7EN02-0390-03

Setting up cybersecurity event logs and alarms

The event log can be used to monitor user logins and user account lockouts. The record limit for the event log is 5,000 by default. When the limit is reached, new records overwrite older ones.

To be notified when the Event Log record limit is approaching, see “Assigning a designated reader for event log notification”.

To extend record retention, offload information to syslog or a protected storage or retention location, see “Configuring Syslog network settings using ION Setup”.

Required for this procedure:

  • Meter connection using ION Setup.

  • Login credentials.

  1. Open ION Setup > select the meter > Setup Assistant.
  2. Security > Security Mode > Edit. The Open Security Configuration file dialog box opens.
  3. Select the Security Configuration File (.scf) that contains the current meter settings and click Open. The Standard Options or Advanced Options dialog box opens.
    NOTE: Open the security log file to determine the .scf file you want. See “Cybersecurity configuration” for more information.
  4. Click Next to navigate to the Select protocol lockout options screen:
  5. Click Events. The Event Priorities dialog box opens:
  6. Leave default values or enter values for each event priority according to your reporting requirements:
    Priority Description Value range

    None

    Not recorded in the event log.

    0

    Info Only

    Recorded in the event log. Event log cut-off range. Will not appear in Event Log reports or syslog records.

    1 to 5

    Recorded in the event log.

    6 to 63

    Low

    Recorded in the event log. Produces alarm low alarm.

    64 to 127

    Medium

    Recorded in the event log. Produces medium alarm.

    128 to 191

    High

    Recorded in the event log. Produces alarm low alarm. Recorded in syslog records.

    192 to 255

  7. Click OK.
  8. Click Next.
  9. Click Finish. A Confirmation message box opens.
  10. Click Yes. The Save As dialog box opens.
  11. Save the Security Configuration File (.scf) with a unique file name to avoid overwriting default Security Configuration files.
  12. Click Exit. The Device Configuration Checklist message box opens.
  13. Click Exit.
You can also change event priorities for cybersecurity events using ION Setup Advanced Mode. Refer to the ION Reference document atwww.schneider-electric.com for information about working with modules.
QR code for this page

Was this helpful?