Schneider, APC support forum to share knowledge about installation and configuration for Data Center and Business Power UPSs, Accessories, Software, Services.
Send a co-worker an invite to the portal.Just enter their email address and we'll connect them to register. After joining, they will belong to the same company.
You have entered an invalid email address. Please re-enter the email address.
This co-worker has already been invited to the Exchange portal. Please invite another co-worker.
Please enter email address
Send InviteCancel
Invitation Sent
Your invitation was sent.Thanks for sharing Exchange with your co-worker.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-07-0812:33 AM. Last Modified: 2024-02-2911:12 PM
How secure is the web based Powerchute agent?
I have a question, if anyone can shed a little light on this: I am able to access the agent from another computer on my network if I enter the (ip address?) in the url box in the broswer. That other computer does not have any of the Powerchute Business Edition installed. The question is, can anyone who knows the ip address (what is in the url box), username and password get into my agent and start tweaking settings or can this only be done within my network?
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-07-0812:33 AM. Last Modified: 2024-02-2911:12 PM
Hi,
Anyone who has access to your network, knows the system IP, the user name and password assigned to the PowerChute Agent can make changes. The user name and password should only be provided to trusted staff members and the network should be protected from outside intruders.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-07-0812:33 AM. Last Modified: 2024-02-2911:12 PM
Hi,
Anyone who has access to your network, knows the system IP, the user name and password assigned to the PowerChute Agent can make changes. The user name and password should only be provided to trusted staff members and the network should be protected from outside intruders.