Introduction
Your PC system can run various applications to enhance security in your control environment. The system has factory default settings that require reconfiguration to align with Schneider Electric device hardening recommendations of the defense-in-depth approach.
A topic dedicated to cyber security is available in the support area of the Schneider Electric website.
Defense-In-Depth Approach
In addition to the solutions presented in this book, the recommendation is to follow the Schneider Electric defense-in-depth approach as described in the following STN guide:
Book title: How can I ... Reduce Vulnerability to Cyber Attacks? System Technical Note, Cyber Security Recommendations
Website link description (book description): How Can I Reduce Vulnerability to Cyber Attacks in PlantStruxure Architectures?
Managing Vulnerabilities
Reported vulnerabilities from Schneider Electric devices are notified in the webpage: http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/cybersecurity.page.

If you face a cyber security incident or vulnerability not mentioned in the list provided by Schneider Electric, you can report this incident or vulnerability by clicking
button in the webpage.