Collecting logs from iDRAC, iLO, etc. would enable us to monitor authentication and access, as well as hardware failures, physical intrusion alarms, and other controls.
P
Patrick McGowan
Had a partner of mine ask about this today. These logs are in syslog format.