• Hall of Thanks

    OSIsoft thanks all individuals ethically reporting security issues in our products or services. Contact us - Report a Security Vulnerability.     Each name represents an individual or organization who has...
    last modified by lmlcoch
  • PI Security Suggestion Compilation

    Part of a PI administrator's job is to make sure that the PI system is as reasonably secure as possible. However, sometimes, it is PI itself that must be made more secure. This post compiles many of the security-...
    last modified by Kenneth_Barber
  • PI Security Audit Tool

    Have there been any updates or developments to the PI Security Audit Tool? In 2017 there was a OSIsoft UC 2017 Lab presentation for "Using and Building The PI Security Audit Tools, a tool to baseline your PI system se...
    last modified by robertballjr
  • No write Access - Secure Object 

    Hello Everyone!   We have created PI Engineers Domain group, Mapped with "PI Engineers" Identity and Provided "PI POINT" Read and Write Permission on Point Security and Data Security. but still Our End users fro...
    last modified by AKASH MISAL
  • PI Buffering issue

    When i tried to add data server I am getting the pop up error as "Object reference not set to an instance of an object".   I have modified the PI client,ini file with PI server list and filebuffer path. ...
    created by mohbaba
  • Connect to PIVision without user name and password

    It's there a way to connect to PI Vision with a token? right now I'm sending the credentials in the URL like this: username:password@site.com/PIVision/#/Display/67?mode=kiosk&hidetoolbar
    last modified by raulcantu
  • S4x20 presentation on Security Questionnaires

    Hello security advocates from S4x20 and on PI Square.  Today's discussion about security questionnaires for industrial control systems at the prestigious S4 conference was well attended with requests for a copy p...
    Bryan Owen
    created by Bryan Owen
  • Non simplistic security model in PI DA

    Hi,   I have learned that one identity can have multiple Windows AD SIDs (user or group for example) mapped to it. One Windows AD SID however may only be mapped to one PI Identity.   Does this...
    last modified by CameronLee
  • Security Improvements for PI Vision Displays

    Hi Everyone,   Would like to gather your ideas on what security methods I can apply regarding the access of our PI Vision Displays. Besides using Windows Authentication and applying SSL Certificates to each of o...
    last modified by pocholo.mendoza
  • PI World Cyber Security Workshop

    Cyber security is constantly in the news today – often with more hype than useful information!   The PI World Cyber Security Workshop is organized to provide straight talk about concerns and especially tho...
    Bryan Owen
    created by Bryan Owen
  • Check out the PI Security Audit Tools on GitHub

    In an effort to demystify PI security and help our customers assess the security posture of their systems, we’ve developed a tool to help baseline the security configuration of PI System components in the form o...
    last modified by hpaul
  • user permission to create/edit but not to delete

    What would I do to give a user permission to create/edit tags/points while not allowing them to be able to delete tags/points
    last modified by rbeadle
  • Introduction to group Managed Service Accounts

    Although introduced in Windows Server 2012, the Group Managed Service Account (gMSA) still has low adoption within our customer base. This blog post aims to highlight benefits of gMSAs, discuss how to deploy and use t...
    last modified by lmlcoch
  • Security trends and highlights from S4x19

    S4 may well be the ‘Davos’ for those who strive to improve modern society by addressing digital hazards affecting industrial automation systems. Technology professionals and industrial security thought lea...
    Bryan Owen
    created by Bryan Owen
  • Enable the SMB signing on PI server

    Hi,   Does enabling the SMB signing on PI server cause any problem?   Thanks, Ruxana
    last modified by Ruxana
  • Security Workshop, Take 2 in Dallas!

    We're doing it again.  This time in Dallas!  On November 13th, OSIsoft is hosting the Texas Regional Seminar in Dallas, TX.  There will a be a good mix of talks on our product roadmap and customer succe...
    last modified by Brian
  • Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors

    US-CERT released the alert, Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors, on Thursday, March 15th.  The technical alert includes indicators of compromise (IOCs), te...
    created by hpaul
  • Interested in attacking the PI System? Come to S4!

    We share this special invitation to the Digital Bond S4x19 ICS Security Conference sponsored by OSIsoft, LLC.   The S4x19 conference is taking place in Miami Beach, January 15-17, 2019.  The three-day even...
    created by Brian
  • Security Workshop in D.C.

    Coming this month on August 21-22, OSIsoft is hosting a Super Regional Seminar.  This is a special two day event taking place in Washington D.C.  There will a be a good mix of talks on our product roadmap, c...
    last modified by Brian
  • Configuration as Code for PI System Security: Introducing PI Security DSC

    As a PI System administrator, do you want to: use the same mechanism to secure both the OS and the applications running on it? maintain a baseline across numerous nodes and sites? have functional documentation that...
    created by hpaul