StruxureWare Data Center Operation is a client/server configuration. The server can be configured to run in cluster mode with multiple nodes including data recovery node. The client runs on standard PC. You can find system requirements here.

Default user account for client

When setting up a server, a default apc user account is created for logging on to the client. The default credentials should be changed. See Managing DCO users and user rights.

Firewall 

It is recommended that the firewall is enabled. The firewall will reduce the number of open ports to the required minimum. It will also protect internal services, such as the database, against external attacks. The firewall will allow all outgoing traffic and incoming traffic according to these details.

Software vulnerability, scans and certifications

Read the Schneider Electric Vulnerability Management Policy here and see relevant security vulnerability information related to DCO here.

3 different software scanning tools are run against  StruxureWare Data Center Operation

Antivirus

StruxureWare Data Center Operation does not include antivirus in the installation. From a functionality point of view, it is fine to install an antivirus program on the server. We do have experience that antivirus will affect client performance and that performance loss depending on configuration can potential lead to errors, e.g. in a cluster environment.

Logging

The DCO product has several log files capturing kernel, cron job, etc. based on standard Linux capabilities. Furthermore, DCO logs all user account changes, logins and logouts to the Audit Trail log (available with change module license). The logs do not contain confidential information but might include some of the data entered when building the model. 

Server log files are stored on the server and are accessible to system administrators via the server configuration interface, Webmin (StruxureWare DC Operation>Download Log Files).

Client log files are stored in the user folder, e.g. Windows 7: C:\Users\[Username]\.isxo\[Version]\Operations\application.log or Mac: ~/.isxo.

Asset Management Records: Asset additions, changes, moves, and removals are tracked and can be found in Audit Trail report in the Reports section. 

User Account Records: User additions, changes, and removals can be configured in User Rights and Authentication. These are tracked and can be found in the Audit Trail report in the Analytics->Reports section.

Database architecture

Currently the database and server make up one unit and cannot be separated. The database and operating system are running on the same partition on the server by default. The database technology is postgreSQL and cannot be exchanged with any other database type or technology. The database is protected using RSA 2048 bits certificate password encryption.  

Running in a cluster will also make the database run in a cluster. It is furthermore possible to have disaster recovery (DR) node in your cluster environment. You can find more information here.

ETL is open to other database types and technologies. You can find more information about ETL here.

Skip to end of metadata
Go to start of metadata
RELATED COMMUNITY QUESTIONS
WAS THIS ARTICLE HELPFUL?