The Lenovo Flex System products
include features that can help you secure your environment. The following
sections provide basic information about how some of these features
work. You can use this information along with the documentation that
comes with your Flex System products
to help you evaluate and implement the security plan for your environment.
As you evaluate the security requirements of your environment,
be sure to consider that unsecured systems-management tools can damage
hardware and software. It is extremely important that you understand
all security risks in your system environment and what you can do
to minimize these risks.
Important: You are responsible
for the evaluation, selection, and implementation of security features,
administrative procedures, and appropriate controls for your system
environment. Implementing the security features that are described
in this section does not secure your environment completely.