0% found this document useful (0 votes)
91 views1 page

SM 1281 Condition Monitoring - IT Security

The document discusses IT security guidelines from Siemens for industrial systems. It recommends regularly checking for product updates and integrating components into a holistic security concept. The document also provides protective measures for the SM 1281 system, advising users to only grant authorized access, change default passwords, and securely transfer data.

Uploaded by

Cesar Sampaio
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
91 views1 page

SM 1281 Condition Monitoring - IT Security

The document discusses IT security guidelines from Siemens for industrial systems. It recommends regularly checking for product updates and integrating components into a holistic security concept. The document also provides protective measures for the SM 1281 system, advising users to only grant authorized access, change default passwords, and securely transfer data.

Uploaded by

Cesar Sampaio
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

SM 1281 Condition Monitoring

IT security

IT security

IT security guidelines
Siemens provides products and solutions with industrial security functions that support the secure
operation of plants, solutions, machines, equipment and/or networks. They are important components in
a holistic industrial security concept. With this in mind, Siemens’ products and solutions undergo
continuous development. Siemens recommends strongly that you regularly check for product updates.
For the secure operation of Siemens products and solutions, it is necessary to take suitable preventive
action (e.g. cell protection concept) and integrate each component into a holistic, state-of-the-art
industrial security concept. Third-party products that may be in use should also be considered. For more
information about industrial security, visit http://www.siemens.com/industrialsecurity.
To stay informed about product updates as they occur, sign up for a product-specific newsletter. For
more information, visit http://support.automation.siemens.com.

Protective measures for the SM 1281 system

Notice
Make sure that only authorized persons are granted access – both physically and in terms of data
technology – to the SM 1281 system.
• Change the preset password of the SM 1281 ("0000") to an individual password.

• Keep your password safe.

• Data transfer, including passwords, between a client PC and the SM 1281 via a network is carried out unsecured,
i.e. without encryption.
For secured (remote) access to the SM 1281, you must therefore use a router, for example, which establishes
a secure connection with encryption and authentication.

See also
Security (http://www.industry.siemens.com/topics/global/en/industrial-security/Pages/default.aspx)

Support (https://support.industry.siemens.com/cs/?lc=en-DE)

This document constitutes a free excerpt compiled by the user himself/herself from the documentation provided by Siemens for this product. Siemens disclaims all liability for the
completeness of this document. It shall only be used for the user's own internal purposes. It shall not be passed on to third parties.
10/7/2021

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy