About the Document
Document Scope
This operations manual describes operation and maintenance of the PowerLogic ADVC Controller. It is exclusively intended for use by the manufacturer's staff or by persons certified for the PowerLogic ADVC Controller (training certificate).
Read these instructions carefully and look at the equipment to become familiar with the device before trying to install, operate, service or maintain it.
This guide is an integral part of the product and must be stored so that it is readily accessible at all times and can be used by persons who are going to work on the controller. If the controller is relocated to another site, this guide must be passed on to the new operators along with the unit.
As our products are subject to continuous development; we reserve the right to make changes regarding the standards, illustrations and technical data described in this guide.
This guide does not describe every imaginable individual case or every customer-specific version of the product. For more information that is not included in this guide, contact Schneider Electric.
All dimensions not specified in detail are in millimeters.
Validity Note
This document is valid for PowerLogic ADVC Controller.
The characteristics of the products described in this document are intended to match the characteristics that are available on www.se.com. As part of our corporate strategy for constant improvement, we may revise the content over time to enhance clarity and accuracy. If you see a difference between the characteristics in this document and the characteristics on www.se.com, consider www.se.com to contain the latest information.
Intended Use
PowerLogic ADVC Controller are designed exclusively for switching and distributing electrical power. They may only be used in the scope of the specified standards and the controller-specific technical data.
General Cybersecurity Information
In recent years, the growing number of networked machines and production plants has seen a corresponding increase in the potential for cyber threats, such as unauthorized access, data breaches, and operational disruptions. You must, therefore, consider all possible cybersecurity measures to help protect assets and systems against such threats.
To help keep your Schneider Electric products secure and protected, it is in your best interest to implement the cybersecurity best practices as described in the Cybersecurity Best Practices document.
Schneider Electric provides additional information and assistance:
-
Subscribe to the Schneider Electric security newsletter.
-
Visit the Cybersecurity Support Portal web page to:
-
Find Security Notifications.
-
Report vulnerabilities and incidents.
-
-
Visit the Schneider Electric Cybersecurity and Data Protection Posture web page to:
-
Access the cybersecurity posture.
-
Learn more about cybersecurity in the cybersecurity academy.
-
Explore the cybersecurity services from Schneider Electric.
-
Information on Non-Inclusive or Insensitive Terminology
As a responsible, inclusive company, Schneider Electric is constantly updating its communications and products that contain non-inclusive or insensitive terminology. However, despite these efforts, our content may still contain terms that are deemed inappropriate by some customers.
Queries
For any questions, suggestions, or need of further information about this guide, contact Schneider Electric. For additional details, visit our website www.se.com.
We always strive to provide you with the best-possible information for optimum, safe use of our products. Contact Schneider if you have any recommendations, amendments, or proposals for improvement.