001 Endpoint_Security_Solutions_en-US_en-US
001 Endpoint_Security_Solutions_en-US_en-US
001 Endpoint_Security_Solutions_en-US_en-US
Cybersecurity information 1
Preface 2
Managing Endpoint
Security 3
SIMATIC
Practical Information 4
Process Control System PCS 7
Process Control System PCS neo
Managing Endpoint Security
Solutions
Function Manual
10/2023
A5E52386975-AA
Legal information
Warning notice system
This manual contains notices you have to observe in order to ensure your personal safety, as well as to prevent
damage to property. The notices referring to your personal safety are highlighted in the manual by a safety alert
symbol, notices referring only to property damage have no safety alert symbol. These notices shown below are
graded according to the degree of danger.
DANGER
indicates that death or severe personal injury will result if proper precautions are not taken.
WARNING
indicates that death or severe personal injury may result if proper precautions are not taken.
CAUTION
indicates that minor personal injury can result if proper precautions are not taken.
NOTICE
indicates that property damage can result if proper precautions are not taken.
If more than one degree of danger is present, the warning notice representing the highest degree of danger will
be used. A notice warning of injury to persons with a safety alert symbol may also include a warning relating to
property damage.
Qualified Personnel
The product/system described in this documentation may be operated only by personnel qualified for the specific
task in accordance with the relevant documentation, in particular its warning notices and safety instructions.
Qualified personnel are those who, based on their training and experience, are capable of identifying risks and
avoiding potential hazards when working with these products/systems.
Proper use of Siemens products
Note the following:
WARNING
Siemens products may only be used for the applications described in the catalog and in the relevant technical
documentation. If products and components from other manufacturers are used, these must be recommended
or approved by Siemens. Proper transport, storage, installation, assembly, commissioning, operation and
maintenance are required to ensure that the products operate safely and without any problems. The permissible
ambient conditions must be complied with. The information in the relevant documentation must be observed.
Trademarks
All names identified by ® are registered trademarks of Siemens AG. The remaining trademarks in this publication
may be trademarks whose use by third parties for their own purposes could violate the rights of the owner.
Disclaimer of Liability
We have reviewed the contents of this publication to ensure consistency with the hardware and software
described. Since variance cannot be precluded entirely, we cannot guarantee full consistency. However, the
information in this publication is reviewed regularly and any necessary corrections are included in subsequent
editions.
For approved endpoint security solutions (signature based anti-virus and allow-list) in DCS,
refer to "Compatibility Tool (https://support.industry.siemens.com/cs/document/64847781)"
and to the chapter "Approved virus scanners for DCS (Page 16)". Support for the usage of
alternative EDR/XDR solutions not tested on compatibility by DCS is provided by our customer
service department, refer to the chapter "Project specific support (Page 19)".
Note
The provided information is focusing on DCS and their related computers. Other computers,
like infrastructure computers in the perimeter network, can be configured in a different way
regarding endpoint protection to recognize, e.g., attacks early.
The recommendations provided in this document are intended to support responsible plant
owners in evaluating an alternative anti-virus solution / endpoint security solution.
An evaluation carried out by the customer does not lead to a released solution for DCS.
Required Knowledge
This documentation affects everyone who is involved in configuring, commissioning and
operating DCS. It is assumed that the reader has appropriate knowledge regarding installing,
configuring and managing the described security solutions in the own process control
environment.
Validity
For the usage of this document the currently valid DCS manuals must be used.
Note
The provided information needs to be understood as examples. The recommendations and
information can be used for evaluation and implementation of a chosen 3rd party solution in
conjunction with the plant specific conditions.
• System and application files that are compromised by malware must not be moved,
blocked or deleted automatically if such actions could influence the stable operation of
the production process or as long as the process is not brought into a safe state.
• The performance influence of such an endpoint security solution on the process control
system should be checked in advance before it is used inside a productive environment.
For example, to determine the effect of the endpoint security product on the performance
of the process control system, it is recommended to test the process control system before
and after installation of the product as described below:
– Timing behavior on the Engineering Station (ES)
Open an archived project
Archive project data
Load project data to the AS
Load project data to the server of DCS / client of DCS
– Timing behavior in DCS
Restart redundant servers of DCS
Redundancy synchronization of redundant servers of DCS (synchronization start after
restart / synchronization finished)
Switch over time client of DCS
Usual runtime operations, for example: picture change
– General timing behavior
For example: installation of Windows updates
For example: installation of a new DCS server
• The virus scan server or WSUS distributes the virus signatures to the virus scan clients to
ensure that clients do not need direct internet access to receive signature file updates.
• It should be evaluated via a plant and risk based consideration which additional
functionality provided by the anti-virus product is used. It is recommended that only the
basic functionality of signature based anti-virus is used. Additional functionalities like
firewall should be deactivated because the firewall provided by the Windows operating
system has already been configured and is used.
Note
The used example figures in this chapter refer to SIMATIC PCS 7, but can also be used for
SIMATIC PCS neo.
platform” via WSUS. In addition, Microsoft offers different configuration options for the
Microsoft Defender Antivirus:
– Local group policies
– Active Directory (Windows Domain) for the central administration of group policies
– Microsoft Endpoint Configuration Manager
– PowerShell commandlets
– Windows Management Instrumentation (WMI)
Example figure for SIMATIC PCS 7: decentralized architecture with update server
For more information about the specific configuration and use of Microsoft Defender
Antivirus in SIMATIC PCS 7, refer to:
(https://support.industry.siemens.com/cs/document/109815443)
They can be used to run a simple malware detection and reporting test and to test the
corresponding reaction of the virus scanners.
If you require further support, you will find additional information on this in the chapter
"Project specific support (Page 19)".
4.3 Abbreviations
The abbreviations/terminologies used in this document and their meanings are listed here.