1285 Topic(s)
You must convert any CRT or CER files to PEM. EcoStruxure BMS only supports PEM format.
An audit trail tracks all actions of a user that has logged on to the system. For example, you can view when a user logged on or off WorkStation, what commands the user made, and if the user changed or removed an object. Not all user actions are logged. For example, the system does not log user interface navigation and workspace switching.
Use the System security settings tab to increase the security.
Use the Policies tab to edit the policies for the domain. For example, the number of failed logon attempts a user can make before the account is temporarily locked.
You configure the password policy to increase the password security on your system.
You can increase the password security by configuring a password policy that defines how passwords must be created by the users.
You disable MD5 hash when you want the EcoStruxure BMS servers to use only strong algorithms for encryption.
To increase the security, you redirect HTTP communication to HTTPS when users access an EcoStruxure BMS server using WebStation.
You disable incoming HTTP communication to increase the data security of your system.
To increase the security of your data, you can disable incoming HTTP communication and MD5 encryption.