Configuring Oracle ILOM for Increased Security

All configurable properties in Oracle ILOM can be optionally disabled or enabled to make the Oracle ILOM management environment more secure. For further details about enhancing security in Oracle ILOM, refer to the security guidelines described in Oracle ILOM Security Guide For Firmware Release 5.1.x.

Monitoring Log Events for Unauthorized Actions

Periodically examine the Oracle ILOM Session log for unauthorized access, as described in Monitor Session Log Events to Find Unauthorized Access in Oracle ILOM Security Guide For Firmware Release 5.1.x.

Monitor for unauthorized changes by periodically examining the Oracle ILOM Audit log, as described in Monitor Audit Log Events to Find Unauthorized Changes in Oracle ILOM Security Guide For Firmware Release 5.1.x.

For details about the different Oracle ILOM logs, including filtering log entries, see Managing Oracle ILOM Log Entries in Oracle ILOM User's Guide for System Monitoring and Diagnostics Firmware Release 5.1.x.

To set a timeout interval for inactive sessions, see Configuring Oracle ILOM Interfaces for Increased Security in Oracle ILOM Security Guide For Firmware Release 5.1.x.