Reference Guide
Table Of Contents
- Dell EMC iDRAC Service Module Security Configuration Guide
- Contents
- Overview
- Security quick reference
- Product and subsystem security
- Miscellaneous configuration and management elements
- Internal security information
- Resources and support
- Contacting Dell EMC
SEC0704 The authentication check operation that is done by iSM has failed for the following module or application
because either the binary load path is incorrect or the binary configuration file is tampered with, replaced,
or untrusted <list of app and modules>.
Log management
iSM supports specific warning logging for SupportAssist functionality. The logs can be enabled runtime using the following
utility. The logs rotate after 1 MB of logs are filled.
● For Linux and VMware ESXi operating systems:
/opt/dell/srvadmin/iSM/bin/dchosmicli
● For Microsoft Windows operating systems:
<iSM Install Path>\shared\bin\dchosmicli.exe
Log protection
iSM uses the platform and operating system-provided interfaces for logging audit messages. There is no explicit handling of log
message with encryption.
Logging format
The following format is used to log the iSM relevant messages into the operating system logs:
● <DateTime> <hostname> <processname>[PID]: <iSM MessageID> EventID="<eventID>"
EventCategory="Audit" EventSeverity="<severity>"
● IsPastEvent="<True/False>" language="en-US" <Message Description>
● <DateTime> format: <mmm> <dd> <hh:mm:ss>
● The operating system logs can be filtered using the process name of iSM, which is "dsm_ism_srvmgrd"
Alerting
Not applicable.
Physical security
Not applicable.
Physical interfaces
iSM needs network connectivity to use the SupportAssist-on-the-Box feature that can connect to the Dell EMC support
site. iSM uses the operating system to BMC pass through in USBNIC mode for communication with iDRAC. This is a wired
connection embedded on the motherboard. This device is emulated as a network interface on the operating system. This uses
link local IPv4 or IPv6 addresses and is therefore not routable.
18
Product and subsystem security