Administrator Guide

Technical support and resources
ID 483
3.5.4 iDRAC Connection View with Geolocation ....................................................................................................... 20
3.6 Supply Chain Integrity and Security ................................................................................................................. 21
3.6.1 Hardware and Software Integrity ...................................................................................................................... 21
3.6.2 Physical Security .............................................................................................................................................. 21
3.6.3 Dell Technologies Secured Component Verification (SCV) for PowerEdge .................................................... 22
4 Detect ......................................................................................................................................................................... 23
4.1 Comprehensive Monitoring using iDRAC ......................................................................................................... 23
4.1.1 Lifecycle Log ..................................................................................................................................................... 23
4.1.2 Alerts ................................................................................................................................................................. 24
4.2 Drift Detection ................................................................................................................................................... 25
5 Recover ...................................................................................................................................................................... 26
5.1 Rapid Response to New Vulnerabilities ........................................................................................................... 26
5.2 BIOS and operating system Recovery ............................................................................................................. 26
5.3 Firmware Rollback ............................................................................................................................................ 27
5.4 Restoring Server Configuration after Hardware Servicing ............................................................................... 27
5.4.1 Parts Replacement ........................................................................................................................................... 28
5.4.2 Easy Restore (for System Board Replacement) .............................................................................................. 28
5.5 System Erase ................................................................................................................................................... 29
5.6 iDRAC9 Cipher Suite ........................................................................................................................................ 30
5.7 Commercial National Security Algorithm (CNSA) Support ............................................................................... 30
5.8 Full Power Cycle ............................................................................................................................................... 30
6 Conclusion .................................................................................................................................................................. 31
A Technical support and resources ............................................................................................................................... 32