background image

SMARTVFD SECURITY GUIDE

7

31-00140—01

Other forms of intrusion detection will search event logs 
looking for unusual events, or will compare the current file 
system to a known good image. Be careful when running 
such tools to prevent them from using too many resources 
and interfering with the control system.

Wireless access points

It is generally not advised to allow wireless access to the 
BAS network.

If a wireless network is part of the existing automation 
system, follow these guidelines when setting up and 
configuring a wireless network:
• Do not use the default Service Set Identifier (SSID); 

configure a unique SSID.

• Disable SSID broadcast.
• Use Wi-Fi Protected Access II (WPA2-Personal) or 

(WPA2-Enterprise) encryption. Wired Equivalent 
Privacy (WEP) is not sufficiently secure.

• Use the correct class of network equipment. For 

example, do not use home or small office equipment for 
large enterprise jobs.

• Change the default administrator password.
• Ensure access points are running the latest firmware.
• Physically secure access point devices.
• Use a separate access point for public, non-secured 

access, such as WiFi for guests or customers.

• When feasible, enable media address control (MAC) 

filtering and enter the MAC addresses for all the 
wireless devices.

APPENDIX 6 - HARDENING 
AND COMPUTER ISSUES

This section contains additional information on 
Hardening and Physical Computer Issues.

Hardening

Hardening involves taking additional actions to make it 
more difficult to obtain unauthorized access or to 
circumvent security mechanisms.

Physical computer

Implement additional steps to harden computers against 
unauthorized access:
• If computers with DVD drives are readily accessible, fit 

locks or remove the DVD drives. Disable unused USB 
ports to prevent USB drives or other uncontrolled 

devices from being connected to the system. Such 
devices may be used to introduce a virus or other 
malware. Also disable or physically protect the power 
button to prevent unauthorized use.

• Set the BIOS to boot only from the operating system's 

root partition/drive.

• Set a BIOS password (ensure that this does not prevent 

automatic startup).

• Remove the floppy and CD/DVD drives from the 

computer.

• Disable USB ports and other ports capable of being 

used for memory sticks and other portable storage 
devices.

• Prevent drives, like the DVD drive, from being visible to 

Microsoft Windows Explorer by using the group policy.

• See Using Group Policy Objects to hide specified drives 

at http://support.microsoft.com/kb/231289 for more 
information.

• Note,  however,  that  hiding the drives in Windows 

Explorer does not prevent those drives from being 
accessed using a command prompt.

Operating system

Many additional configuration options can be applied to 
harden the operating system against threats.

Securing the desktop

The following recommendations apply to desktop policy 
settings:
• Configure Windows to display a warning against 

unauthorized use of the computer.

• You can configure computers to display a message 

when someone logs on. A typical message would be "It 
is an offense to continue without proper authorization."

Historically, legal prosecutions of intruders have failed 
because no such warning was displayed. The banner can 
be defined using Group Policy or the local registry.

• Use Group Policy (if the computer is part of a Windows 

domain) or the local registry to: Hide the last user name 
on the logon window. By default, the Logon dialog box 
displays the name of the last user to log on. This saves 
time if the same user is logging on again but is a 
security risk.

Summary of Contents for SmartVFD

Page 1: ...scribed and used by the SmartVFD The SmartVFD has multiple communication protocol options Typically only one communication protocol is chosen to interface with the SmartVFD in any given installation SYSTEM DESIGN AND PLANNING This section contains information on activities that need to happen when the system is being planned by the contractor Physical Security of Components It is important to have...

Page 2: ...rough the use of an access code settable on the keypad parameter P8 1 and P8 2 Access to the SmartVFD directly by PC via the Drive Care Tool software and the HVFDCDMCA hardware kit requires no password Any PC application accessing the SmartVFD via the BMS or router should be protected with a robust password See APPENDIX 3 SECURITY MAINTENANCE TASKS on page 3 PCs used to access the SmartVFD Each PC...

Page 3: ...ion best practices for SmartVFD SMARTVFD Communication Bus Lon BACnet MS TP etc Security of the bus also means that the bus is electrically reliable for communications It is important the bus is installed with one wire type consistent throughout the whole gateway to controller connection as to eliminate reflections from bus wire impedance mismatches Shielded wire is not recommended for normal inst...

Page 4: ...est real time protection for your system Configure the virus scanner to run on demand scans during regular scheduled maintenance to catch any malicious files or programs which may be dormant on the computer Configure both on access and on demand scanning to Scan the boot sectors of all disks Move infected files to a quarantine directory and notify the user that an infected file was found Allow the...

Page 5: ...tronger password that is also easier for the user to remember For example My dog Fido has 50 fleas is a much stronger password and much easier to remember than X 9d8oc Ek Enforce password history set to 24 passwords remembered This prevents reuse of the same password too quickly Password must meet complexity requirements set to enabled improves encryption and makes guessing harder Suggest requirin...

Page 6: ...will reject any incoming connections by default Exceptions must be put into the firewall to allow incoming connections to succeed If not manually configured on first usage the Windows firewall will prompt the user to add a firewall exception Use the following configuration settings The firewall is on The firewall is on for all network locations Home or work Public or Domain The firewall is on for ...

Page 7: ...accessible fit locks or remove the DVD drives Disable unused USB ports to prevent USB drives or other uncontrolled devices from being connected to the system Such devices may be used to introduce a virus or other malware Also disable or physically protect the power button to prevent unauthorized use Set the BIOS to boot only from the operating system s root partition drive Set a BIOS password ensu...

Page 8: ... M S 01 18 Printed in United States By using this Honeywell literature you agree that Honeywell will have no liability for any damages arising out of your use or modification to the literature You will defend and indemnify Honeywell its affiliates and subsidiaries from and against any liability cost or damages including attorneys fees arising out of or resulting from any modification to the litera...

Reviews: