Security: UEFI Secure Boot and Secure Start support
Immutable Silicon Root of Trust
FIPS 140-3 validation (iLO 6 certification in progress)
Common Criteria certification (iLO 6 certification in progress)
Configurable for PCI DSS compliance
Advanced Encryption Standard (AES) and Triple Data Encryption Standard (3DES) on browser
Support for Commercial National Security Algorithms (CNSA)
Tamper-free updates -- components digitally signed and verified
Secure Recovery -- recover critical firmware to known good state on detection of compromised firmware
Ability to rollback firmware
Secure erase of NAND
TPM (Trusted Platform Module) 2.0
Front bezel key-lock feature -- standard, available in both Tower and Rack models
Padlock slot, standard
Kensington Lock slot, standard
Security: Secure Boot and Secure Start enable for enhanced security
Embedded UEFI Shell
Operating system specific functionality
Mass Configuration Deployment Tool using iLO RESTful API that is Redfish API Conformant
Support for > 2.2 TB (using GPT) boot drives
PXE boot support for IPv6 networks
USB 3.0 Stack
Workload Profiles for simple performance optimization
Security: Secure Boot and Secure Start enable for enhanced security
Embedded UEFI Shell
Operating system specific functionality
Mass Configuration Deployment Tool using iLO RESTful API that is Redfish API Conformant
Support for > 2.2 TB (using GPT) boot drives
PXE boot support for IPv6 networks
USB 3.0 Stack
Workload Profiles for simple performance optimization
Security: UEFI Secure Boot and Secure Start support
Tamper-free updates - components digitally signed and verified
Immutable Silicon Root of Trust
Ability to rollback firmware
FIPS 140-2 validation
Secure erase of NAND/User data
Common Criteria certification
TPM (Trusted Platform Module) 1.2 option
Configurable for PCI DSS compliance
TPM (Trusted Platform Module) 2.0 option
Advanced Encryption Standard (AES) and Triple Data Encryption Standard (3DES) on browser
Bezel Locking Kit option
Support for Commercial National Security Algorithms (CNSA)
Chassis Intrusion detection option
Secure Recovery - recover critical firmware to known good state on detection of compromised firmware
Security: Cryptographically signed firmware
Data at Rest Encryption (SEDs with local or external key mgmt)
Secure Boot
Secure Erase
Secured Component Verification (Hardware integrity check)
Silicon Root of Trust
System Lockdown (requires iDRAC9 Enterprise or Datacenter)
TPM 2.0 FIPS, CC-TCG certified, TPM 2.0 China NationZ