User And Remote Interface Security Measures - Keysight X-Series Security Features And Document Of Volatility

Pxe emi receiver uxa signal analyzer pxa signal analyzer mxa signal analyzer exa signal analyzer cxa signal analyzer nfa noise figure analyzer
Hide thumbs Also See for X-Series:
Table of Contents

Advertisement

8

User and Remote Interface Security Measures

This chapter discusses options that are available to you to control and
configure user and remote access to the instrument, including:
IMPORTANT
Users are responsible for providing security for the I/O ports for remote
access, by controlling physical access to the I/O ports. The I/O ports must be
controlled because they provide access to most user settings, user states,
and the display memory.
SCPI/GPIB Control of Interfaces
The GPIB command LLO (local lockout) can be sent by the controller to disable
operation of the instrument's front-panel keys and softkey menus.
However, sending the LLO command does not disable access to the instrument
via its USB ports. For details of how to restrict the operation of the USB ports,
see
Operating System Security Features
The instrument's Windows operating system includes a variety of features that
you can invoke or modify to enhance system security. These include the
following:
— The ability to create custom user accounts, and assign different security
SCPI/GPIB Control of Interfaces
Operating System Security Features
USB
Interfaces. This topic includes information about how to set the
instrument's USB ports to read-only.
SD Memory Card
"Configuring USB for Read-only" on page 33
levels to each account by adding it to an existing group. The group types
predefined by Windows are: Administrator, Power User, User, Backup
Operator, and Guest, but you can also define new group types.
Security Features and Document of Volatility
User and Remote Interface Security Measures
below.
32

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents