Reference Guide
Table Of Contents
- Dell EMC iDRAC Service Module Security Configuration Guide
- Contents
- Overview
- Security quick reference
- Product and subsystem security
- Miscellaneous configuration and management elements
- Internal security information
- Resources and support
- Contacting Dell EMC
Overview
As part of an effort to improve its product lines, Dell EMC periodically releases revisions of its software and hardware.
Therefore, some functions described in this document might not be supported by all versions of the software or hardware
currently in use. The product release notes provide the most up-to-date information on product features.
Contact your Dell EMC technical support professional if a product does not function properly or does not function as described
in this document.
NOTE: This document was accurate at publication time. Go to Dell EMC Online Support (https://www.dell.com/support)
ensure that you are using the latest version of this document.
Purpose
This document describes the security configurations related to Dell EMC iDRAC Service Module (iSM), and its installation,
configuration, and functionality on the host operating system. The functionality might involve communication with other sub-
systems, which is out of scope for this document. The sub-systems within the host include:
● Integrated Dell Remote Access Controller (iDRAC)
● Dell EMC system firmware (BIOS)
● Operating system logging interface
● System chipset SATA controller
● NetSNMP configuration
● Microsoft Windows Registry
● Microsoft Windows certificate store
Sub-systems outside the host include the Dell EMC support server. The security posture of these subsystems is out of scope of
this document.
Audience
This document is intended for individuals who are responsible for managing security of Dell EMC iDRAC Service Module (iSM).
Legal disclaimers
THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS-IS." DELL MAKES NO REPRESENTATIONS OR WARRANTIES
OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. In no event shall Dell Technologies, its
affiliates or suppliers, be liable for any damages whatsoever arising from or related to the information contained herein or
actions that you decide to take based thereon, including any direct, indirect, incidental, consequential, loss of business profits or
special damages, even if Dell Technologies, its affiliates or suppliers have been advised of the possibility of such damages.
The Security Configuration Guide intends to be a reference. The guidance is provided based on a diverse set of installed systems
and may not represent the actual risk or guidance to your local installation and individual environment. Dell EMC recommends
that all users determine the applicability of this information to their individual environments and take appropriate actions. All
aspects of this Security Configuration Guide are subject to change without notice and on a case-by-case basis. Your use of the
information contained in this document or materials linked herein is at your own risk. Dell reserves the right to change or update
this document in its sole discretion and without notice at any time.
1
Overview 5