot be verified because of some unknown error.
- Recommended Response Action
- Virtually reseat the component indicated in the message. If the issue persists, Collect a SupportAssist collection (TSR) report using iDRAC. Visit https://www.dell.com/support/incidents-online/contactus/dynamic to use the Virtual Assistant to analyze the collection and recommend a resolution.
- Category
- System Health (SEC = Security Event)
- Severity
- Critical
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0054
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- Unable to establish trust with arg1 in Slot arg2.
- Arguments
- arg1 = Component name
- arg2 = slot
- Detailed Description
- Trust establishment could not complete for the component identified in the message because of a missing Factory Identity certificate in the request.
- Recommended Response Action
- Virtually reseat the component indicated in the message. If the issue persists, Collect a SupportAssist collection (TSR) report using iDRAC. Visit https://www.dell.com/support/incidents-online/contactus/dynamic to use the Virtual Assistant to analyze the collection and recommend a resolution.
- Category
- System Health (SEC = Security Event)
- Severity
- Warning
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0100
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The arg1 in slot arg2 is open.
- Arguments
- arg1 = name
- arg2 = number
- Detailed Description
- The Storage disk tray identified in the message is open. The tray should be closed as soon as any service action is completed. Leaving the tray open for an extended period may result in drives over heating.
- Recommended Response Action
- Close the Storage disk tray identified in the message.
- Category
- Storage (SEC = Security Event)
- Severity
- Warning
- Trap/EventID
- 4434
- Redfish Event Type
- Alert
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, SNMP Alert, Email Alert, Remote System Log, WS Eventing, Redfish Eventing*, LC Log*, OS Log
- Applicable Event or Alert Types
- CMC—Filter Visibility, SNMP Alert*, Email Alert*, Remote System Log*, LC Log*, Chassis Event Proxy*
SEC0101
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The arg1 in slot arg2 is opened for more than 3 minutes.
- Arguments
- arg1 = name
- arg2 = number
- Detailed Description
- The Storage disk tray in the slot identified in the message has been open for an extended period of time. The tray should be closed as soon as any service action is completed. Leaving it open for extended period may result in drives overheating.
- Recommended Response Action
- Close the Storage disk tray as it may affect the system performance or may cause hard drives to overheat. Check system logs .
- Category
- Storage (SEC = Security Event)
- Severity
- Critical
- Trap/EventID
- 4433
- Redfish Event Type
- Alert
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, SNMP Alert, Email Alert, Remote System Log, WS Eventing, Redfish Eventing*, LC Log*, OS Log
- Applicable Event or Alert Types
- CMC—Filter Visibility, SNMP Alert*, Email Alert*, Remote System Log*, LC Log*, Chassis Event Proxy*
SEC0102
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The arg1 in slot arg2 is closed.
- Arguments
- arg1 = name
- arg2 = number
- Detailed Description
- The module or Storage tray identified in the message is closed.
- Recommended Response Action
- No response action is required.
- Category
- Storage (SEC = Security Event)
- Severity
- Informational
- Trap/EventID
- 4435
- Redfish Event Type
- Alert
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, SNMP Alert, Email Alert, Remote System Log, WS Eventing, Redfish Eventing*, LC Log*, OS Log
- Applicable Event or Alert Types
- CMC—Filter Visibility, SNMP Alert*, Email Alert*, Remote System Log*, LC Log*, Chassis Event Proxy*
SEC0300
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The delegated authentication configuration arg1 is successfully validated.
- Arguments
- arg1 = config name
- Detailed Description
- The delegated authentication configuration identified in the message is successfully validated.
- Recommended Response Action
- No response action is required.
- Category
- Audit (SEC = Security Event)
- Severity
- Informational
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0301
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- Unable to complete the operation because an internal delegated authentication error has occurred.
- Detailed Description
- The operation cannot be completed because an internal delegated authentication error has occurred.
- Recommended Response Action
- Retry the operation. If the issue persists, contact your system administrator.
- Category
- Audit (SEC = Security Event)
- Severity
- Warning
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0302
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- Unable to complete the operation because the delegated authentication configuration name arg1 entered is invalid.
- Arguments
- arg1 = config name
- Detailed Description
- The operation cannot be completed because the delegated authentication configuration name entered is invalid as identified in the message.
- Recommended Response Action
- Enter a valid delegated authentication configuration name, and then retry the operation. If the issue persists, contact your system administrator.
- Category
- Audit (SEC = Security Event)
- Severity
- Warning
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0303
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- Unable to verify the delegated authentication configuration name arg1 because a token is not entered.
- Arguments
- arg1 = config Name
- Detailed Description
- The delegated authentication configuration name cannot be verified because a valid token is not entered.
- Recommended Response Action
- Enter a valid token and retry the operation. If the issue persists, contact your system administrator.
- Category
- Audit (SEC = Security Event)
- Severity
- Warning
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0304
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- Unable to run the job because a delegated authentication configuration test job is already running for arg1.
- Arguments
- arg1 = config Name
- Detailed Description
- The job cannot be run because a delegated authentication configuration test job is already running.
- Recommended Response Action
- Wait for the test job to complete and retry the operation.
- Category
- Audit (SEC = Security Event)
- Severity
- Warning
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0305
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- Unable to download the discovery document arg1, for the configuration arg2. Discovery job status arg3. Issue description: arg4.
- Arguments
- arg1 = document File Name
- arg2 = config Name
- arg3 = error Code
- arg4 = error String
- Detailed Description
- The discovery document identified in the message cannot be downloaded because of the reasons identified in the message.
- Recommended Response Action
- Make sure about the following and retry the operation: 1) Document file name identified in the message exists. 2) The TLS certificate is valid. 3) A proper network connection is available to contact the destination.
- Category
- Audit (SEC = Security Event)
- Severity
- Warning
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0306
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- Unable to complete the operation because either the discovery document arg1 "issuer" key is missing or invalid.
- Arguments
- arg1 = Discovery Document File Name
- Detailed Description
- The operation cannot be completed because either the discovery document "issuer" key is missing or invalid.
- Recommended Response Action
- Enter a valid "issuer" key and retry the operation. If the issue persists, contact your system administrator.
- Category
- Audit (SEC = Security Event)
- Severity
- Warning
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0307
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- Unable to complete the operation because either the discovery document arg1 "jwks_uri" key is missing or invalid.
- Arguments
- arg1 = Discovery Document File Name
- Detailed Description
- The operation cannot be completed because either the discovery document "jwks_uri" key is missing or invalid.
- Recommended Response Action
- Enter a valid "jwks_uri" key and retry the operation. If the issue persists, contact your system administrator.
- Category
- Audit (SEC = Security Event)
- Severity
- Warning
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0308
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- Unable to download the JSON Web Key Set document arg1, for the configuration arg2. Discovery job status arg3. Issue description: arg4.
- Arguments
- arg1 = document File Name
- arg2 = config Name
- arg3 = error Code
- arg4 = error String
- Detailed Description
- The discovery document identified in the message cannot be downloaded because of the reasons identified in the message.
- Recommended Response Action
- Make sure about the following and retry the operation: 1) Document file name identified in the message exists. 2) The TLS certificate is valid. 3) A proper network connection is available to contact the destination.
- Category
- Audit (SEC = Security Event)
- Severity
- Warning
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0309
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- Unable to complete the operation because either a "keys" member is not entered or is invalid in the the JSON Web Key Set document arg1.
- Arguments
- arg1 = fileName
- Detailed Description
- The operation cannot be completed because either a "Keys" member is not entered or is invalid in the the JSON Web Key Set document identified in the message.
- Recommended Response Action
- Make sure that a valid "keys" member is entered in the JSON Web Key Set document file name, and then retry the operation. If the issue persists, contact your system administrator.
- Category
- Audit (SEC = Security Event)
- Severity
- Warning
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0310
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- Unable to complete the operation because either valid keys are not entered or are invalid in the JSON Web Key Set document arg1.
- Arguments
- arg1 = fileName
- Detailed Description
- The operation cannot be completed because either valid keys are not entered or are invalid in the the JSON Web Key Set document identified in the message.
- Recommended Response Action
- Make sure that valid keys are entered in the JSON Web Key Set document file name, and then retry the operation. If the issue persists, contact your system administrator.
- Category
- Audit (SEC = Security Event)
- Severity
- Warning
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0311
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- Unable to validate the signature of the test token provided by using the online configuration for arg1 because an invalid token is entered.
- Arguments
- arg1 = config Name
- Detailed Description
- The signature of the test token provided by using the online configuration identified in the message cannot be validated because an invalid token is entered.
- Recommended Response Action
- Make sure that a valid test token is entered, and then retry the operation. If the issue persists, contact your system administrator.
- Category
- Audit (SEC = Security Event)
- Severity
- Warning
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0312
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- Unable to validate the signature of the test token provided by using the offline configuration for arg1 because an invalid token is entered.
- Arguments
- arg1 = config Name
- Detailed Description
- The signature of the test token provided by using the offline configuration identified in the message cannot be validated because an invalid token is entered.
- Recommended Response Action
- Make sure that a valid test token is entered, and then retry the operation. If the issue persists, contact your system administrator.
- Category
- Audit (SEC = Security Event)
- Severity
- Warning
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0313
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- Unable to complete the operation because the token entered has an "iss" value arg1, but the discovery document for configuration arg2 has an issuer value of arg3.
- Arguments
- arg1 = token Value
- arg2 = config Name
- arg3 = document Value
- Detailed Description
- The operation cannot be completed because the token entered has an "iss" value which is different from the issuer value of the discovery document for configuration identified in the message.
- Recommended Response Action
- Make sure that the issuer token value is the same and retry the operation. If the issue persists, contact your system administrator.
- Category
- Audit (SEC = Security Event)
- Severity
- Warning
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0314
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- Unable to complete the operation because the current system date and time arg1 is later than the token expiration value arg2.
- Arguments
- arg1 = current System Date Time
- arg2 = token Expiry Date Time
- Detailed Description
- The operation cannot be completed because the current system date and time is later than the token expiration date and time identified in the message.
- Recommended Response Action
- Use a token with an expiration value which is later than the current system date and time, and then retry the operation. If the issue persists, contact your system administrator.
- Category
- Audit (SEC = Security Event)
- Severity
- Warning
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0315
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- Unable to complete the operation because the token has an "nbf" (not valid before) key value arg1 is later than the current system date and time arg2.
- Arguments
- arg1 = token Nbf Date Time
- arg2 = current System Date Time
- Detailed Description
- The operation cannot be completed because the token has an "nbf" (not valid before) key value which is later than the current system date and time identified in the message.
- Recommended Response Action
- Use a token with a "nbf" (not valid before) date and time which is later than than the current system date and time, and then retry the operation. If the issue persists, contact your system administrator.
- Category
- Audit (SEC = Security Event)
- Severity
- Warning
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0316
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- Unable to complete the operation because multiple issues are detected in the current Delegated Authentication configuration arg1.
- Arguments
- arg1 = config Name
- Detailed Description
- The operation cannot be completed because multiple issues are detected in the current Delegated Authentication configuration identified in the message.
- Recommended Response Action
- View the Lifecycle Logs for more information, and then initiate necessary corrective and preventive actions.
- Category
- Audit (SEC = Security Event)
- Severity
- Warning
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0317
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- Unable to add the configuration name arg1to the attribute registry because no Delegated Authentication configuration slots are available.
- Arguments
- arg1 = config name
- Detailed Description
- The configuration identified in the message cannot be added to the attribute registry because no Delegated Authentication configuration slots are available.
- Recommended Response Action
- Delete one of the existing configurations and retry the operation.
- Category
- Audit (SEC = Security Event)
- Severity
- Warning
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0318
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The token has an aud (audience) value of arg1, and does not match the system arg2 or arg3.
- Arguments
- arg1 = token Value
- arg2 = mac address
- arg3 = service tag
- Detailed Description
- The token has an incorrect audience value, and does not match the MAC address or Service Tag of the system as identified in the message.
- Recommended Response Action
- Make sure that the correct audience is entered, and then retry the operation. If the issue persists, contact your OpenManage Enterprise-Modular administrator.
- Category
- Audit (SEC = Security Event)
- Severity
- Warning
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0600
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- A secure mode violation detected.
- Detailed Description
- This may apply to a physical or remote access attempt.
- Recommended Response Action
- Check system logs for intrusion attempts, and ensure strong password policies.
- Category
- System Health (SEC = Security Event)
- Severity
- Warning
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0601
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- A secure mode violation was corrected.
- Detailed Description
- No detailed description available.
- Recommended Response Action
- No response action is required.
- Category
- System Health (SEC = Security Event)
- Severity
- Informational
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0602
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- User password violation detected.
- Detailed Description
- This may apply to a physical or remote access attempt.
- Recommended Response Action
- Check system logs for intrusion attempts, and ensure strong password policies.
- Category
- System Health (SEC = Security Event)
- Severity
- Warning
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0603
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- User password violation was corrected.
- Detailed Description
- No detailed description available.
- Recommended Response Action
- No response action is required.
- Category
- System Health (SEC = Security Event)
- Severity
- Informational
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0604
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- A setup password violation detected.
- Detailed Description
- This may apply to a physical or remote access attempt.
- Recommended Response Action
- Check system logs for intrusion attempts, and ensure strong password policies.
- Category
- System Health (SEC = Security Event)
- Severity
- Critical
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0605
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- A setup password violation was corrected.
- Detailed Description
- No detailed description available.
- Recommended Response Action
- No response action is required.
- Category
- System Health (SEC = Security Event)
- Severity
- Informational
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0606
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The network boot password violation detected.
- Detailed Description
- This may apply to a physical or remote access attempt.
- Recommended Response Action
- Check system logs for intrusion attempts, and ensure strong password policies.
- Category
- System Health (SEC = Security Event)
- Severity
- Warning
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0607
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The network boot password violation was corrected.
- Detailed Description
- No detailed description available.
- Recommended Response Action
- No response action is required.
- Category
- System Health (SEC = Security Event)
- Severity
- Informational
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0608
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- A password violation detected.
- Detailed Description
- This may apply to a physical or remote access attempt.
- Recommended Response Action
- Check system logs for intrusion attempts, and ensure strong password policies.
- Category
- System Health (SEC = Security Event)
- Severity
- Warning
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0609
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- A password violation was corrected.
- Detailed Description
- No detailed description available.
- Recommended Response Action
- No response action is required.
- Category
- System Health (SEC = Security Event)
- Severity
- Informational
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0610
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- An Out-of-band password violation detected.
- Detailed Description
- This may apply to a remote access attempt.
- Recommended Response Action
- Check system logs for intrusion attempts, and ensure strong password policies.
- Category
- System Health (SEC = Security Event)
- Severity
- Warning
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0611
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- An Out-of-band password violation was corrected.
- Detailed Description
- No detailed description available.
- Recommended Response Action
- No response action is required.
- Category
- System Health (SEC = Security Event)
- Severity
- Informational
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0612
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The default username and password is currently in use. It is recommended to immediately change the default credentials.
- Detailed Description
- The default username and password is currently in use and unauthorized access to the iDRAC may occur because the default values are widely known. This is a severe security risk.
- Recommended Response Action
- To change the credentials using RACADM command, run the following at the command line interface (CLI): "racadm set iDRAC.Users.<index>.Password <new password string>". Alternately, to disable the default credential in use message, run "racadm config -g cfgractuning -o cfgRacTuneDefCredentialWarningEnable 0".
- Category
- System Health (SEC = Security Event)
- Severity
- Warning
- Trap/EventID
- 2386
- Redfish Event Type
- Alert
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, SNMP Alert, Email Alert, Remote System Log, WS Eventing, Redfish Eventing*, LC Log*, OS Log
- Applicable Event or Alert Types
- CMC—Filter Visibility, SNMP Alert*, Email Alert*, LC Log*, Chassis Event Proxy*
SEC0613
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The default username and password is changed.
- Detailed Description
- The default username and password is changed.
- Recommended Response Action
- No response action is required.
- Category
- System Health (SEC = Security Event)
- Severity
- Informational
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0614
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- A System Chassis Intrusion event is detected. Powering off the host device.
- Detailed Description
- A System Chassis Intrusion event is detected. Powering off the host device.
- Recommended Response Action
- 1) Close the chassis cover. 2) Verify the log data by running one of the following commands: a) RACADM: racadm getsel. b) Redfish: /redfish/v1/Managers/LocaliDRAC/LogServices/Sel/Entries.
- Category
- System Health (SEC = Security Event)
- Severity
- Critical
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0700
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- Warning: Default username and password are currently in use. It is strongly recommended to change the default password before configuring the property. Else, it causes a severe security risk for iDRAC.
- Detailed Description
- If the property name is configured without changing the default password, iDRAC may be accessible on the Internet. This causes a severe security risk for iDRAC.
- Recommended Response Action
- To change the password, run the following racadm command: racadm set iDRAC.Users.<index>.Password <new password string>. Alternatively, to avoid this warning message, run the following racadm command: racadm set iDRAC.Tuning.DefaultCredentialWarning Disable.
- Category
- Configuration (SEC = Security Event)
- Severity
- Warning
- Trap/EventID
- 10578
- Redfish Event Type
- Alert
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, SNMP Alert, Email Alert, Remote System Log, WS Eventing, Redfish Eventing*, LC Log*, OS Log
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0701
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- Warning: Default username and password are currently in use. It is strongly recommended to change the default password immediately.
- Detailed Description
- This warning message is displayed when using the default username and password (root and calvin). Using the default password causes a severe security risk for iDRAC.
- Recommended Response Action
- To change the password, run the following racadm commands: racadm set iDRAC.Users.<index>.Password <new password string>. Alternatively, to avoid this warning message run the following racadm command: racadm set iDRAC.Tuning.DefaultCredentialWarning Disable.
- Category
- Configuration (SEC = Security Event)
- Severity
- Warning
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0702
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The Federal Information Processing Standards (FIPS) mode is enabled.
- Detailed Description
- The Federal Information Processing Standards (FIPS) mode is enabled.
- Recommended Response Action
- No response action is required.
- Category
- Configuration (SEC = Security Event)
- Severity
- Informational
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0703
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The Federal Information Processing Standards (FIPS) mode is disabled.
- Detailed Description
- The Federal Information Processing Standards (FIPS) mode is disabled.
- Recommended Response Action
- No response action is required.
- Category
- Configuration (SEC = Security Event)
- Severity
- Informational
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0704
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The authentication check operation performed by iSM has failed for the following module or application because either the binary load path is incorrect or the binary or configuration file is tampered, replaced, or untrusted : arg1.
- Arguments
- arg1 = list of app and modules
- Detailed Description
- The authentication check operation performed by iSM has failed for the following module or application because either the binary load path is incorrect or the binary or configuration file is tampered, replaced, or untrusted : < list of application and modules>.
- Recommended Response Action
- Reinstall the iDRAC Service Module (iSM) and retry the operation. For information about installing iSM, see the iSM Installation Guide available on the support site.
- Category
- System Health (SEC = Security Event)
- Severity
- Critical
- Redfish Event Type
- Alert
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, WS Eventing, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
SEC0705
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- Unable to complete the operation because the default password is still in use and must be changed.
- Detailed Description
- The operation cannot be completed because the default password for the default user is still in use on the CMC.
- Recommended Response Action
- Update the default password of the default user by using one of the Chassis Management Controller (CMC) interfaces. For more information about updating default password on CMC, refer CMC RACADM User Guide or CMC WSMAN User Guide or CMC GUI User Guide available on the support site.
- Category
- Configuration (SEC = Security Event)
- Severity
- Critical
- Redfish Event Type
- Not Applicable
- Applicable Event or Alert Types
- No alerts are applicable for this message
SEC0706
NOTE: Event or Alert types that are enabled by default are identified using an asterisk (*) symbol in the
Applicable Event or Alert Types section.
- Message
- The user arg1, changed the IPBlocking range with address arg2 and subnet mask arg3.
- Arguments
- arg1 = username
- arg2 = IPaddressRange
- arg3 = SubnetMaskRange
- Detailed Description
- The IPBlocking configuration settings are changed by the user identified in the message.
- Recommended Response Action
- No response action is required.
- Category
- Configuration (SEC = Security Event)
- Severity
- Informational
- Redfish Event Type
- Alert
- Applicable Event or Alert Types
- iDRAC—Filter Visibility, Remote System Log, WS Eventing, Redfish Eventing*, LC Log*
- Applicable Event or Alert Types
- CMC—Not Applicable
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\