• Configure the remote console to automatically lock the server OS console.
To configure this option, configure the
Remote Console Computer Lock setting on the Remote Console & Media
page
Security tab.
• Configure a higher security state on the
Encryption Settings page.
• Configure iLO to require login credentials when users access the iLO 5 Configuration Utility in the UEFI System
Utilities.
You can perform this task on the
Access Settings page.
• Configure iLO to log authentication failures.
You can perform this task on the
Access Settings page.
• Enable firmware verification scans.
You can perform this task on the
Firmware Verification page.
• Use the
Security Dashboard page to monitor security risks and recommendations.
Top 10 security settings for HPE iLO 5 and Recommended Security Settings in HPE
Learn more about security settings for iLO 5
HPE developed a video to help teach you about security settings in iLO 5. To see the video, click one of the following links:
•
•
Read more about security in the HPE Gen10 Security Reference Guide at
http://www.hpe.com/support/gen10-
Password guidelines
Hewlett Packard Enterprise recommends that you follow these password guidelines when you create and update user
accounts.
• When working with passwords:
◦
Do not write down or record passwords.
◦
Do not share passwords with others.
◦
Do not use passwords that are made up of words found in a dictionary.
◦
Do not use passwords that contain obvious words, such as the company name, product name, user name, or login
name.
◦
Change passwords regularly.
◦
Keep the iLO default credentials in a safe place.
• Use strong passwords with at least three of the following characteristics:
◦
At least one uppercase ASCII character
◦
At least one lowercase ASCII character
Set up HPE iLO on the HPE ProLiant e910t Server Blade
19