• user permission to create/edit but not to delete

    What would I do to give a user permission to create/edit tags/points while not allowing them to be able to delete tags/points
    rbeadle
    last modified by rbeadle
  • Introduction to group Managed Service Accounts

    Although introduced in Windows Server 2012, the Group Managed Service Account (gMSA) still has low adoption within our customer base. This blog post aims to highlight benefits of gMSAs, discuss how to deploy and use t...
    lmlcoch
    last modified by lmlcoch
  • Security trends and highlights from S4x19

    S4 may well be the ‘Davos’ for those who strive to improve modern society by addressing digital hazards affecting industrial automation systems. Technology professionals and industrial security thought lea...
    Bryan Owen
    created by Bryan Owen
  • Enable the SMB signing on PI server

    Hi,   Does enabling the SMB signing on PI server cause any problem?   Thanks, Ruxana
    Ruxana
    last modified by Ruxana
  • Security Workshop, Take 2 in Dallas!

    We're doing it again.  This time in Dallas!  On November 13th, OSIsoft is hosting the Texas Regional Seminar in Dallas, TX.  There will a be a good mix of talks on our product roadmap and customer succe...
    Brian
    last modified by Brian
  • Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors

    US-CERT released the alert, Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors, on Thursday, March 15th.  The technical alert includes indicators of compromise (IOCs), te...
    hpaul
    created by hpaul
  • Interested in attacking the PI System? Come to S4!

    We share this special invitation to the Digital Bond S4x19 ICS Security Conference sponsored by OSIsoft, LLC.   The S4x19 conference is taking place in Miami Beach, January 15-17, 2019.  The three-day even...
    Brian
    created by Brian
  • Security Workshop in D.C.

    Coming this month on August 21-22, OSIsoft is hosting a Super Regional Seminar.  This is a special two day event taking place in Washington D.C.  There will a be a good mix of talks on our product roadmap, c...
    Brian
    last modified by Brian
  • Configuration as Code for PI System Security: Introducing PI Security DSC

    As a PI System administrator, do you want to: use the same mechanism to secure both the OS and the applications running on it? maintain a baseline across numerous nodes and sites? have functional documentation that...
    hpaul
    created by hpaul
  • Standard ISO/IEC 27032:2012 and PI System

    Dear all,     Some our customers and sales people ask if PI system meet requirements of the standard ISO/IEC 27032:2012 (https://www.iso.org/standard/44375.html ) and if yes, can we get some sort of proof (...
    aivanova
    last modified by aivanova
  • Cyber Security 'Near Misses'

    Glenn Aydell's "Cyber Security and the Chemical Sector" presentation at the 2018 SANS ICS Summit provides a great collection of near misses. Learning from near misses is a critical step in most safety programs and a h...
    Bryan Owen
    created by Bryan Owen
  • 5-Jun-2018 Critical Infrastructure and IT/OT Integration

    Although lot has already been written about IT and OT integration there is so much more to share. So I jumped at the chance to represent a supplier’s perspective on Critical Infrastructure Protection and IT/OT i...
    Bryan Owen
    created by Bryan Owen
  • Additional Resources for PI System Security

    Looking for additional resources for security?   Learning resources: Check out the different learning paths to find the right training materials for you! Hands-on Labs: 2017 Hands-on Lab: Extending the PI Se...
    Brian
    created by Brian
  • Security Activities at PI World '18

    PI World 2018 is just around the corner.  The kick-off reception is one week from this evening.  As we do each year, we would like to share the security related activities that are happening during the confe...
    Brian
    created by Brian
  • System Hardening and Configuration as Code: PI System Security Activities on Day 3 of PI World 2018!

    There are a couple options to learn about PI System hardening on day 3 of PI World 2018.  The session Extreme PI System Hardening in developer track 4 at 10:30 AM is a “How-To” session that will tak...
    hpaul
    created by hpaul
  • Coresight Squared – What’s next? Kerberos and more..

    Coresight Squared  This series consists of three parts: 1. Server Core Installation and Configuration 2. PI Coresight Installation 3. Extras: Kerberos and more << you're here!     At this po...
    lmlcoch
    last modified by lmlcoch
  • Error retrieving trust details for trust RPC Invoke failed[-12002] Code Not Found in PInt

    Hi All,   I am having an issue in a development PI Data archive server version 2012 3.4.390.   PI SMT is displaying an error retrieving the list of PI Trusts (Security > Mappings & Trusts). The fol...
    maiajo
    created by maiajo
  • All Industrial Software is Toxic?

    The trend of describing malware in terms of a ‘virus’ has been credited to Fred Cohen’s ‘Computer Viruses - Theory and Experiments’ paper circa 1984. The virus analogy is still with us to...
    Bryan Owen
    created by Bryan Owen
  • NCSAM 2017 – Week 2: Cyber Security in the Workplace

    National Cyber Security Awareness Month 2017 has dedicated this week to creating a culture of shared responsibility for addressing the most common threats to organizations. Let’s explore shared responsibility wi...
    Bryan Owen
    created by Bryan Owen
  • National Cyber Security Awareness Month (NCSAM 2017)

    Awareness is “the key” for advancing the prevention and tempering severity of cyber incidents.  Believe it, embrace it, live it, it’s true! Belief: People are more apt to do the right things if...
    Bryan Owen
    created by Bryan Owen