Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

PI Connector for Ethernet/IP

Security best practices

  • Last UpdatedDec 28, 2022
  • 1 minute read

To mitigate security vulnerabilities, security best practices should be performed to tighten security around your connector.

OSIsoft recommends the following:

  • Ensure the service identities for the connector do not have domain or host administrative privileges.

  • Block access to the connector administration port using a firewall if your usage scenario does not require remote access to the PI Connector Administration site.

Related Links
TitleResults for “How to create a CRG?”Also Available in