The Device Security assessment identifies APC and Schneider Electric devices monitored by IT Expert that do not meet current security standards, lists vulnerabilities, and provides recommended actions.
The Device Security assessment includes Ripple20 vulnerability detection, vulnerable device configurations, out of date firmware, and devices that should be replaced due to security issues that cannot be addressed otherwise.
About modifying APC SNMP device settings
IT Expert Administrators can modify settings on one or more APC SNMP devices that support config.ini.
Note: You can update firmware for APC devices in ITE on the Management > Firmware Update tab, and update device configurations on the Management > Device Configuration tab.
Alerts you to devices that are Ripple20 vulnerable.
Take interim mitigation steps and update firmware when it is available.
Alerts you to devices that use HTTP rather than HTTPS.
Using HTTPS minimizes the risk that web traffic is intercepted, replayed, or impersonated by a malicious actor.
Alerts you to devices that use SNMPv1 rather than SNMPv3
Enable Encryption and Authentication on top of SNMPv3 to minimize the risk that data is intercepted or replayed by a malicious actor.
Alerts you to devices at or nearing end of life.
Many security features are available by replacing your network management card or device with the latest hardware.
Firmware update analysis
Alerts you to devices running outdated firmware.
New versions of firmware are made available throughout the year for the Network Management Card in your APC devices. It is generally recommended that you update devices to the latest firmware available.
Remote access analysis
Alerts you to devices with Telnet enabled rather than SSH
Using SSH minimizes the risk that data is intercepted, replayed, or impersonated by a malicious actor.
File transfer analysis
Alerts you to devices with FTP enabled rather than SCP
Using SCP minimizes the risk that file reads and writes between your physical infrastructure devices and other file management systems is intercepted, replayed, or impersonated by a malicious actor.