Inspur NF5280M5 Security Configuration Manual page 7

M5 platform
Hide thumbs Also See for NF5280M5:
Table of Contents

Advertisement

Inspur server security configuration Guide
configuration.
2. Firmware security configuration
It is mainly about the security configuration and use of BIOS and BMC,
which are the bottom firmware and start before the server system. Only
BIOS and BMC are secure enough can the security of the server system be
guaranteed fundamentally.
3. System security configuration
It mainly includes server data backup and server software configuration.
These are also critical to server security.
Before you perform any operation on the server, make sure that you have
read all the operation instructions of the device, especially the instructions
such as danger, warning and attention that may endanger personal and
device safety, so as to minimize the probability of accidents.
It is strongly recommended that you make basic security configuration
for server to avoid most security problems.
Note: The recommended configuration in this document is not applicable
to all Inspur server product models. Please refer to the user manual of the
corresponding product model for details.
7 / 42

Advertisement

Table of Contents
loading

This manual is also suitable for:

Nf8480m5M5

Table of Contents