View Assessments on the Reporting > Assessments tab.
The Device Security assessment identifies APC and Schneider Electric devices monitored by IT Expert that do not meet current security standards, lists vulnerabilities, and provides recommended actions.
The Device Security assessment includes Ripple20 vulnerability detection, vulnerable device configurations, out of date firmware, and devices that should be replaced due to security issues that cannot be addressed otherwise.
You can download a PDF report of this assessment and export the list of vulnerable devices as a CSV file.
See Why are devices shown as not analyzed in the Device Security assessment?
About modifying APC SNMP device settings
IT Expert Administrators can modify settings on one or more APC SNMP devices that support config.ini.
See Single device configuration to modify settings on one device and copy those settings to many devices of the same type. Also see Device configuration
Note: You can update firmware for APC devices in ITE on the Management > Firmware Update tab, and update device configurations on the Management > Device Configuration tab.
Alerts you to devices that are Ripple20 vulnerable.
Take interim mitigation steps and update firmware when it is available.
See Ripple20 vulnerabilities in the Treck TCP/IP stack
Alerts you to devices that use HTTP rather than HTTPS.
Using HTTPS minimizes the risk that web traffic is intercepted, replayed, or impersonated by a malicious actor.
Alerts you to devices that use SNMPv1 rather than SNMPv3
Enable Encryption and Authentication on top of SNMPv3 to minimize the risk that data is intercepted or replayed by a malicious actor.
Alerts you to devices at or nearing end of life.
Many security features are available by replacing your network management card or device with the latest hardware.
Firmware update analysis
Alerts you to devices running outdated firmware.
New versions of firmware are made available throughout the year for the Network Management Card in your APC devices. It is generally recommended that you update devices to the latest firmware available.
Remote access analysis
Alerts you to devices with Telnet enabled rather than SSH
Using SSH minimizes the risk that data is intercepted, replayed, or impersonated by a malicious actor.
File transfer analysis
Alerts you to devices with FTP enabled rather than SCP
Using SCP minimizes the risk that file reads and writes between your physical infrastructure devices and other file management systems is intercepted, replayed, or impersonated by a malicious actor.
See Configure Gateway device file transfer settings
Alerts you to APC devices that are TLStorm vulnerable.
For the most accurate device analysis, be sure to keep your APC Network Management Card (NMC) firmware up to date and your Gateway updated to the latest version.
More about TLStorm vulnerabilities
How to update APC NMC firmware in IT Expert
How to update EcoStruxure IT Gateway software
How to update the firmware on an EcoStruxure Ready Smart-UPS
Please sign in to leave a comment.