Collecting logs from iDRAC, iLO, etc. would enable us to monitor authentication and access, as well as hardware failures, physical intrusion alarms, and other controls.