Veris Industries E34 Series Installation Manual page 39

Multi-circuit meters
Table of Contents

Advertisement

E34 Series Installation Guide
Cybersecurity (cont.)
Z207251-0C
Page 39 of 42
Alta Labs, Enercept, Enspector, Hawkeye, Trustat, Aerospond, Veris, and the Veris 'V' logo are trademarks or registered trademarks of Veris Industries, L.L.C. in the USA and/or other countries.
Changing Passwords
NOTICE
LOSS OF ACCESS
• Record your device's user and password information in a secure
location.
Failure to follow these instructions can result in data loss
and loss of access to the device.
NOTICE
LOSS OF DATA OR PRODUCT CONFIGURATION
• Do not let unauthorized personnel gain physical access to the
device.
Failure to follow these instructions can result in data loss
and loss of access to the device.
After logging to the GUI for the first time, it is recommended to change the default factory-set password.
In the "Configuration Parameters" window, click the button labelled "Diagnostics & Debugging". The "Navigation" window
appears.
On the "Navigation" window, under the product gateway, click "Setup". Navigate to "User Management". Click the "Password"
tab.
Enter the new alphanumeric complex password in the "Password" and "Confirm Password" fields. Click "Confirm" to save the
changes.
To confirm the changes, click the "Logout" button and access the GUI with the new password.
Hardening the Device
Recommendations to optimize cybersecurity in a protected environment:
• Harden the device according to your company policies and standards.
• Review assumptions about protected environments and address potential risks and mitigation strategies. See
"Product defense-in-depth" for more details.
• Change the default passwords/passcodes. See "Changing passwords" for more details.
• Change the communication protocol ports from their default values. This lowers the predictability of port use.
• Disable communication protocol ports when they are not in use. This reduces the attack surface.
Firmware Upgrades
When device firmware is upgraded – security configuration remains the same until changed, including usernames and
passwords/passcodes. It is recommended to review security configuration after an upgrade to analyze privileges for new or
changed device features and revoke or apply them according to your company policies and standards.
Secure Disposal Guidelines
Use the Secure disposal checklist when disposing a device to help prevent potential disclosure of data.
©2020 Veris Industries USA 800.354.8556 or +1.503.598.4564 / support@veris.com
Other companies' trademarks are hereby acknowledged to belong to their respective owners.
TM
0420

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents