Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Access Control: Security technique that regulates who or what can view or use resources in a computing environment.
  • Password Encryption: System administrator does not possess access to the user. They are encrypted before being stored.
  • Maximum and Minimum Age for Password: A feature that imposes a minimum password age before allowing it to change and a maximum age before expiring.
  • Required Password changing: Forces the user to alter his password after the first login has been made.
  • User Name and Password Minimum Length: Defines username and the password's minimum length.
  • Block on Invalid Login Attempt: Blocks User if maximum number of invalid login attempts have been made.
  • Store Password History: A range of the last 0-5 passwords can be stored to make sure the user does not repeat an already used one.
  • Auto Log Off: User is logged off the system for inactivity or expiration date.
  • Audit Trail Data: Security-relevant chronological record or set of records that provide documentary evidence of the sequence of activities that have affected at any time a specific operation.

...

To use the Audit Trail function, you must enable it. Go to Edit > Alarms > Groups, and click on the Settings button.

...

  • Name: Enter a name for the report. The system will let you know if the name is not valid.
  • Padding: Use padding when replacing a tag name with its value (the field starts with enough space for the same number of characters as the tag name):
    • Compact — Removes any extra characters and displays only the tag
    • PadRight — Adds an extra space for each character to the right of the tag
    • PadLeft — Adds an extra space for each character to the left of the tag
  • SaveFormat: Selects the report format: XPS, HTML, Unicode, ASCII, PDF
  • SaveFileName: Enter a string with {ObjectProperties}. Use the full path
  • SaveTrigger: Enter an object property as the trigger
  • Append: Enter the file that appends the report
  • Size: The size of the report
  • EditSecurity: Check which user groups can edit the report
  • Header: Choose another report as the Header
  • Footer: Choose another report as the Footer
  • Legacy: Read-only. Shows if the report is a legacy
  • Description: Enter a description of the report

...