The PI System is charged with serving operations data while preventing access to critical infrastructure. But security is challenging—what can you do to ensure the integrity of this mission? Part of the answer lies in understanding controls built into the PI System and the Microsoft Windows platform. This presentation will expose five secrets for configuring PI System Security:
Windows Authentication
Least Privilege
Securing Network Traffic
Host Hardening
Auditing and Monitoring"