Users Guide

Table Of Contents
Secure erase drives Includes drives that provide cryptographic erase such as ISE and SED SAS and SATA drives, and PCIe
SSDs.
Overwrite erase drives Includes all drives that do not support cryptographic erase.
NOTE: System erase only applies to drives within the server. iDRAC is not able to erase drives in an external enclosure such
as a JBOD.
The RACADM SystemErase sub-command includes options for the following categories:
The SecureErasePD option cryptographically erases all the secure erase drives.
The OverwritePD option overwrites data on all drives.
NOTE: Cryptographic Erase of BOSS physical disk can be done by SystemErase method and it is supported from LC-UI,
Wsman, and Racadm
Before performing SystemErase, use the following command to check the erase capability of all physical disks for a server:
# racadm storage get pdisks o p SystemEraseCapability
NOTE: If SEKM is enabled on the server, then disable SEKM using the racadm sekm disable command before using
this command. This can avoid any storage devices being locked out which are secured by iDRAC, if SEKM settings are
erased from iDRAC by executing this command.
To erase ISE and SED drives, use this command:
# racadm systemerase secureerasepd
To erase overwrite erase drives, use the following command:
# racadm systemerase -overwritepd
NOTE: RACADM SystemErase removes all the virtual disks from the physical disks that are erased by the above commands.
NOTE: RACADM SystemErase causes the server to restart in order to perform the erase operations.
NOTE: Individual PCIe SSD or SED devices can be erased using the iDRAC GUI or RACADM. For more information, see the
Erasing PCIe SSD device data and the Erasing SED device data section.
For information on the System Erase function within the Lifecycle Controller GUI, see the Lifecycle Controller User's Guide
available at https://www.dell.com/idracmanuals .
Erasing SED/ISE device data
NOTE:
This operation is not supported when supported device is a part of a Virtual Disk. The target supported device must
be removed from the virtual disk prior to performing device erase.
Cryptographic Erase permanently erases all data present on the disk. Performing a Cryptographic Erase on an SED/ISE
overwrites all blocks and results in permanent loss of all data on the supported devices. During Cryptographic Erase, the host is
unable to access the supported device. SED/ISE device erase can be performed either in real time or be applied after a system
reboot.
If the system reboot or experiences a power loss during cryptographic erase, the operation is canceled. You must reboot the
system and restart the process.
Before erasing SED/ISE device data, ensure that:
Lifecycle Controller is enabled.
You have Server Control and Login privileges.
Selected supported drive is not part of a virtual disk.
NOTE:
Erasing SED/ISE can be performed either as a real time or as a staged operation.
After the drive is erased, it may still be displayed as active within the OS due to data caching. If this occurs, reboot the
OS and the erased drive will no longer be displayed or report any data.
Cryptographic erase feature is supported for SED/ISEs for PowerEdge servers.
Managing storage devices 237