Secure Operation
NOTICE |
---|
POTENTIAL COMPROMISE OF SYSTEM AVAILABILITY, INTEGRITY,
AND CONFIDENTIALITY
Use cybersecurity best practices and follow recommended
operation guidelines while using the application.
Failure to follow these instructions can result in
unintended data loss or loss of application function.
|
Recommended Operation Guidelines
It is recommended to close EcoStruxure Power Commission application before switching the user account or logging out of user account.
Do not install untrusted extensions in web browser. Follow your organizations IT policy for the safe use of web browsers.
Periodically review application event logs.
Disable unused Universal Serial Bus (USB) ports.
Network Monitoring
When using a firewall:
-
Periodically monitor the firewall to ensure the configuration has not been changed, and that the firewall status does not indicate communication has occurred on unexpected ports.
-
Only open those ports that are necessary for network communication.
-
When using network switches: Periodically monitor the switch to ensure the configuration has not been changed, and that the switch status does not indicate communication has occurred on unexpected ports.
Monitoring PC
Back up the project file regularly and store it in a secure, separate, non-shared location.
Install operating system patches and anti-virus software updates on the PC, as they are released.
Periodically monitor the Windows accounts available on the PC to ensure that only the necessary personnel can log on to the PC, with the appropriate level of access. Remove inactive or unnecessary user accounts.
Review the windows system events log to monitor logon and logoff activity on all the PCs, and to detect attempted unauthorized activity.
Periodically review user accounts and their roles and privileges to ensure compliance with your organization’s policy.