Help
  • Explore Community
  • Get Started
  • Ask the Community
  • How-To & Best Practices
  • Contact Support
Notifications
Login / Register
Community
Community
Notifications
close
  • Forums
  • Knowledge Center
  • Events & Webinars
  • Ideas
  • Blogs
Help
Help
  • Explore Community
  • Get Started
  • Ask the Community
  • How-To & Best Practices
  • Contact Support
Login / Register
Sustainability
Sustainability

Join our "Ask Me About" community webinar on May 20th at 9 AM CET and 5 PM CET to explore cybersecurity and monitoring for Data Center and edge IT. Learn about market trends, cutting-edge technologies, and best practices from industry experts.
Register and secure your Critical IT infrastructure

Geo SCADA Expert Security

Geo SCADA Knowledge Base

Access vast amounts of technical know-how and pro tips from our community of Geo SCADA experts.

cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Show  only  | Search instead for 
Did you mean: 
  • Home
  • Schneider Electric Community
  • Knowledge Center
  • Geo SCADA Knowledge Base
  • Geo SCADA Expert Security
Invite a Co-worker
Send a co-worker an invite to the portal.Just enter their email address and we'll connect them to register. After joining, they will belong to the same company.
You have entered an invalid email address. Please re-enter the email address.
This co-worker has already been invited to the Exchange portal. Please invite another co-worker.
Please enter email address
Send Invite Cancel
Invitation Sent
Your invitation was sent.Thanks for sharing Exchange with your co-worker.
Send New Invite Close
Top Labels
Top Labels
  • Alphabetical
  • database 32
  • Web Server and Client 31
  • WebX 19
  • Request Form 18
  • Lists, Events & Alarms 16
  • ViewX 15
  • Application Programming 12
  • Setup 12
  • Telemetry 8
  • Events & Alarms 7
  • Lists 7
  • Mimic Graphics 7
  • Downloads 6
  • Support 5
  • IoT 5
  • SCADA 5
  • Geo SCADA Expert 5
  • Drivers and Communications 4
  • Security 4
  • DNP 3 3
  • IEC 61131-3 Logic 3
  • Trends and Historian 2
  • Virtual ViewX 2
  • Geo Scada 1
  • ClearSCADA 1
  • Templates and Instances 1
  • Releases 1
  • Maps and GIS 1
  • Mobile 1
  • Architectures 1
  • Tools & Resources 1
  • Privacy Policy 1
  • OPC-UA 1
  • Previous
  • 1 of 4
  • Next
Latest Blog Posts
  • OPC UA - Driver and Server
  • Requirements for Generating a Valid OPC UA Server Certificate
  • Load Events Using LoadRecord and LoadRecords
  • Geo SCADA Embedded Component Licenses
  • Geo SCADA 2023 Known Issues
Related Products
product field
Schneider Electric
EcoStruxure™ Geo SCADA Expert

Invite a Colleague

Found this content useful? Share it with a Colleague!

Invite a Colleague Invite
Anonymous user
Not applicable
‎2021-06-09 07:17 PM
0 Likes
0
2167
  • Bookmark
  • Subscribe
  • Email to a Friend
  • Printer Friendly Page
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

‎2021-06-09 07:17 PM

Geo SCADA Expert Security

Originally published on Geo SCADA Knowledge Base by Anonymous user | June 10, 2021 04:17 AM

📖 Home  

Security is vital for SCADA systems and associated infrastructure.

 

Recommendations for Good Practice

Whether on-premises or in-cloud, you need to secure Geo SCADA Expert implementations using current and best practice guidelines for security.

  • The Technical Guides section of this Knowledgebase contains various documents and links
  • A Schneider Electric Security Hardening Guide for Geo SCADA Expert
  • The Schneider Electric document Recommended Cybersecurity Best Practices, which covers the use of all Schneider Electric products

We recommend a whole-system approach to cybersecurity. This includes the setup of infrastructure for networking, remote access, anti-virus, firewalls, Windows, Azure, and Internet Information Server (IIS), as well as the Schneider Electric and AVEVA products such as Geo SCADA Expert.

 

You should secure any remote access for administration, engineering and operations (such as Windows Remote Desktop, Geo SCADA Expert Virtual ViewX, Geo SCADA Expert Mobile, Reporting) using technologies such as a VPN, TOTP and Bastion host access.

 

Best practice guides for securing Windows, Azure and IIS are available from Microsoft. We suggest that you start with: https://docs.microsoft.com/en-us/security/compass/compass

 

We also recommend that you install the latest versions of all software that you require, including the security patches. Schneider Electric has made the process of upgrading Geo SCADA Expert a simple activity. The latest version of Geo SCADA Expert includes the most recent security fixes and features and is available at this page. New releases of supported versions are produced approximately monthly. If you have a valid support contract, then you can upgrade to a new release with new features. If you do not have a valid support contract, then you can only upgrade to a new monthly release of the same version.

 

Consult the Schneider Electric Security Notifications web page for the latest notifications of vulnerabilities for all Schneider Electric products including Geo SCADA Expert. The documents provide mitigations and software upgrade information.

 

Security Warnings

Windows Updates

 

⚠️ CAUTION
DO NOT SET LIVE SYSTEMS TO AUTO-UPDATE AS THIS CAN RESULT IN A LOSS OF SERVICE AT UNEXPECTED TIMES
System Administrators should first check whether Geo SCADA Expert is compatible with operating system updates at this page on the Knowledgebase:
https://community.se.com/t5/Geo-SCADA-Knowledge-Base/Microsoft-Update-Testing/ba-p/279120
If compatible then upgrades can be actioned, otherwise wait for a new release of Geo SCADA Expert.
Failure to follow these instructions can result in equipment damage and injury.

Files

⚠️ CAUTION
CHECK ALL FILES FOR INTEGRITY BEFORE COPYING THEM TO THE SERVER AS THEY MAY CONTAIN MALWARE
Check the checksum/hash of installation kits before transferring them to the production system. You can verify Geo SCADA Expert downloads against the hash codes in the following index: https://community.se.com/t5/Geo-SCADA-Knowledge-Base/File-Hashes/ba-p/278415
Failure to follow these instructions can result in death or serious injury.

Isolation

⚠️ CAUTION
KEEP THE PRODUCTION SYSTEM ISOLATED FROM TEST AND DEVELOPMENT COMPUTERS WHICH ARE MORE SUSCEPTIBLE TO MALWARE
It is good practice to test upgrades of operating systems and software on a separate server, isolated from the production system.
Failure to follow these instructions can result in death or serious injury.

 

Support Links

Get support by country: https://www.se.com/ww/en/work/support/country-selector/contact-us.jsp
Report a vulnerability: https://www.se.com/ww/en/work/support/cybersecurity/report-a-vulnerability.jsp

 

Security Features

Geo SCADA Expert provides security features designed to:

 

  • Encrypt and authorize communications with servers and clients using certificates
  • Restrict user access to items and features so that users only make use of those features for which they have been suitably trained
  • Allocate security permissions quickly and with minimal effort.

 

Setting Up Geo SCADA

Please refer to the Security Hardening Guide in the Technical Guides page. This document takes you through the hardening steps for the Operating System and many aspects of Geo SCADA. Also refer to the Virtual ViewX page.

 

Setting Up Security Certificates

The guide and associated scripts attached below to this page are intended to help you set up certificates with a Geo SCADA system. This configuration will help servers to connect to each other with assurance of identity, and clients to connect to servers with that assurance too.

 

See below for the attachments.

 

Users and User Groups

You can allocate permissions to each User account and User Group. Every item in the database can have its own set of permissions, or can be set to inherit the permissions that have been set for a parent Group or a Group Instance. The default setting for every new database item is for that item to inherit the security permissions of its parent Group (the Group that contains the item, which is the System group if the item is not within a Group folder).

The permissions determine whether a user can access the features for an item, including configuration features, alarms, and controls. By allocating different permissions to different users and User Groups, you can restrict system activities. For example, you can restrict the configuration of security settings so that only users with system administration knowledge or training can access the Security window.

The permissions that you allocate on the Security window for a database item define which of the item's features are available to the defined users and User Groups.

 

Please refer to the F1 Help pages and also the links below for details.
Home

More Links:

Security Hardening in Technical Guides

Microsoft Update Testing

Unknown Error When Changing a User's Password
Geo SCADA Service User Account
User Logon Events after Server Restart
Differences Between English Locales
Defining Security Permissions
Why Home Pages may not Display When User Logs On
Configuring User Displays to Format Time Appropriately
Integrating Users with Windows Security
Releasing Exclusive Control
Disabling the SSL server Null cipher

CertGenerator.zip

Author

Biography

Anonymous user

Link copied. Please paste this link to share this article on your social media post.

  • Back to Blog
  • Newer Article
  • Older Article
To The Top!

Forums

  • APC UPS Data Center Backup Solutions
  • EcoStruxure IT
  • EcoStruxure Geo SCADA Expert
  • Metering & Power Quality
  • Schneider Electric Wiser

Knowledge Center

Events & webinars

Ideas

Blogs

Get Started

  • Ask the Community
  • Community Guidelines
  • Community User Guide
  • How-To & Best Practice
  • Experts Leaderboard
  • Contact Support
Brand-Logo
Subscribing is a smart move!
You can subscribe to this board after you log in or create your free account.
Forum-Icon

Create your free account or log in to subscribe to the board - and gain access to more than 10,000+ support articles along with insights from experts and peers.

Register today for FREE

Register Now

Already have an account? Login

Terms & Conditions Privacy Notice Change your Cookie Settings © 2025 Schneider Electric

This is a heading

With achievable small steps, users progress and continually feel satisfaction in task accomplishment.

Usetiful Onboarding Checklist remembers the progress of every user, allowing them to take bite-sized journeys and continue where they left.

of