Users Guide

Table Of Contents
Disable security.............................................................................................................................................................51
Change security settings........................................................................................................................................... 52
Restore factory default settings..............................................................................................................................52
Auto configure behavior............................................................................................................................................ 52
Manage controller profile.......................................................................................................................................... 52
Advanced controller properties................................................................................................................................53
Virtual disk management................................................................................................................................................. 56
Virtual disk numbering................................................................................................................................................56
Configure Virtual Disks...............................................................................................................................................58
Perform expand virtual disk operation................................................................................................................... 58
Perform consistency check...................................................................................................................................... 58
Physical disk management.............................................................................................................................................. 59
View physical disk properties................................................................................................................................... 59
Cryptographic erase................................................................................................................................................... 60
Physical disk erase...................................................................................................................................................... 60
Assigning a global hot spare...................................................................................................................................... 61
Assigning a dedicated hot spare...............................................................................................................................61
Convert to NonRAID disk........................................................................................................................................62
Hardware components.....................................................................................................................................................62
View battery properties............................................................................................................................................. 62
View physical disks associated with an enclosure...............................................................................................63
Security key management in HII configuration utility............................................................................................... 63
Chapter 8: Security key and RAID management........................................................................... 64
Security key implementation.......................................................................................................................................... 64
Local Key Management................................................................................................................................................... 64
Create a security key........................................................................................................................................................64
Change Security Settings............................................................................................................................................... 65
Disable security key.......................................................................................................................................................... 65
Create a secured virtual disk..........................................................................................................................................66
Secure a non-RAID disk................................................................................................................................................... 66
Secure a pre-existing virtual disk.................................................................................................................................. 66
Import a secured non-RAID disk....................................................................................................................................66
Import a secured virtual disk.......................................................................................................................................... 67
Dell Technologies OpenManage Secure Enterprise Key Manager........................................................................ 67
Supported controllers for OpenManage Secure Enterprise Key Manager.................................................... 67
Manage enterprise key manager mode.................................................................................................................. 68
Disable enterprise key manager mode....................................................................................................................68
Manage virtual disks in enterprise key manager mode...................................................................................... 68
Manage nonRAID disks in enterprise key manager mode............................................................................... 68
Migration of drives from local key management to enterprise key management........................................68
Chapter 9: Troubleshooting.........................................................................................................69
Single virtual disk performance or latency in hypervisor configurations............................................................. 69
Configured disks removed or not accessible error message.................................................................................. 69
Dirty cache data error message.....................................................................................................................................70
Discovery error message................................................................................................................................................. 70
Drive Configuration Changes Error Message............................................................................................................. 70
Windows operating system installation errors ........................................................................................................... 71
Contents
5