PME 2023 IT Guide
PME 2023 IT Guide
This guide and its content are protected under applicable copyright laws and furnished for
informational use only. No part of this guide may be reproduced or transmitted in any form or by
any means (electronic, mechanical, photocopying, recording, or otherwise), for any purpose,
without the prior written permission of Schneider Electric.
Schneider Electric does not grant any right or license for commercial use of the guide or its
content, except for a non-exclusive and personal license to consult it on an "as is" basis.
Schneider Electric products and equipment should be installed, operated, serviced, and
maintained only by qualified personnel.
As standards, specifications, and designs change from time to time, information contained in this
guide may be subject to change without notice.
DANGER
DANGER indicates a hazardous situation which, if not avoided, will result in death or serious
injury.
WARNING
WARNING indicates a hazardous situation which, if not avoided, could result in death or
serious injury.
CAUTION
CAUTION indicates a hazardous situation which, if not avoided, could result in minor or
moderate injury.
NOTICE
NOTICE is used to address practices not related to physical injury.
Please Note
Electrical equipment should be installed, operated, serviced and maintained only by qualified
personnel. No responsibility is assumed by Schneider Electric for any consequences arising out
of the use of this material.
A qualified person is one who has skills and knowledge related to the construction, installation,
and operation of electrical equipment and has received safety training to recognize and avoid the
hazards involved.
Safety Information EcoStruxure™ Power Monitoring Expert 2023 IT Guide
Contents
Safety Information 3
Safety Precautions 7
Introduction 8
Resources 9
Overview 12
System architecture 13
Client types 15
Engineering Client 15
Web Client 15
Licensing 17
License activation 17
License types 17
Basic administration tasks 22
Cybersecurity 23
Cybersecurity awareness 23
Cybersecurity features 23
Recommended actions 24
Planning 27
Installing and Upgrading 29
Configuring 31
Administering 34
Decommission 36
IT Requirements 37
Computer Hardware 38
Choosing Computer Type, CPU, and RAM 38
Choosing Data Storage 41
Operating Environment 45
Windows Updates 46
Localization 46
Operating System considerations 47
SQL Server considerations 47
Network connectivity 49
Network communication 49
Network shares 49
Windows Domain compatibility 49
IPv6 compatibility 49
IP Port Requirements 49
Other IT considerations 50
Internet Information Services (IIS) .NET Trust Level 50
PME Server name limitations 50
Display resolution 50
Device Networks 51
Device networks overview 52
Network types 53
Ethernet (TCP) networks 53
Serial device networks 53
Network performance 54
Time synchronization 55
Tools 56
System maintenance and Disaster recovery 57
System maintenance 58
Designing for maintenance 58
Database maintenance 59
System health review 69
Disaster recovery strategy 76
Identify disaster recovery objectives 76
IT architecture and resources plan 77
Backup plan 78
Recovery plan 84
Recommended consolidated disaster recovery strategy plan 85
Reference 86
Cybersecurity Reference 87
Data encryption 87
PME accounts 87
PME Services 88
Network shares 88
Session timeout 88
System integration security 89
Verifying file integrity and authenticity 89
Accounts and services 91
Windows accounts 91
SQL Server accounts 93
PME Windows services 95
IIS Application Pools 99
Databases 100
PME Databases 100
Database maintenance task definitions 100
Considerations for trimming archived data from ION_Data 101
Database maintenance account requirements 102
Database maintenance 102
Default maintenance task settings 110
Setting up the ION_Data archive task for Distributed PME systems 111
Using IONMaintenance for database maintenance tasks 112
Database Manager 113
Configure database connection encryption 121
Safety Precautions
During installation or use of this software, pay attention to all safety messages that occur in the
software and that are included in the documentation. The following safety messages apply to this
software in its entirety.
WARNING
UNINTENDED EQUIPMENT OPERATION
• Do not use the software or devices for critical control or protection applications where
human or equipment safety relies on the operation of the control action.
• Do not use the software to control time-critical functions.
• Do not use the software to control remote equipment without proper access control and
status feedback.
Failure to follow these instructions can result in death, serious injury, or equipment
damage.
WARNING
INACCURATE DATA RESULTS
• Do not incorrectly configure the software or the devices.
• Do not base your maintenance or service actions solely on messages and information
displayed by the software.
• Do not rely solely on software messages and reports to determine if the system is
functioning correctly or meeting all applicable standards and requirements.
• Consider the implications of unanticipated transmission delays or failures of
communications links.
Failure to follow these instructions can result in death, serious injury, equipment
damage, or permanent loss of data.
WARNING
POTENTIAL COMPROMISE OF SYSTEM AVAILABILITY, INTEGRITY, AND
CONFIDENTIALITY
Use cybersecurity best practices to help prevent unauthorized access to the software.
Failure to follow these instructions can result in death, serious injury, equipment
damage, or permanent loss of data.
Work with facility IT System Administrators to ensure that the system adheres to the site-specific
cybersecurity policies.
Introduction
Power Monitoring Expert (PME) is a client-server, on-premise software application that collects
power monitoring data through a network of connected devices. The power monitoring data is
processed and stored using Microsoft SQL Server and can be accessed by users in a variety of
formats through different user interfaces.
This document is intended for IT professionals who support the PME system installation. It
provides information on possible deployment architectures, supported operating environments,
required access permissions, IT and device network considerations, cybersecurity, the PME
installer, as well as general dependencies and prerequisites.
Resources
The Resources page is a central reference for any resources that are referred to in this guide but
that are not included in the guide.
Download Center
NOTE: The EcoStruxure™ Power Monitoring Expert System Guide includes the content of the
following guides: What's New Guide, IT Guide, Web Applications Guide, and the Insulation
Monitoring User Guide.
The following EcoStruxure™ Power Monitoring Expert 2023 documents are available on the
Schneider Electric Download Center:
• System Guide (English) – Document number 7EN02-0485
NOTE: On the Exchange you can find discussion forums, key content, service providers, and
knowledge base articles. You can also sign-up to become a service provider. To gain access to
the Exchange and its content, register at https://exchange.se.com/.
EWS Specification
Application Notes
Drivers
Help Files
Upgrade Map
PME Scripts
EcoStruxure Power Digital Applications for Large Buildings & Critical Facilities - Design
Guide for North America
How Do I Extend the DDD Indicators Application to Support More Than 30 Devices
• Device Drivers
PME Device Driver Summary Spreadsheet (shows native and downloadable drivers;
includes links to downloadable drivers)
PME Device Driver downloads (SE, LE- Enter the device name in the search box to find
the driver)
Other
• Schneider Electric Cybersecurity Support Portal
Technical Support
• Schneider Electric Support (Support)
• mySchneider app
24/7 support. Mobile catalog. Access to expert help.
• Offline Licensing Support
Offline license activation, return, and refresh
External Resources
The following are resources that are referenced in different sections of this guide; they provide
additional information and downloadable components.
• How to determine which versions and service pack levels of the Microsoft .NET Framework
are installed
Overview
This section provides an overview of the PME system.
Use the links below to find the content you are looking for:
System architecture
Client types
Licensing
Basic administration tasks
System architecture
PME is a client-server, on-premise software application that collects power monitoring data
through a network of connected devices. The power monitoring data is processed and stored
using Microsoft SQL Server and can be accessed by users in a variety of formats through different
user interfaces.
Standalone architecture
In a Standalone architecture, all PME system files, the SQL Server database, and any other tools
or utilities are installed on the same computer. You access the power monitoring data through
clients.
The following example diagram shows both architectures in the context of the overall system,
including the monitoring devices:
However, in some cases it might be necessary to use the Distributed Database architecture, such
as:
• Your customer wants to use an existing SQL server.
• Your customer IT requirements do not allow a Microsoft SQL Server to be installed with
another application on the same server.
• The application requires Microsoft SQL Server redundancy with SQL Clustering or other third-
party tools.
• The application requires specific rules for database management, for example SQL jobs,
back-ups, data security, and so on.
Client types
In PME you use clients to access the configuration tools and the applications for viewing data.
There are two different types of clients:
• Engineering Clients configure and administer the system.
Engineering Client
An Engineering Client is an administrative interface in PME that is used to configure and
administer the system. Engineering Clients include tools such as the Management Console,
Vista, and Designer.
One Engineering Client is installed, by default, on the PME server. Additional Engineering Clients
can be installed on other computers, for example on a portable notebook computer, that are more
accessible than the server. Engineering Clients require a Base Access license.
Web Client
A Web Client is used to view power monitoring information such as real-time data, historical
information, and alarms which are used in day-to-day power management tasks.
Web Clients access the data on the server through a Web browser. No installation is required.
Web Clients can run on any computer on the network. Web Clients require a Client Access
license.
Web Clients can access the Web Applications (Dashboards, Diagrams, Trends, Alarms, and
Reports) in PME.
To set up a Web Client, enter the fully qualified domain name of the PME server or its IP address,
followed by /Web into your browser.
Examples:
• http://10.160.42.1/Web
• http://PMEServer.MyCompany.com/Web
NOTE: Web is the default root directory. The root directory is configurable and can be changed
during installation.
By default, the first application on the navigation bar in Web Applications opens in the browser. To
specify which application should open first, add one of the following application parameters to the
Web address: (Note that the parameters are case-sensitive.)
#Dashboards, #Diagrams, #Trends, #Alarms, #Reports
NOTE: For cybersecurity and performance reasons, we recommend that you do not use a Web
Client on the PME server computer.
Licensing
PME is a proprietary software that uses licensing to control its use and distribution. The licensing
is enforced through mechanisms that disable certain software functions if no valid license has
been activated.
To use PME, you must purchase software licenses and activate them in the system. The licenses
give you the right to use the software according to the terms and conditions described in the
software End User License Agreement (EULA). The licenses generally do not expire, unless
stated otherwise in the software EULA. PME licenses are per system. If you have multiple
systems, you must purchase separate licenses for each. Multi-system, or enterprise licenses are
not available.
PME uses a modular licensing structure where different licenses enable different functions in the
software. Some of these functions are optional, others are required. The licenses are cumulative,
meaning that you can add additional licenses to a system, to enable additional functionality.
See Resources for information on where to find a copy of the PME EULA.
License activation
Purchased licenses must be activated either through online or offline methods. An Internet
connection for the PME server is required for online activation. Offline activation must be done
from an alternate Internet-connected computer or smart-phone with web access.
Licenses are tied to the host computer (physical or virtual). If PME needs to be moved to a new
computer, the licenses must first be returned and then reactivated on the new computer.
License types
PME licenses bundle together one or more PME features. For example, a Base license includes
two Client Access license.
The following table shows the different licenses that are available for PME:
Type Description
New system installations include a time limited Trial license.
• cannot be reinstalled
Type Description
This is a required license. It enables the PME server functions and
the basic system functions. Without the Base license the system is
not functional. The same Base license can be used for Standalone
Base license or Distributed Database systems.
The Base license also includes two Client Access licenses. With
Base license, engineering client can be accessed.
Type Description
The Express Base license is similar to the Base license but with
reduced functionality. It is intended for small starter or entry-level
systems. The following shows the differences between Base and
Express Base licenses:
Express
Feature Base
Base
Included device
10 None
licenses
PQ Reports No Yes
Device Licenses Max of 10
Yes
(DL) additional
Client Licenses Max of 2
Yes
Expansion (CL) additional
(optional): Unlimited DL No Yes
Unlimited CL No Yes
Data Exchange
No Yes
Module
Express Base license
Energy Billing No Yes
Energy Analysis
Yes Yes
Reports
Energy Analysis
Yes Yes
Dashboards
Capacity
No Yes
SW Modules Management
(optional) Insulation
No Yes
Monitoring
PQ Performance No Yes
Breaker
No Yes
Performance
Backup Power No Yes
Event Notification No Yes
To
Edition Upgrade Standard n/a
Edition
Type Description
This is a required license. It enables the use of monitoring devices
in PME.
Depending on the locale, device licenses are sold as:
• Bundles of 5, 25, 50, 100, 200, unlimited - for the US, Canada,
and India.
• Individual licenses, with 3 different license types - for countries
other than the US, Canada, and India:
Device license E for entry-range device types
Type Description
This is an optional license. It enables the use of a Software
Module. Each Software Module requires its own specific license.
The following Software Modules exist in PME:
• Backup Power Module
Developer/Demo license This is a special license. Contact Schneider Electric for details.
NOTICE
LOSS OF DATA
• Back up the database at regular intervals.
• Back up the database before upgrading or migrating the system.
• Back up the database before trimming it.
• Back up the database before making manual database edits.
• Verify correct database behavior after making database or system changes.
Failure to follow these instructions can result in permanent loss of data.
In Standalone PME systems, the database maintenance tasks for backup, archive, maintenance,
and trim are pre-configured and scheduled to run automatically by default. For Distributed
Database PME systems, we recommend that these scheduled tasks are set up manually.
Check the task outputs regularly and confirm that backups are created as expected. Review and
adjust the schedules to meet your application needs, if required.
NOTE: You can perform additional, manual backups using standard SQL Server backup
procedures.
Monitor the database size for systems with SQL Server Express databases
NOTICE
LOSS OF DATA
• Back up or archive the database before trimming it.
• Trim the SQL Server Express database before it reaches the size limit.
Failure to follow these instructions can result in permanent loss of data.
SQL Server Express has a maximum database size limit of 10 GB. The database stops logging
data when this size limit is reached. The scheduled default database maintenance tasks include a
database size notification task. When the size threshold is reached, the task logs a system log
event message and triggers a Critical alarm in PME every time the task runs.
Check the PME system log and Alarms on a regular basis for database size notification
messages. Check the database size on a regular basis and take action before reaching the
database size limit.
Cybersecurity
This section includes information on how to help secure your system.
WARNING
POTENTIAL COMPROMISE OF SYSTEM AVAILABILITY, INTEGRITY, AND
CONFIDENTIALITY
Use cybersecurity best practices to help prevent unauthorized access to the software.
Failure to follow these instructions can result in death, serious injury, equipment
damage, or permanent loss of data.
Work with facility IT System Administrators to ensure that the system adheres to the site-specific
cybersecurity policies.
Cybersecurity awareness
Knowledge is first step to prevent cyber intrusions. Review the following resources to increase
your cybersecurity awareness:
• Securing Power Monitoring and Control Systems (Schneider Electric White Paper)
To find out about the latest cybersecurity news, sign up for security notifications, or to report a
vulnerability, visit the Schneider Electric Cybersecurity Support Portal.
Cybersecurity features
PME includes features that help to secure your system, including:
• Data encryption using SHA-512 and AES-256 cryptography (At Rest) and TLS 1.2 / HTTPS
(In Transit)
• Compatibility with antivirus and whitelisting software
For more information on these and other features, see Recommended actions.
NOTE: PME 2023 complies with the requirements of the security relevant standards for Security
Level 1 (SL 1) according to IEC 62443-4-1 and IEC 62443-4-2.
Recommended actions
PME is designed for a defense in depth security strategy, in compliance with IEC 62443, the
global standard for industrial automation control system security. A defense in depth strategy is a
multi-layered approach to cybersecurity with intentional redundancies to increase the security of a
system as a whole.
The different defense in depth layers can be described as:
• Data Layer (includes access control and encryption of data)
• Policies
To help secure your system, you must take specific actions for the different layers and at every
stage of the project life-cycle. The following shows the actions we recommend to help secure your
system, organized by life-cycle stage:
NOTE: The list of recommended actions below is not a complete list of possible cybersecurity
measures. It is meant to be a starting point to improve the security of your system. Consult with
cybersecurity experts to plan, install, configure, administer, and decommission your system
based on your needs.
For more information on cybersecurity related PME features, functions and configurations, see
the Power Monitoring Expert System Guide.
Planning
This section provides information to help you plan your system security.
You also need a certificate for the database server computer to use an encrypted connection
between PME and the SQL database server in a Distributed Database architecture installation.
See Set up encrypted database communication for Distributed Database architectures for more
information on this topic and for links to Microsoft articles with certificate requirements for SQL
server computers.
See Data encryption for information on data encryption, at rest and in transit, in PME.
PME can be used with application whitelisting software products such as McAfee Application
Control software. See Configure application whitelisting software for more information.
NOTE: AV software can have a significant impact on system performance if not set up correctly.
In particular, SQL Server performance can be affected if data and log files are not excluded from
on-access scans. See Configure antivirus software on your SQL Server for more information.
• device security
Determine what level of expertise will be required to deploy and maintain the network
architectures and security measures. Plan to have this expertise available for the system
deployment and maintenance.
Define workarounds and alternatives for cybersecurity-imposed restrictions, for example, for USB
and CD-ROM drive access.
NOTE: Application whitelisting software can prevent a legitimate application from executing, if
not configured correctly. See Configure application whitelisting software for more information.
WARNING
POTENTIAL COMPROMISE OF SYSTEM AVAILABILITY, INTEGRITY, AND
CONFIDENTIALITY
Use cybersecurity best practices to help prevent unauthorized access to the software.
Failure to follow these instructions can result in death, serious injury, equipment
damage, or permanent loss of data.
Work with facility IT System Administrators to ensure that the system adheres to the site-specific
cybersecurity policies.
Verify the file integrity and authenticity for software updates and other components before
installing them in the system. Do not install files for which the integrity and authenticity cannot be
confirmed.
For details on how to verify file integrity and authenticity, see Verifying file integrity and
authenticity.
As long as the PME server has the original key stored in the registry, it is possible to use the
installer to export a copy at any time. However, if the original key is deleted from the server, it
cannot be recreated or exported. In that case, you can use the exported copy to restore the
system key in the registry. Without the system key, PME user accounts can no longer be
accessed.
NOTE: Protect the exported system key in a location accessible only to authorized users. An
unauthorized user might be able to use the system key to gain access to your power monitoring
software and devices.
For example,
• Scan the system with up-to-date antivirus/antimalware tool
Configuring
This section provides information on how to help secure your system during the Configuring
phase.
See Data encryption for information on data encryption, at rest and in transit, in PME.
NOTE: Only the communication between the PME application server and the database server
will be encrypted, not the data in the database.
NOTE: The use of self-signed certificates is supported but we recommend that you use a
certificate from a certification authority.
1. Install a Server Authentication certificate from a public certification authority on the SQL
Server computer.
2. Take PME out of service by informing system users of the outage and disabling any
automated system control or third-party interactions.
6. Confirm that the PME application server computer can verify the ownership of the certificate
used by the SQL Server computer.
7. Restart PME, verify the correct operation of the system, and put the system back into
service.
When you deploy whitelisting software to help protect a system, it scans the system and creates a
whitelist of all executable binaries and scripts present on the system. The whitelist also includes
hidden files and folders.
The whitelist includes all authorized files and determines trusted or known files. In Enabled mode,
only files that are present in the whitelist can execute. All files in the whitelist are protected and
cannot be changed or deleted. An executable binary or script that is not in the whitelist is said to
be unauthorized and is prevented from running.
Consider the following when using whitelisting software with PME:
• Complete the system configuration before setting up and enabling the whitelisting software.
• Any program or script that should be able to update the system will need to be configured as
an updater.
• After solidification, no updates or extensions, such as add-on device drivers, may be installed.
• Disable the whitelisting software when making changes to the PME system. Enable it again
after the change.
• Follow the instructions of the software vendor for installing, configuring, and operating the
whitelisting software.
NOTE: Verify the correct operation of your PME system after you enable the whitelisting
software.
NOTE: Antivirus software can have a significant impact on system performance if it is not set up
correctly. Consider the following:
• SQL Server performance can be affected if data and log files are not excluded from on-
access scans.
• Special configuration of the antivirus software might be required.
• Follow the instructions of the software vendor for installing, configuring, and operating the
antivirus and whitelisting software.
RECOMMENDATION: Use Windows users instead of standard users in your PME system to
improve cybersecurity. Windows offers the advanced user management function of limiting the
number of invalid login attempts. This function is required for IEC 62443 compliance, the global
standard for industrial automation control system security.
For information on creating users and user groups, and on setting user access levels, see User
Manager help.
RECOMMENDATION: Remove the PME Web Applications shortcuts from the server.
Administering
This section provides information on how to help secure your system during the Administering
phase.
WARNING
POTENTIAL COMPROMISE OF SYSTEM AVAILABILITY, INTEGRITY, AND
CONFIDENTIALITY
Apply the latest updates and hotfixes to your Operating System and software.
Failure to follow these instructions can result in death, serious injury, equipment
damage, or permanent loss of data.
Critical and routine Windows and SQL Server updates can be applied to the operating systems
hosting the PME server and clients without prior approval by Schneider Electric.
Consider implementing best practices, such as:
• Establish a reliable process for finding and applying the latest security updates.
• Use automated scanners for detecting missing patches, misconfigurations, use of default
accounts, and so on.
WARNING
UNINTENDED EQUIPMENT OPERATION
• Before installing the update, verify that the system is not performing critical control actions
that may affect human or equipment safety.
• Verify correct system operation after the update.
Failure to follow these instructions can result in death, serious injury, or equipment
damage.
WARNING
INACCURATE DATA RESULTS
• Before installing the update, verify that the system data results are not used for critical
decision making that may affect human or equipment safety.
• Verify correct system data results after the update.
Failure to follow these instructions can result in death, serious injury, equipment
damage, or permanent loss of data.
RECOMMENDATION: Use Windows users instead of standard users in your PME system to
improve cybersecurity. Windows offers the advanced user management function of limiting the
number of invalid login attempts. This function is required for IEC 62443 compliance, the global
standard for industrial automation control system security.
NOTE: To only use Windows users, replace any existing standard users in the system with
Windows users. Disallow logins for standard users in Web Applications, this disables the
supervisor user.
NOTE: Network security equipment, such as firewalls, are complex devices and must be
maintained by trained individuals.
Decommission
Decommissioning removes PME files to prevent potential disclosure of sensitive, confidential and
proprietary data and software from your system. You risk disclosing your power system data,
system configuration, user information, and other sensitive information if you don’t decommission.
We strongly recommend you decommission your system at the end of its life.
WARNING
UNINTENDED EQUIPMENT OPERATION
Before decommissioning, verify that the system is not performing critical control actions that
may affect human or equipment safety.
Failure to follow these instructions can result in death, serious injury, or equipment
damage.
WARNING
INACCURATE DATA RESULTS
Before decommissioning, verify that the system data results are not used for critical decision
making that may affect human or equipment safety.
Failure to follow these instructions can result in death, serious injury, equipment
damage, or permanent loss of data.
Overwrite: Choose this if you still need to use your hard drives for other software. This method
uses a commercial tool to put random data in place of PME files on your hard drives.
IT Requirements
This section provides information on specifications and requirements related to information
technology (IT) components, such as computer hardware, operating environment, and
networking.
Use the links in the following table to find the content you are looking for:
Topic Content
Computer Hardware Computer types, CPU, RAM, and HDDs.
Operating Environment OS, DB server, Web browser, and other compatible software.
Required network shares, Windows domain compatibility, IPv6
Network connectivity
compatibility, and IP port requirements.
Other IT considerations Computer name limitations, display resolution.
Computer Hardware
The performance of a computer is determined by the following factors:
• Computer type (desktop, workstation, or server)
When choosing the computer hardware for your PME system, you need to consider the following:
• Number of devices in the system
NOTE: Undersized computer hardware is a common source of performance issues with PME
systems.
As a starting point for the selection of these components, we are defining two different system
categories, Basic Systems and Advanced Systems. Decide which category best describes
your system needs and then use the information provided in the tables below to define your
computer hardware specifications.
Basic Systems
A basic system is defined by any of the following characteristics:
• Factory default measurement logging (logging frequency ≥ 15 minutes)
• No custom applications
Desktop
Small ≤ 100 ≤5 Intel Core i5 (4 core)*
8 GB (RAM)
Workstation
≤ 250 ≤ 10 Intel Xeon Bronze (6 core)*
16 GB (RAM)
Medium
Server
≤ 600 ≤ 10 Intel Xeon Bronze (8 core)*
24 GB (RAM)
Server
Large ≤ 2500 ≤ 10 Intel Xeon Silver (10 core)*
32 GB (RAM)
RECOMMENDATION: If you use Microsoft SQL 2022, then the minimum RAM requirement is
16 GB.
Advanced Systems
An advanced system is defined by any of the following characteristics:
• Custom measurement logging with <15-minute intervals
• Large scale data exchange with third party systems (for example through OPC, ETL, or
EWS)
• Other resource intensive software systems installed on the same computer
RAM
Distributed
Distributed
Database
System OPC Computer Database
Devices Users Standalone architecture
Size Tags Hardware architecture
architecture -
- Database
Application
Server
Server
Workstation
Intel Xeon W-
Small ≤ 100 ≤ 15 5000 16 GB 16 GB 16 GB
21xx (4
Core)*
Server
Intel Xeon
≤ 250 ≤ 20 10000 24 GB 16 GB 24 GB
Bronze (8
core)*
Medium
Server
Intel Xeon
≤ 600 ≤ 35 30000 32 GB 24 GB 32 GB
Silver (10
core)*
Server
Intel Xeon
Large ≤ 2500 ≤ 50 50000 64 GB 32 GB 64 GB
Silver (12
core)*
Client Computers
Since all the data processing is done on the server, the client computer hardware
recommendations are the same for Basic Systems and Advanced Systems.
4 GB of RAM
• Web Client
2 GHz, Dual Core processor
4 GB of RAM
Storage Size
The data storage must have enough space for the different programs and applications that are
running on the computer. This includes space for the historical data that is recorded by the system
and some free space as a buffer.
The following table shows the estimated storage space that is required, without the historical data
logs. The estimates are rounded up and allow for updates and system maintenance.
It can be broken down into the following components, where ION_data.mdf size is the estimated
maximum size when PME is in steady-state:
Optionally, the component can include storage of archive database when data archive and / or
trim strategy is performed. For medium to large systems (250-2,500 devices), we recommend
you to perform data archive and / or trim strategy to support healthy database. See Archive and
Trim strategy for more information.
NOTE: Use the Database Growth Calculator tool to estimate the database size for 'n' years of
archive data. The tool is available through the Exchange Community. See Resources for link
information.
• 100% of the .mdf size is required for free space. The tempDB will occasionally expand to
100% of the total .mdf size, but not at the same time as a backup. If the backups and tempDB
are on different hard drive groups, each of them require x1 .mdf in hard drive space.
Unlike the system software, the historical database size is continuously growing. Its size and
growth can be estimated based on the amount of:
• Factory default measurement logging
Also, the database is configured to automatically grow by 10% when required to create room for
additional measurements. This growth operation can occur at any time and you need to consider
it in the database size calculations.
NOTE: Use the Database Growth Calculator tool to estimate the database growth for your
system. The tool is available through the Exchange Community. See Resources for link
information.
For optimum performance, minimize database auto-growth by configuring the database container
to the estimated maximum size after growth. During commissioning, use the Database Growth
Calculator tool to estimate the maximum ION_Data database size based on your data retention
policy, and configure the database container to the estimated maximum value. For example, if the
ION_data database file is estimated for 2 TB and above in container size then split the database
in to multiple files. For more details on how to set database container size and / or to add new files
to be database, see Increase the Size of a Database. You can view the size of the ION_Data
database using the Database Manager tool.
Storage Configuration
Storage drives can be configured as single drives or a number of separate drives. For a small
Basic Systems, a single drive is sufficient. For all other systems, we recommend that you divide
the data storage into different drives.
RAID Systems
In addition to separating the software components into different drive groups, redundant arrays
(RAID) can be used to improve performance and add simple redundancy. In a RAID 1
configuration, one drive is a complete copy of a second drive. If either of the two drives stops
operating, the other takes over without any data loss. The faulty drive can then be replaced to
restore the RAID configuration.
Group 0
Component
Drive 1+2
OS ü
tempDB ü
MDF ü
LDF ü
Backups and archive ü
4x Drive
Group 0 Group 1
Component
Drive 1+2 Drive 3+4
OS ü
tempDB ü
MDF ü
LDF ü
Backups and archive ü
6x Drive
8x Drive
NOTE: Plan for system growth by having a computer with space for additional drives. This
makes it easy to add additional storage as the system grows.
NOTE: It is possible to use other RAID configurations, such as RAID 0 or RAID 5. These
configurations are not discussed in this document.
Operating Environment
PME supports the following environments and software:
NOTE: The operating system and SQL Server combination you choose must be supported by
Microsoft. This applies to edition, version, and 32-/64-bit.
** PME includes a free version of SQL Server Express. You have the option to install this Express
version during the installation of PME, if you don't want to use a different SQL Server.
*** You must configure virtual environments with a supported Windows operating system and
SQL Server edition. It is possible to mix virtual and non-virtual environments for PME server and
clients.
Windows Updates
WARNING
POTENTIAL COMPROMISE OF SYSTEM AVAILABILITY, INTEGRITY, AND
CONFIDENTIALITY
Apply the latest updates and hotfixes to your Operating System and software.
Failure to follow these instructions can result in death, serious injury, equipment
damage, or permanent loss of data.
Critical and routine Windows Updates can be applied to the operating systems hosting the PME
server and clients without prior approval by Schneider Electric.
WARNING
UNINTENDED EQUIPMENT OPERATION
• Before installing the update, verify that the system is not performing critical control actions
that may affect human or equipment safety.
• Verify correct system operation after the update.
Failure to follow these instructions can result in death, serious injury, or equipment
damage.
WARNING
INACCURATE DATA RESULTS
• Before installing the update, verify that the system data results are not used for critical
decision making that may affect human or equipment safety.
• Verify correct system data results after the update.
Failure to follow these instructions can result in death, serious injury, equipment
damage, or permanent loss of data.
Localization
PME supports the following languages:
English, Chinese (Traditional and Simplified), Czech, French, German, Italian, Japanese, Korean,
Norwegian (Bokmål), Polish, Portuguese, Russian, Spanish, Swedish, and Turkish.
A non-English version of PME only supports an operating system and SQL Server of the same
locale. For example, a Spanish version of the product must be used with a Spanish version of
SQL Server and an operating system with a regional setting of Spanish.
The English version of PME can be used with a supported language, non-English operating
system and SQL Server as long as both have the same locale. For example, an English version of
the product can be used with a German version of SQL Server and an operating system with a
regional setting of German.
In addition, PME has the following limitations when used with SQL Server Express:
• Only supported for Standalone systems, not for Distributed Database systems.
NOTE: PME includes a free version of SQL Server Express. You have the option to install this
Express version during the installation of PME, if you do not want to use a different SQL Server.
Type Description
New SQL Server Standard PME requires a certain configuration of the SQL Server.
PME includes a free version of SQL Server Express. You have the
New SQL Server Express
option to install this Express version during the installation of PME.
Type Description
To use an existing instance of SQL Server Standard , the SQL
Existing SQL Server
Server setup wizard must be rerun to configure the software
Standard
correctly for use with PME.
Existing SQL Server The PME installer can add a new instance to an existing SQL
Express Server Express for use with PME.
NOTE: The operating system and SQL Server combination you choose must be supported by
Microsoft. This applies to edition, version, and 32-/64-bit.
NOTE: SQL Server clustering is only supported for Distributed Database systems, not for
Standalone systems.
Network connectivity
Network communication
The PME server, database server, and clients must be able to communicate with each other over
the network using TCP/IP protocol. The licensing component of PME requires that PME clients
and server can resolve each other’s address by name (not just fully qualified domain name or IP
address). If a proxy server is used on the network, then a local address bypass must be
configured on the PME server.
Network shares
Engineering Clients require that the Power Monitoring Expert folder on the PME server is
shared with full read and write permissions. File and Printer Sharing must be enabled.
Added as a Login in SQL Server with sysadmin role in the database instance.
• PME supports Windows Active Directory services for user account sharing.
IPv6 compatibility
PME supports IPv6 (and IPv4) for communications with metering devices. The software
components of PME require IPv4. That means PME can be used on computers with single stack
IPv4 or dual stack IPv4/IPv6 network adapters.
IP Port Requirements
PME uses certain ports for the communication between its components and the connected
devices. Which ports are required for a specific installation depends on the system configuration
and the monitoring devices used. See IP Ports for a list of relevant ports.
Other IT considerations
Internet Information Services (IIS) .NET Trust Level
The .NET Trust Level for PME web applications and Default Web Site must be set to Full
(internal), in IIS Manager. See IIS Application Pools for a list of PME web (ASP.NET)
applications.
NOTE: The computer name must not be changed after the PME software is installed. If the
computer name is changed after the install, the software ceases to function correctly. If that
occurs, contact Technical Support for assistance.
Display resolution
The minimum display resolution for PME user interfaces is 1280 x 960 pixels.
Device Networks
This section provides information on the communication links between the software and the
monitoring devices.
Use the links in the following table to find the content you are looking for:
Topic Content
Device network basics and the supported protocols and device
Device networks overview
types.
Network types Ethernet and serial communication networks.
Network performance Ways to improve the device communication performance.
Time synchronization Time synchronization on the monitoring device network.
Tools The Daisy Chain Calculator tool.
• Smart panels
• Modbus™ RTU
• ION™
• OPC DA
For a device to be compatible with PME, it must support one of these communication protocols.
Network types
The two basic types of communication networks for PME are Ethernet and serial.
Devices are configured in PME by providing fixed IP addresses (IPv4 or IPv6) and ports, or based
on host names. Host names must be used for devices with dynamic address assignment, for
example using the DHCP protocol. When host names are used in PME, then a host name
resolution mechanism is required by the external IT network.
Device communications are based on encapsulated Modbus or ION protocol and are not
encrypted. Bandwidth requirements per device are typically low, but depend heavily on the
amount and type of data requested from the device by PME.
Ethernet (TCP) networks are in many ways superior to serial networks and we recommend that
you use Ethernet (TCP) networks whenever possible.
NOTE: If you use an ION meter as a gateway, with Ethergate protocol, you lose the ability to
multi-master the serial devices.
Serial device communications are based on Modbus RTU or ION protocol and are not encrypted.
See Tools for information on how to design a serial network.
• The existing Ethernet (TCP) networks do not allow the connection of monitoring devices.
Ethernet (TCP) networks are in many ways superior to serial networks and we recommend that
you use Ethernet (TCP) networks whenever possible.
Network performance
Communications between the software and the devices consist of:
• On demand, real-time data requests, for example for Diagrams or Dashboards displays.
• Periodic polling and uploading of data logs, events, and waveform records.
To optimize the on demand and background polling performance, consider the following when
designing the system and the communication network:
• Real-time data polling periods should be set to meet the user needs. Do not poll with high
speed when it is not needed. Real-time data clients include Vista, Diagrams, OPC, VIP,
Trends, and EWS.
• Disable devices that are not presently commissioned or functional. This includes devices that
are inoperable, or that have a communication error rate >5%.
• Connect high-end devices with power quality monitoring features, such as the ION9000,
directly through Ethernet, not serial. These devices can generate large amounts of logged
data, such as power quality data, which requires a high bandwidth connection to the
monitoring software. If a direct Ethernet connection is not possible, then connect the devices
through small serial loops, with one or two devices per loop.
NOTE: Test the data upload performance when using high-end devices on serial networks.
Depending on configuration and operating conditions, it is possible for devices to have a
higher data generation rate than can be uploaded over a serial network.
NOTE: The ION9000T, a high-end power monitoring device with high speed transient
capture, will not upload high speed transient waveform data to the software if it is connected
through a serial connection.
• Setup the devices to only log those measurements that are needed to meet the user needs.
• Schedule the log uploads to occur at times when the system usage is low, for example during
night time or off hours.
• Use the Daisy Chain Calculator tool to determine the maximum number of devices in a serial
loop for your system. See Tools for more information.
• In most applications, Ethernet networks will provide a better performance than serial
networks.
Time synchronization
To maintain accurate time in the monitoring system, the devices must be time synchronized.
Depending on the synchronization mechanism, different levels of time accuracy can be achieved.
PME has the ability to synchronize devices to the PME server computer clock. This can be done
over serial networks and Ethernet networks.
The time synchronization to the computer clock using the regular communications protocols can
maintain a system time accuracy in the range of seconds. This is accurate enough for many
applications. However, for applications such as power event analysis or protection coordination
studies, that require high absolute and relative time accuracy, you need to use other time
synchronization methods for the devices, such as PTP or GPS time synchronization.
Tools
Use the Daisy Chain Calculator tool to design your serial communication networks. This tool helps
you estimate the communication utilization for serial daisy chains. You can use it for new system
design and for optimizing existing systems.
NOTE: The Daisy Chain Calculator is available through the Exchange Community. See
Resources for link information.
Use the links in the following table to find the content you are looking for:
Topic Content
Provides information on database maintenance and
System maintenance
recommended actions.
Provides information on disaster recovery and recommended
Disaster recovery strategy
strategy.
System maintenance
Once a PME system is installed and commissioned, it must be maintained on a regular basis.
Without periodic, proactive system maintenance, system performance degrades over time and
the system operates with poor performance (timeouts and sluggish response) and eventually
becomes unusable.
This section provides guidelines and recommendations for creating a maintenance schedule.
Proper adherence to the maintenance guide ensures a steady-state operation of a PME system.
This section does not detail troubleshooting system issues, but identifies the steps to develop a
maintenance plan that should allow for a commissioned system to continuously run at optimal
performance.
A maintenance plan keeps your PME system healthy. A comprehensive maintenance plan starts
in the system planning stage before commissioning. The plan should include frequent monitoring
and system reviews, and maintenance tasks to ensure the system is operating under healthy
conditions.
The following sections provide recommendations for developing your maintenance plan:
• Designing for maintenance
• Database maintenance
Size a system for the final state (for example: maximum devices, maximum logging
parameters, etc) to ensure that the system runs in a healthy state for a longer time. See IT
Requirements for recommended system sizing.
• Storage space allocation
Make sure there is enough hard drive space to perform database maintenance, archive and
trim operations. See Storage Performance and Availability for recommended hard drive
sizing.
• Disk I/O performance
Disk read/write operations impacts system performance. Plan to have different storage
devices installed for the system files, the database files, and the Microsoft Message Queuing
(MSMQ) files. See Choosing Data Storage for recommended storage information.
• Pre-size databases
By default, ION_Data database is configured with a 10% auto-growth parameter. This growth
operation can lead to a fragmented database and hard drive and can impact database
performance over time. To minimize the use of the auto-growth feature, pre-allocate hard
drive space for the ION_Data database during system commissioning, including systems
running SQL Server Express. See Database growth topic of System Guide for
recommendation on database growth.
• Database auto growth
For systems expected to have large ION_Data databases (> 100 GB), change the default
auto-growth setting to a fixed size rather than by percentage (Default is 10%). In this case, the
database auto-grows when the database exceeds the preset container size. This ensures
better control of database growth. Auto-growth events are expensive operations that slow
down the performance of your database. Take the following preventive steps to ensure your
auto-growth is in control:
Minimize future auto-growth events by monitoring the growth of your databases, and re-
establishing auto-growth settings when a database growth profile changes.
Monitor auto-growth events so you can be alerted when your databases grow.
See SQL Server Database Growth and Autogrowth Settings for more information.
Database maintenance
PME uses databases to store information such as system configuration, data logs, and system
event log messages. These databases must be maintained to preserve performance, manage
disk space usage, and guard against data loss in case of database failure. Maintenance is the key
to a healthy system that supports system longevity and future scalability. You must not ignore
maintenance. Non-maintenance may lead to system downtime and you might need to rebuild the
system from scratch.
NOTICE
LOSS OF DATA
• Back up the database at regular intervals.
• Back up the database before upgrading or migrating the system.
• Back up the database before trimming it.
• Back up the database before making manual database edits.
• Verify correct database behavior after making database or system changes.
Failure to follow these instructions can result in permanent loss of data.
Based on the key activities, see Consolidated recommendation for database maintenance.
Performance maintenance
For performance maintenance, enable and schedule the following daily maintenance tasks for all
PME systems of any configuration:
Maintenance Tasks*
Maintenance
Database Type of Data (update statistics Size
Trim**
and index Notification
defragmentation)
Web Applications related
ApplicationModules configuration data and ✓ ✓ –
system event log entries.
✓
NOTE: For
systems with
Historical power system SQL Server
data such as interval data Express,
ION_Data ✓ ✓
logs, waveforms and enable SQL
alarms. Express
Database
Size
Notification.
In Standalone PME systems, the database maintenance tasks are pre-configured and scheduled
to run automatically by default. For Distributed Database PME systems, you need to configure the
tasks and set up the schedules manually.
For more information, see the Database maintenance section in the Configuring chapter of this
guide.
For all systems, it is recommend to update database statistics daily. The following table shows the
default database maintenance task schedules for standalone systems:
In distributed systems, the database maintenance tasks are not pre-configured. You need to set
up these tasks manually.
These scheduled tasks trigger the DatabaseMaintenance.ps1 Windows PowerShell script. This
script executes the local [Maintenance].[UpdateStatisticsAll] stored procedure in each database.
Check the PME system logs and SQL Server logs to confirm that the scheduled tasks are
completed successfully. The log might report errors if an issue arises. As the database grows,
these jobs will take longer time to complete.
See Microsoft’s SQL Server documentation on SQL Server Query Statistics for more information
about query statistics.
For more information, see the Database maintenance section in the Configuring chapter of this
guide.
To minimize index fragmentation, monitor the fragmentation regularly and perform re-indexing.
In distributed systems, the database maintenance tasks are not pre-configured. You need to set
up these tasks manually.
These scheduled tasks trigger the DatabaseMaintenance.ps1 Windows PowerShell script. This
script executes the local [Maintenance].[ DefragIndexAll] stored procedure in each database.
Check the PME system logs and SQL Server logs to confirm that the scheduled tasks are
completed successfully. The log might report errors if an issue arises. As the database grows,
these jobs will take longer to complete.
Index fragmentation in ION_Data is unavoidable for large systems because of the amount of data
written to the system and queried on a regular basis. Index fragmentation is also common when
database reads exceeds database writes, that is, when PME is configured with added
components to move data from PME to another non-PME system.
For large systems, you need to monitor the index fragmentation daily. To monitor, run the
following SQL commands against the database:
• DBCC SHOWCONTIG
• sys.dm_db_index_physical_stats
Both the commands generate a report on index fragmentation. The time it takes to complete these
statements depend on the amount of data in the table and the level of fragmentation. The more
fragmented the index, the longer the query will run. You should expect the query to return results
within 1 to 20 minutes.
DBCC SHOWCONTIG
DBCC SHOWCONTIG displays fragmentation information for the data and indexes for specified
tables.
NOTE: This command applies to SQL Server 2008 to 2019 and is expected to be deprecated in
a future version of SQL Server.
GO
Review the output from DBCC SHOWCONTIG for the following three statistics:
Shows the accurate indication of how full your pages are. A high percentage means the pages are
almost full, and a low percentage indicates much free space. This value should be compared to
the fill factor setting specified when the index was created to decide whether or not the index is
internally fragmented. The fill factor is the percentage of space on each leaf-level page that
should be filled with data, and it is applied only when the index is created, rebuilt or reorganized. If
the Average Page Density and Fill Factor are close in value, then it would suggest that there is
little index fragmentation.
Scan Density:
Shows the ratio between the Best Count of extents that should be necessary to read when
scanning all the pages of the index, and the Actual Count of extents that was read. This
percentage should be as close to 100% as possible. Defining an acceptable level is difficult, but
anything under 75% definitely indicates external fragmentation.
Shows the ratio of pages that are out of logical order. The value should be as close to 0% as
possible and anything over 10% indicates external fragmentation.
sys.dm_db_index_physical_stats
sys.dm_db_index_physical_stats also returns size and fragmentation information for the data and
indexes of the specified table or view in SQL Server. This command is available in SQL Server
2005 or later.
For ION_Data, run the following commands to show fragmentation details for tables with more
than 100,000 rows and a fragmentation level of greater than 50%. Comment out the WHERE
clause to show results for all table indices. The output is sorted by fragmentation level from
highest to lowest.
USE ION_Data
GO
SELECT
DB_NAME(db_id()) AS DatabaseName,
OBJECT_NAME(object_id) AS TableName,
object_id,
index_id,
index_type_desc,
avg_fragmentation_in_percent,
fragment_count,
page_count,
avg_page_space_used_in_percent,
record_count
FROM
sys.dm_db_index_physical_stats(db_id(),DEFAULT, DEFAULT,
DEFAULT, 'SAMPLED')
WHERE
ORDER BY
avg_fragmentation_in_percent DESC;
When reviewing the output from sys.dm_db_index_physical_stats, review the values in the avg_
fragmentation_in_percent column. You should defragement the indexes, if the fragementation is
10% and above.
There are different corrective statements depending on the level of fragmentation. For PME,
select the statements as follows:
Fragmentation
Corrective Statement Remarks
Percentage
Reorganizing an index uses minimal
ALTER INDEX system resources and is an online
10 to 30%
REORGANIZE operation, which means PME can remain
online during this operation.
Rebuilding an index drops and re-creates
the index. Depending on the type of index
ALTER INDEX REBUILD and Database Engine version, a rebuild
> 30%
WITH (ONLINE = OFF) operation can be done online or offline.
For large indexes, it is recommended to
perform this operation offline.
See Resolve index fragmentation by reorganizing or rebuilding indexes for more information on
correcting index fragmentation.
Archive and Trim shortens the backup process by keeping only business critical data in the live
database and also reduces the resource demands in the disaster recovery efforts by shrinking the
database to backup and restore.
Archiving is not recommended since it fractures the data into multiple databases. PME is unable
to query multiple databases at the same time to make comparisons in the data. It is possible to run
reports against an archived database, but it can only be done on one database at a time.
However, the ION_Data database may need to be reduced in size for two reasons:
• SQL Server Express is used as the database engine, which has a limit of 10 GB for the .mdf
file.
• SQL Server (Standard or Enterprise edition) is used as the database engine and the ION_
Data database has become so large that query performance (in Vista for example) is not
acceptable to the PME system users. It is also important to ensure that the ION_Data
database is trimmed well within the hard drive size, as it can affect the operation of PME.
For PME systems with considerable database growth (medium to very large systems), it is
important to consider frequent removal of older and lesser used data from ION_Data. PME
includes an ION_Data data archive maintenance task by default. The database archive task is
pre-configured and disabled for standalone systems, while it must be manually added for
distributed systems.
When an ION_Data archive is created, it is attached to the SQL Server database engine so that
its data is still accessible to Vista and Diagrams. However, the data is not available to other
applications in the Web Applications component.
NOTE: Data archival in PME is different from the normal terminology of archiving. PME's archive
task does not remove data from the database, it only copies data to the archive. Once the data is
archived in PME, it cannot be re-imported back.
We recommend to manually trim the database of historical data after each archive task.
• Is it sufficient to review older data trends only through web reports or diagrams?
• What date range of data is needed for historical reporting – start and end dates?
In this example, archive data from start of Q4 Year 1 to end of Q1 Year 3 into the database
called ION_Data Archive Year 1. This results in a new archive database named ION_Data_
Archive_2017 containing data from 01 September 2016 to 01 April 2018.
• Backup the newly created archive database.
• Schedule the archive activity once per year starting at the end of Q1 of the current year.
NOTE: Archive the older year of data with an additional 3 months on each side of the year of
interest.
• After each successful archive, backup the newly created archive database.
• Schedule the trim activity to trim data in the last 3 months of the dataset from the main ION_
Data database.
• Schedule the trim to run every 3 months.
• When an archive database contains data older than 3 years, mark the archive database for
deletion.
• Delete the marked archive database after 12 months of non-use.
*See Database growth topic of System Guide for recommendation on database growth.
The recommended consolidated trim plan of ION_Data database for the different purpose of PME
system are as follows:
Run DBCC CHECKDB in SQL Server Management Studio on all PME related databases once
per month or quarter.
Check for errors reported in the output of DBCC CHECKDB. A database with integrity displays the
following at the end of the output.
CHECKDB found 0 allocation errors and 0 consistency errors in database
'ION_Data'.
• If the number of connected devices have increased over time, review hardware and hard
drive space requirements at least once per year to ensure server specifications meets
growing demand.
• Review the frequency of the ION_Data database maintenance task as the system grows.
Reduce the frequency from daily to weekly to monthly as the database grows and the
maintenance tasks (Update statistics and re-indexing) take longer to complete.
• Never shrink the database container; it causes fragmentation.
• Archive and trim the ION_Data database regularly and in batches, such as 3 to 12 month data
sets. Refer to Historical Data Archive and Trim Strategy for more information.
Large ION_Data databases require additional effort to maintain because all the maintenance task
might not run completely.
• Disable the ION_Data database maintenance task
If you plan to rebuild indexes, ensure that you have an equivalent amount of free space
as the database size.
• If ION_Data database increases over 100 GB unexpectedly, it can be due to following
reasons:
Database fragmentation can occur when there are more database read than database
write actions.
Power quality and / or waveform logging is enabled accidentally, then power quality data
increases.
More data points are logged than usual and frequent logging is performed.
• Defragmenting indexes may require a lot of free hard drive space to allow reindexing to
succeed. Review hard drive space requirements.
Frequent review of system health is to ensure optimal system health over the long term. This task
involves identifying and resolving potential issues. It is recommended to perform system health
checks at least once per month or quarter depending on the amount of data flowing into the
system and how often the system is used.
It is recommended to use the following approach to set up regular system health checks:
1. Determine which system health checks are appropriate. The following is a list of system
health checks appropriate for most of the PME system. Customized PME systems might
include additional checks or have some removed, however all system health checks listed
should be considered:
2. Identify and document how the above information can be collected for the system health
review. Note the following tools:
PME Diagnostic Tool - Install and deploy this tool to obtain a snapshot of the current
state of the system.
PME Diagnostics Viewer. See Diagnostics Viewer topic in System Guide for more
information.
3. Create a template system health report. This report should contain at least the following
information:
Report date
Contact information
A list of each system health check with the following information for each line item:
Recommended action
4. Determine a storage location for system health reports. Reports should be stored in a
consistent location and they should be accessible by administrators and support users.
6. In the location created in step 4, save the template report and the initial system health report.
The following table provides the information on list of system checks on why the check is required
and what you need to check:
Primary
• PhysicalDisk: Avg. Disk sec/Write
File system space used by 3rd party software. system growth. If found, take
growth preventive action to reduce the
The best preventive measure is to
risk of a full disk, that is, add more
track of the disk space usage and
disk space or adjust system
assess the growth over time. If the
configuration to reduce disk
used space for a disk has
space usage.
consistently increased for several
months and the percent free disk
space is below 30% then action is
required. Investigate the root cause
of the growth, and develop a plan to
either prevent more disk space from
being used or for more disk space to
be added.
• IIS Logs
• System recovery - The minimal state of the system that should be recovered after a disaster
and the acceptable limit of data and time loss.
Disasters can occur at any time and, if unprepared, such events can lead to data loss and service
disruptions. Factors leading to system disasters include:
• Inoperative hardware
• Database corruption, such as a database exceeding the maximum expected size or allowable
hard drive space
• Natural disasters (For example, earthquakes, fire, flood, storms, and so on)
• Backup plan
• Recovery plan
Developing the plan requires collaboration with the IT team, application champions
(administrators, power users) and recovery experts.
NOTE: If you have limited time and resource to define the strategy, you can consider third-party
products and services for assistance.
• What would be the result if an hour’s, day's or month's worth of analysis, reporting, alarming
and data were lost?
• What would be the result of a complete loss of the PME system?
If your system is not critical, you may decide the best strategy is a simple one where a new PME
system is redeployed in the event of a disaster and device data is re-imported and you experience
potentially irrelevant historical data loss. If your system is critical, you may develop a plan for a
quick recovery with minimal data loss.
You must set a written expectation of what constitutes an acceptable loss. Consider the following
questions:
• What is an acceptable level of data loss in your PME systems?
The answer to this question determines the Recovery Point Objective (RPO) objective. It is
the maximum amount of recent data the business can lose when a disaster strikes. It helps to
measure how much time can occur between your last data backup and the disaster without
causing serious damage to your business. RPO is used to determine how often to perform
data backups.
For example, your backup schedule is set to daily at midnight and a disaster occurs at 8 AM.
At the point of the disaster, you would have lost 8 hours’ worth of data. If your RPO is one day
of data then the loss of the last 8 hours of data is not an issue. However, if your RPO is one
hour of data, then you must revise your backup schedule to at least one backup per hour.
• What is an acceptable recovery time?
The answer to this question determines the Recovery Time Objective (RTO) objective. It is
the amount of time the business can survive without the system after a disaster and before
operations are restored to normal. It determines how quickly you need to recover the PME
system after a disaster.
For example, if your RTO is 24 hours, you can wait up to 24 hours before the system must be
available to users. If data and infrastructure are not recovered within 24 hours, the business
might be impacted.
• What level of disaster should we be prepared for?
Identify the possible disasters that could affect your PME system and the level of impact of
each disaster. For example: If your PME system is an on-premise solution, you should
prepare for disasters such as power loss, fire, flood, etc. If your PME system is hosted on off-
site servers in a data center, prepare for natural disasters but with low priority compared to
cybersecurity risks.
Ensure there is enough hard drive space to perform backup operations and take at least two
backup files. The spare hard drives can ensure minimal rebuild time. RAID arrays (commonly
used on all PME systems) can protect against disk damages. See Storage Performance and
Availability for recommended hard drive sizing.
• Backup power
UPS systems and redundant power supplies to servers can prevent server power
interruption.
• Connection redundancy
If available, redundant data links can protect critical data transmission when the
communication cannot be established in the network.
• Standby servers
With supporting infrastructure and cost, standby servers can provide another set of hardware
that can replace the PME system hardware in the event of an inoperative server. This
approach is valuable when PME is a critical system.
Backup plan
Creating backups are a key part of every PME deployment. A backup solution unique to the PME
deployment can be created based on the recovery objectives, the PME system, and available IT
resources. The backup plan should comprise:
• Components backup
• Backup frequency
Once you have a strategy with details, document the details and supporting processes. Whenever
a system or process change occurs, review and update this document. Store the document
outside of the PME server.
Components backup
The following table contains the components of a standard PME system that must be considered
for backup:
All PME databases should be backed up frequently and a full server backup should be taken upon
system configuration changes (for example, Vista diagrams, updating device drivers, registry
settings, VIP framework changes, and so on). Use Configuration Manager for performing the
backup. See Configuration Manager topic in System Guide for more information.
Complete database backup is taken and a restore can only be done up to the point when the
backup was taken.
• Full recovery model
Provides backup options such as differential, incremental, and transaction log. The restore
can be done using different options.
All PME databases are configured with the simple recovery model by default. The ION_Data
database recovery model should be updated to reflect your backup plan.
The recovery model is determined by comparing the disaster identification time with the backup
schedule. For example, as per the following diagram:
A system that is configured to have a single backup cannot be recovered. System is not accessed
by users over the weekend, and becomes inoperative such that the automated backup jobs are
still able to run. In this case, the backup would not be valid and there would be loss of the
complete PME system.
You can prevent this situation by setting the ION_Data database recovery model to Full, thus
allowing more refined backup options.
The key benefit of the full recovery model is that it can restore a database exactly to any point in
time since the last full backup was taken, including potentially to the point the disaster occurred,
resulting in no data loss. It should only be used if simple recovery is not sufficient to meet the
recovery needs as it incurs cost of performance and storage space.
Backup frequency
By default, PME is configured to backup the ApplicationModules and ION_Network databases on
a daily basis, while the ION_Data database is backed up once per week. This default
configuration assumes that meters installed throughout the network have onboard memory and
onboard logging enabled with a log of at least 14 days of data. This weekly frequency balances
the need for performance in steady state and disaster recovery preparation. Frequent transaction
log backups can lead to an unnecessarily bloated LDF file, which can cause performance issues.
If your PME system is critical, it is important to ensure you have a frequent backup strategy to
support quick recovery. In this case, the recommended practices are:
• Set the ION_Data database recovery model to Full
• Increase hard drive storage space by the 2 x size of a ION_Data.MDF file for the additional
transaction log backup files
• Keep the last 24 transaction log backup files on the server
The recommended backup configuration and frequency for PME and system database are as
follows:
Recovery Backup
Component Name Description
Model Frequency
PME Database ION_Network All Simple Daily
PME Database Application Module All Simple Daily
For systems with meters
PME Database ION_Data that have at least 14 days Simple Weekly
of onboard logging
For systems without
onboard logging or for
critical systems
Upon
PME Database ION_Data archive All Simple
creation
System Database master All Simple Daily
System Database model All Full As required
System Database msdb All Simple Daily
The recommended backup configuration and frequency for PME and system files are as follows:
• Backup “%PROGRAMFILES%
System Files SQL Server
Microsoft SQL Server” folder upon major system
changes (hotfixes and upgrades)
System Files Windows registry Monthly and after a significant system change
• Annually or upon significant system change
Store backups locally on a RAID protected drive for the shortest amount of recovery time.
Store a copy of backups on a centralized set of disks so you can recover the backups on
another server if the production SQL Server encounters a critical issue.
Store a copy of the backups off-site on external drives or in the cloud in case a site
disaster occurs.
• Set up automated processes to backup and move files to separate locations.
• Maintain a reasonable set of backups off site and outside of the PME servers. We
recommend the following backup retention strategy. Check with your legal team on keeping
certain amount of critical data in the event of a disaster.
10 daily backups
5 weekly backups
6 monthly backups
• Delete the old backup files on a regular basis in order to manage the storage cost.
When practicing the restore procedure, ensure that you restore to a different server and at a
different location.
Recovery plan
Backup files are worthless if they cannot be restored, so you must have a recovery plan with the
goal of getting a recovered PME system functional with minimum downtime and data loss. The
disaster recovery objectives and backup and archive strategies help create a recovery strategy.
The most important point to remember when creating a recovery plan is that it is not valid until it is
actually tested, and your recovery position is good as your last recovery test. Once you have a
recovery plan, allocate some time to test your disaster recovery strategy. Be aware of who is
executing the recovery as well. Do not assume that a specific person is available to restore the
PME system.
2. Identify the necessary hardware, software, backup and archive files and types (full,
differential, and log).
Ensure resources – physical (servers, software, network) and personnel – are allocated and
assigned, so they are readily available if a disaster strikes.
If you have a large recovery time window, such as 1 week, you may have enough time to
contact PME support team to assist in a recovery procedure. If you have a smaller time
window then any PME administrator (factoring in employee turnover) should be capable of
performing a restore, so this procedure should be well documented. At a minimum, all
backup and archive locations should be documented and accessible to any PME
administrator. Store the documentation outside of the PME production servers.
NOTE: Training PME administrators and / or support staff on PME disaster recovery may
be important to ensure you have redundant personnel available.
4. Schedule system downtime and test the restore procedure. This is a necessary step to
ensure the disaster recovery strategy is valid. Track the time the recovery procedure takes
to verify your time expectation for recovery is valid. Take corrective action for any areas
missed in your recovery documentation, backup, or archive strategies.
5. Progressively update recovery documentation after any major system changes are made
that changes the restore procedure.
NOTE: See SQL Server Limitations on Restoring System Databases in cases where a full SQL
server recovery is needed.
Reference
Use the links below to find the content you are looking for:
Cybersecurity Reference
Accounts and services
Databases
Configure database connection encryption
Database growth calculations
Adding idle detection to custom Web Application links
Diagnostics and Usage Services
Decommissioning Reference
IP Ports
Cybersecurity Reference
This section contains reference information related to cybersecurity.
Data encryption
At Rest
PME encrypts the passwords of its user accounts, as well as the Windows and SQL Server
accounts using SHA-512 and AES-256 cryptography. PME uses a unique encryption key for each
installation. The key is generated during the installation of PME. The PME installer offers
functionality for exporting/importing encryption keys for the installation of PME clients or system
upgrades.
The power monitoring data that is collected by PME, and system configuration data are not
encrypted.
In Transit
PME uses Transport Layer Security (TLS) 1.2 for an encrypted, authenticated connection using
HTTPS between the server and the web clients. Both self-signed and authority issued certificates
are supported. PME is installed with a self-signed certificate and a self-signed certificate is
configured automatically. We recommend that you replace this with a security certificates from a
Certificate Authority (CA).
The communication between PME and connected monitoring devices is not encrypted.
PME accounts
The following types of accounts are required for a PME system:
PME Users
A user account in PME provides access to the system. There are 3 different types of users -
standard users, Windows users, and Windows groups. Each user has an access level, which
determines the actions the user is allowed to perform in PME. There are no pre-configured user
accounts or user groups in the system. One supervisor account is created with a user defined
password during the installation of the software. Additional user accounts and groups must be
created manually after installation. PME supports Windows Active Directory integration for
Windows users and groups.
TIP: Use Windows users and groups to take advantage of Windows account security features
such as maximum login attempts or minimum password requirements.
If SQL Server Express is installed with SQL Server Authentication, through the PME installer, a sa
account with a unique, default password is created automatically during install. The password can
be changed at any time through SQL Server Management Studio.
PME Services
PME uses a number of services to perform the background server tasks. The services use the
Local Service and NT AUTHORITY\System accounts, or the Windows account used for Windows
Integrated Authentication, if that is configured.
Network shares
PME Engineering Clients and Secondary servers require that the Power Monitoring Expert
folder on the PME server is shared with change and read permissions. This file share must be
manually set up before installing Engineering clients or Secondary servers.
Session timeout
PME automatically times out inactive client sessions. Web Applications clients are logged out and
Windows application clients (Vista, Designer, Management Console) are locked after a period of
inactivity. The timeout period is configurable, it is set to 20 minutes by default.
To restart or unlock the session you must enter the login credentials. A session is considered
inactive, if none of the following actions are detected:
• Mouse movement
• Mouse click
• Keyboard activity
NOTE: If custom content links are added to the Web Applications framework, then the custom
content must either implement the idle detection, or activity on that content is not registered and
the web client session can time out unexpectedly. See Adding idle detection to custom Web
Application links for details.
Specify which web applications of PME needed to integrate with third-party systems based on the
generated links. The generated links are authenticated. This is configurable in the PME Web
Applications settings.
1. Right-click the file and select Properties. This opens the Properties dialog.
4. Verify that the digital signature is OK and that the signer name shows Schneider Electric.
Example:
* This account is only created on standalone servers where the SQL Server software and PME
are installed on the same computer.
NOTE: For information on which accounts are used to run the PME Windows services, see PME
Windows services and IIS Application Pools.
For installations using Windows Integrated Authentication, the following additional accounts and
permissions are required:
NOTE: When PME is installed with Windows Integrated Authentication, the Windows account
that is used to access the database is also used to run the PME services and the IIS Application
Pools.
Server
Login Authentication Database Membership
Role
AMUser SQL Public ApplicationModules AMApplicationRole
ApplicationModules db_owner
ION_Data db_owner
ION SQL Public
ION_Network db_owner
ION_SystemLog db_owner
ION_Data ION_DSD_Reader
ionedsd SQL Public
ION_Network NOM_DSD_Reader
db_backupoperator,
ApplicationModules db_ddladmin,
Maintenance
db_backupoperator,
ION_Data db_ddladmin,
Maintenance
IONMaintenance* Windows Public
db_backupoperator,
ION_Network db_ddladmin,
Maintenance
db_backupoperator,
ION_SystemLog db_ddladmin,
Maintenance
* This account is only created on standalone servers where the SQL Server software and PME
are installed on the same computer.
Server
Login Authentication Database Membership
Role
ApplicationModules db_owner
Account used for
ION_Data db_owner
Windows Integrated Windows Public
ION_Network db_owner
Authentication
ION_SystemLog db_owner
db_
backupoperator,
ApplicationModules
db_ddladmin,
Maintenance
db_
backupoperator,
ION_Data
db_ddladmin,
Maintenance
IONMaintenance * Windows Public
db_
backupoperator,
ION_Networks
db_ddladmin,
Maintenance
db_
backupoperator,
ION_SystemLog
db_ddladmin,
Maintenance
* This account is only created on standalone servers where the SQL Server software and PME
are installed on the same computer.
NOTE: When PME is installed with Windows Integrated Authentication, the Windows account
that is used to access the database is also used to run the PME services and the IIS Application
Pools.
Other
PME must have access to the master and tempdb System Databases.
The PME Database Manager tool requires that the Windows account that is used to run it has
sysadmin permissions on the PME SQL Server instance. The Database Manager is an optional
tool, used for managing the PME databases.
Startup Log On
Service Name Description
Type Account
Allows the Event Notification Module (ENM) to
ION Application read alarms directly from the ION_Data
Local
Modules Alarm Manual database.
System *
Services Host Starts on demand from other services (for
example, from the Event Notification Module).
ION Application
Modules Core Local Hosts common web services used by the Web
Automatic
Services Host (x32 System * Applications component.
bit)
ION Application Hosts web services that provide low-level
Modules Data Local access to system data (that is, real-time,
Automatic
Services Host (x32 System * historical, alarming, and authentication) for the
bit) Web Applications component.
ION Application Hosts web services that provide data
Local
Modules Provider Automatic processing for the Web Applications
System *
Engine Host (x32 bit) component.
Automatic
ION Cloud Agent Local
(Delayed Manages interaction with cloud services.
Service System *
Start)
Locates local and remote product components.
ION Component Local
Manual Starts shortly after startup by request of ION
Identifier Service Service *
Connection Management Service.
Determines the connection status of sites and
devices in the system, and handles allocation
of resources such as modems. This service
manages the state of site and device
connectivity for the system. In order to
ION Connection Local establish the most appropriate state for the
Manual system, each connection and disconnection
Management Service Service *
request is evaluated against the overall state of
the system and availability of communications
channels.
Startup Log On
Service Name Description
Type Account
Allows the Device Replacement Manager to
ION Device Local
Automatic read and process historical data directly from
Replacement System *
the ION_Data database.
Collects basic, non-identifying information from
the Power Monitoring Expert system and
ION Diagnostics and Local
Automatic uploads it to a secure location on the cloud for
Usage Service Service *
data mining by Schneider Electric. Customers
can opt-in or opt-out at any time.
ION Event Watcher Local Monitors system events for conditions specified
Automatic
Service Service * in Event Watcher Manager.
Provides historical data collection for the power
Automatic
ION Log Inserter Local monitoring system (that is, devices and Virtual
(Delayed
Service Service * Processor), and stores it in the ION_Data
Start)
database.
Automatic
ION Log Subsystem Local Transfers data received from power monitoring
(Delayed
Router Service Service * devices to storage and processing.
Start)
This service is used to create individual real-
ION Managed Circuit Local
Automatic time and historical data sources for multi-circuit
Service Service *
meters.
Routes all ION requests between the software
components, such as client workstations, the
Real Time Data Service, Log Inserter, and the
ION Network Router Local Query Server. The service dynamically detects
Automatic
Service Service * changes to the network configuration, including
the addition of new servers. It can also
recognize new software nodes, such as Vista,
that are added to an existing server.
Serves real-time OPC data (OPC DA) to OPC
client applications.
ION OPC Data Local
Manual Starts on an OPC client request for data, if the
Access Server Service *
Data Exchange Module license has been
activated.
Translates power quality data from the ION_
ION PQDIF Exporter Local
Manual Data database into PQDIF file format and
Service Service *
manages scheduled PQDIF exports.
Provides historical data retrieval from the ION_
Local
ION Query Service Automatic Data database for client applications (for
Service *
example, Vista and Diagrams).
Startup Log On
Service Name Description
Type Account
Manages and provides access to real-time data
ION Real Time Data Local
Automatic for all client applications (Vista, Diagrams,
Service Service *
Trends, and so on).
Startup Log On
Service Name Description
Type Account
Stores XML data subscriptions for the power
ION XML
Local monitoring devices on the network. This
Subscription Store Automatic
Service * service is used only by the Diagrams
Service
application.
Provides storage, processing and controlled
access of data, and rapid transaction
Local
SQL Server (ION) Automatic processing for the ION_Data, ION_Network,
System
ION_SystemLog, and the ApplicationModules
databases.
ION Application
Local Hosts common web services used by the Web
Modules Core Automatic
System (x64 bit) Applications component.
Service Host (x64 bit)
ION Application Hosts web services that provide low-level
Modules Data Local access to system data (that is, real-time,
Automatic
Service Host (x64 bit) System historical, alarming, and Authentication) for the
Web Applications component.
ION Application Hosts web services that provide data
Local
Modules Provider Automatic processing for the Web Applications
System
Engine Host (x64 bit) component.
* When PME is installed with Windows Integrated Authentication, the Windows account that is
used to access the database is also used to run the PME services.
Web
ION
Web Services
ModelingConfig
Web Reporter App Pool NetworkService *
reporter
* When PME is installed with Windows Integrated Authentication, then the Windows account that
is used to access the database, is also used to run the IIS Application Pools, instead of the Local
System account.
NOTE: The .NET Trust Level for PME web applications and Default Web Site must be set to Full
(internal), in IIS Manager.
Databases
PME Databases
Power Monitoring Expert uses four databases to store device communication parameters, system
configuration settings, and logged historical data.
ION_Network database
Sometimes called the NOM (Network Object Model), the ION_Network database stores device
information, such as, device name, device type and connection address (for example, IP address
and TCP/IP port or device/Modbus ID). It also contains information about the optional Application
Module settings, other ION Servers, Sites, Dial Out Modems, and Connection Schedules. There
is only one ION_Network per system.
ION_Data database
The ION_Data database contains the historical data, events and waveforms from devices
connected to the system. This includes: onboard logging configured on devices; and, PC-based
logging configured in the device translators and the Virtual Processors.
• Plus many other Warnings and Errors relating to PME system functions.
Archive
Database archiving copies older data from the operational database into a separate, new
database. The goal of archiving is to keep data safe for future reference. Data is typically archived
based on calendar time intervals, for example by month or by year.
The PME archive task creates a new archive database each time the task is run. Each new
archive database is attached to SQL server and is available to be accessed by PME.
NOTE: The PME archive task does not trim data from the operational database; it only makes a
copy of the archived data, leaving the original data in the operational database. See
Considerations for trimming archived data from ION_Data for important information on this topic.
Backup
Backing up a database creates a copy of the operational database. The goal of a backup is to
have an identical duplicate of the operational database that can be used to restore the system in
case the operational database becomes nonfunctional. Database backups should be created on
a regular basis, for example daily or weekly.
Maintenance
The PME database Maintenance task defragments the database and updates the database
statistics. The goal of these activities is to maintain database performance. Maintenance tasks
should be run on a regular basis, for example daily.
Size Notification
The size notification task is used to monitor the size of the database and to notify users when a
certain size threshold is reached. When the size threshold is reached, the task logs a system log
event message and triggers a Critical alarm in PME every time the task runs.
NOTE: The Size Notification task is only configured for systems using SQL Server Express,
which has a maximum database size limitation of 10 GB.
Trim
Trimming a database deletes data from the database. The goal of trimming is to prevent the
database from growing to a size that could affect system performance. Databases should be
trimmed on a regular basis, for example daily or weekly. For PME only the system log databases
are trimmed.
• The database drive is low on available free space and you cannot switch to a larger drive.
When you trim data from an SQL database, the database file size remains unchanged. After the
trim, the database will first fill the new free space before growing the database file size again. To
reduce the database file size after trimming, Shrink the database, using standard SQL Server
tools.
NOTE: The PME archive task does not trim the database; it only copies data to the archive.
• must have the following Windows policy settings: Log on as a batch; Deny log on locally.
• must have the following role memberships for the PME databases (ION_Data, ION_Network,
ION_SystemLog, ApplicationModules):
db_backupoperator
db_ddladmin
Maintenance
public
NOTE: You will need the password for this account during the initial task setup, and later if you
want to edit the tasks in Task Manager in the future.
Database maintenance
PME uses databases to store information such as system configuration, data logs, and system
event log messages. These databases must be maintained to preserve performance, manage
disk space use, and guard against data loss in case of database failure.
NOTICE
LOSS OF DATA
• Back up the database at regular intervals.
• Back up the database before upgrading or migrating the system.
• Back up the database before trimming it.
• Back up the database before making manual database edits.
• Verify correct database behavior after making database or system changes.
Failure to follow these instructions can result in permanent loss of data.
The following table shows the PME databases and the recommended database maintenance
tasks for each:
In Standalone PME systems, the database maintenance tasks are pre-configured and scheduled
to run automatically by default. For Distributed Database PME systems, you need to configure the
tasks and set up the schedules manually.
NOTE: It is best to automate the maintenance tasks, but you can run them manually on demand
using Database Manager and Microsoft SQL Server Management Studio.
The following table shows the default database maintenance task schedules for Standalone PME
systems:
* The PME archive task does not trim the database, it only copies data to the archive.
** You need to edit the Windows user account settings before enabling the archive task. See the
Note on the ION_Data archive task for more details.
*** Size Notification is only used for systems with SQL Server Express, which has a maximum
database size limit of 10 GB.
For more information on the default task settings see Default maintenance task settings.
NOTE: The archive task for the ION_Data database is disabled by default. The Windows user
account that is used to run this task must have a sysadmin server role in the SQL Server
database server. The Windows user account that is used by default, IONMaintenance, does not
have a sysadmin server role. To enable and run the scheduled archive task successfully, you
need to add the sysadmin role to IONMaintenance, or change the user account that is used to
run this task to an account with sysadmin role. See Database maintenance account
requirements for more information on account requirements.
To edit the task schedule settings (enable or disable tasks, set trigger times):
NOTE: The database maintenance tasks in Task Scheduler are configured to run using the
IONMaintenance Windows user account. To save any changes to the task settings in Task
Scheduler, you need to enter the password for the IONMaintenance account. See Using
IONMaintenance for database maintenance tasks for information on where to find the password.
2. In the Task Scheduler Library, open the Schneider Electric > Power Monitoring Expert
folder to see the configured database maintenance tasks.
b. To edit task settings, double-click a task and make the desired changes in the Job
Properties dialog box.
4. (Optional) Select Enable All Tasks History in the Actions pane in Task Scheduler. This
turns on event recording for the scheduled tasks, which is useful for auditing and
troubleshooting.
To edit the task script settings (change backup and archive location, set the data to keep on trim,
size notification threshold):
2. Change the values of the variables in the script file for the settings you want to change. The
following settings can be customized:
NOTE: Follow the instructions in the script file on formatting and syntax.
3. Save the script file changes and close the text editor.
NOTE: The following sections describe how to set up the different database maintenance tasks,
except for the archive task for ION_Data. See Setting up the ION_Data archive task for
Distributed PME systems for instructions on how to set up this task.
Step 1: Creating a Windows user account to run the maintenance tasks. See Database
maintenance account requirements for more information on the account requirements.
NOTE: This requires downloading the framework installer from Microsoft or copying it from the
PME installation DVD/ISO.
NOTE: This requires copying files from the PME application server to the database server.
1. On the database server, create a new Windows user as a member of the Users group, for
example PMEMaintenance.
NOTE: You will need the password for this account during the initial task setup, and later if
you want to edit the tasks in Task Manager in the future.
3. In the Local Security Policy tool, open the policy settings list in Security Settings > Local
Policies > User Rights Assignment.
4. Add the new Windows user to the following policies: Deny log on locally and Log on as a
batch job.
7. Add the new Windows user as a database Login with the following roles and mappings:
Database Role
ApplicationModules db_backupoperator; db_ddladmin; Maintenance; public
ION_Data db_backupoperator; db_ddladmin; Maintenance; public
ION_Network db_backupoperator; db_ddladmin; Maintenance; public
ION_SystemLog db_backupoperator; db_ddladmin; Maintenance; public
NOTE: You will need the password for this account if you want to edit the tasks in Task Manager
in the future, after the initial setup.
1. Check if the framework is already installed on the database server. To do this, find the
following registry key: HKEY_LOCAL_
MACHINE\SOFTWARE\WOW6432Node\Microsoft\Microsoft SQL Server\.
If this key includes a Data-Tier Application Framework key, then the framework is
installed. Continue with Step 3 - Installing and configuring the Windows PowerShell script
files
If this key does not include a Data-Tier Application Framework key, then the framework is
not installed. Continue with the installation of the framework.
NOTE: You can also find the framework installer (DacFramework.msi) on the PME
DVD/ISO under Setup\SetupSupport\database.
1. On the database server, create a new folder. You can choose the location and folder name,
for example C:\PME_Database_Maintenance.
4. Change the values of the folder path variables in the script file to the new folder path as
follows:
a. Change the value of $customUserDirectory (line 28 in the script) to <New Folder
Path>\dbScheduledTasks\Support, for example C:\PME_Database_
Maintenance\dbScheduledTasks\Support. The default value is
C:\PMEDBs\dbScheduledTasks\Support.
c. (Only if you are using Windows Integrated Authentication) Change the value of
$pmeUsingIntegratedAuth (line 32 in the script) to 1. The default value is 0.
7. Change the value of the backup and archive folder path variables in the script file to the new
folder path as follows:
a. Change the value of $locationForBackupFiles (line 46 in the script) to <New Folder
Path>\Backups\, for example C:\PME_Database_Maintenance\Backups\. The
default value is ..\Database\Backup\.
8. Save the script file changes and close the text editor.
2. (Optional) In the Task Scheduler Library, create a new folder for the PME database
maintenance tasks, for example Task Scheduler Library > Power Monitoring Expert.
NOTE: For setting up the archive task for ION_Data, see Setting up the ION_Data archive
task for Distributed PME systems
Use the following information to create the tasks. Replace the variables with the specific
settings shown in the task settings table below.
Name: <task_name>
Security options: Set the Windows user account created in Step 1 to run the task.
Security options: Select Run whether user is logged on or not.
Trigger: <trigger_time>
Action: Select Start a program.
Action: Program/script:
C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe
Action: Arguments: -noninteractive -nologo -file "<New Folder
Path>\DbScheduledTasks\<script_name>" -DatabaseIdentifier <DB ID>
NOTE: Valid settings for the <task_name>, <trigger_time>, <script_name>, and <DB ID>
variables are given in the Task Settings table below.
NOTE: The task names and trigger times shown in the table are recommendations. You
can choose different names or triggers if necessary.
Task Settings
Task Name: [ApplicationModules] - Backup - Job
ApplicationModules
Trigger Time: Daily at 01:30 (1:30 AM)
backup
Action: Arguments: Script Name: Backup.ps1, DB ID: APPS
Task Name: [ApplicationModules] - MAINTENANCE - Job
ApplicationModules
Trigger Time: Daily at 03:30 (3:30 AM)
maintenance
Action: Arguments: Script Name: DatabaseMaintenance.ps1, DB ID: APPS
Task Name: [ApplicationModules] - TRIM - Job
ApplicationModules
Trigger Time: Daily at 02:30 (2:30 AM)
trim
Action: Arguments: Script Name: TrimDiagnostics.ps1, DB ID: APPS
Task Name: [ION_Data] - BACKUP - Job
ION_Data backup Trigger Time: Weekly at 00:00 (12:00 AM) on Fridays
Action: Arguments: Script Name: Backup.ps1, DB ID: ION
Task Name: [ION_Data] - MAINTENANCE - Job
ION_Data
Trigger Time: Daily at 02:00 (2:00 AM)
maintenance
Action: Arguments: Script Name: DatabaseMaintenance.ps1, DB ID: ION
Task Name: [ION_Network] - BACKUP - Job
ION_Network backup Trigger Time: Daily at 01:00 (1:00 AM)
Action: Arguments: Script Name: Backup.ps1, DB ID: NOM
Task Name: [ION_Network] - MAINTENANCE - Job
ION_Network
Trigger Time: Daily at 07:30 (7:30 AM)
maintenance
Action: Arguments: Script Name: DatabaseMaintenance.ps1, DB ID: NOM
Task Name: [ION_SytemLog] - MAINTENANCE - Job
ION_SystemLog
Trigger Time: Daily at 07:05 (7:05 AM)
maintenance
Action: Arguments: Script Name: DatabaseMaintenance.ps1, DB ID: SYSLOG
Task Name: [ION_SytemLog] - TRIM - Job
ION_SystemLog trim Trigger Time: Daily at 04:00 (4:00 AM)
Action: Arguments: Script Name: TrimDiagnostics.ps1, DB ID: SYSLOG
To edit the task script settings (for example to change the backup and archive location or to set
the amount of data to keep in the database on trim), open the Configuration.ps1 script file, as
described in Step 3 and change the values of the variables.
Configurable variables in Configuration.ps1:
NOTE: It is best to automate the archive task, but you can also run it manually on demand using
Database Manager.
NOTE: You can use the same Windows user account (created in Step 1) that is used for
other scheduled PME database maintenance tasks to run the archive task. You can also
create a new account that is only used for the archive task, because only this task requires
sysadmin role privileges on the database server (see next step).
2. On the database server, open SQL Server Management Studio and add the sysadmin
server role to the Windows user account created in Step 1. This account is used to run the
archive task; it needs sysadmin permissions to create new archive databases.
3. On the database server, in the folder created in Step 3, create a subfolder called etc and
inside this folder a subfolder called Database, for example C:\PME_Database_
Maintenance\etc\Database.
6. (Optional) In the Task Scheduler Library, create a new folder for the PME database
maintenance tasks, if it does not already exist. For example, Task Scheduler Library >
Power Monitoring Expert.
NOTE: The task name and trigger time shown above are recommendations. You can
choose a different name or trigger if necessary.
8. (Optional) Manually run the archive task to verify its correct operation.
To change the archive location, open the Configuration.ps1 script file, as described in Step 3
in Setting up database maintenance tasks for Distributed PME systems and change the value of
the variable:
Task Scheduler, you need to enter the password for the IONMaintenance account. By default, the
password for the account is generated automatically by the installer and cannot be retrieved. To
have access to the password, you need to set a custom password for this account.
To set a custom password for IONMaintenance, run the PME installer in maintenance mode and
select Reset Accounts to start the account password reset procedure. Follow the installer
instructions to reset the password.
NOTE: If you set a custom password for the Windows Accounts during the installation of PME,
then this is the password used by IONMaintenance and you can use this password to make
changes to the task schedules in Task Scheduler.
NOTE: IONMaintenance shares the same password with IONUser, another account that is
generated automatically by the installer and which is used for report subscriptions.
NOTE: If you change the password for the Windows accounts, the password you are providing
must comply with the password policies of the Windows server and the SQL server. The
software installer cannot validate the password at the time you enter it. If the password is not
valid, the password reset and reconfiguration will not be successful. In that case, complete the
reconfiguration, skipping any unsuccessful steps.
Database Manager
Use Database Manager to manually perform operations on the Power Monitoring Expert
databases.
NOTICE
LOSS OF DATA
• Back up the database at regular intervals.
• Back up the database before upgrading or migrating the system.
• Back up the database before trimming it.
• Back up the database before making manual database edits.
• Verify correct database behavior after making database or system changes.
Failure to follow these instructions can result in permanent loss of data.
NOTE: Database Manager does not include manual database operations on the Application
Modules database (ApplicationModules). In a disaster recovery situation or when directed by
Technical Support, the Application Modules database can be restored by using the Restore
database function in the SQL Server Management Studio. See Restoring a database for further
information about this operation. ION databases can be restored using the same process.
Prerequisites
The following user prerequisites need to be met to work with Database Manager and database
functions through SQL Server Management Studio:
• For Database Manager: Since Windows authentication is used to access the SQL Server
databases, the user needs to be a member of the sysadmin SQL Server role, which is set in
SQL Server Management Studio.
• For most database functions available in SQL Server Management Studio: The user needs to
be a member of the sysadmin SQL Server role.
NOTE: If the Windows user that you used to log into the system is not a member of the sysadmin
role, and you want to run Database Manager, you can do so without logging out by completing
the following steps:
2. Locate DatabaseManager.exe.
3. Click the EXE file name to highlight it, then press Shift+Right-click to open the menu.
5. In the User name field, type a user name that has the sysadmin role, then type the
password for that user.
Expand the items in the navigation tree to display the Databases for each instance.
Note that scheduled jobs are available only in Windows Task Scheduler. For further information,
see Database maintenance.
The default SQL Server instance that the product uses for its databases is
COMPUTERNAME\INSTANCE, where COMPUTERNAME is the name of the server, and INSTANCE is
the SQL Server instance used with the product.
Databases
The Databases section lets you view information about the databases or perform manual actions
on the databases.
For information on the manual actions you can perform, see Manual actions.
• Primary File Location: The file path for the primary database (.mdf) file.
• Transaction Log Location: The file path for the transaction log (.ldf) file.
• Creation Date: The date and time when the database was created.
• Last Backup Date: The date when the last backup was performed.
• Disk Space Available: The amount of free space available on the disk where the database
resides.
• Server Version: The type and version of the SQL Server instance that is hosting the
database.
Show archives
Select this check box (lower left-hand corner) if you want the list under Databases to include all
archived databases along with the live databases. After Show Archives is selected, you can
upgrade archived databases or view the properties of the archived databases.
Clear the Show Archives check box to hide the archived databases from view. This also
prevents the database actions from being performed on database archives.
Manual actions
The following sections provide information on the manual actions that you can use to manage
your databases.
To perform an action manually, do one of the following:
• Right-click Databases and select the action from the menu, or
• Right-click the specific database and select the action you want to perform from the pop-up
menu.
When you right-click Databases and select an action, a dialog specific to that action opens. The
databases listed in the dialog are those to which the action applies.
When you right-click a specific database, only the actions that apply to that database appear in
the menu and the database is selected by default in the dialog for the action.
Archive
The Archive action creates an archive of the selected database.
Before proceeding, ensure that you have write access to the archive directory location.
1. Right-click Databases or ION_Data and select Archive to open the Database Archive
dialog. If necessary, select the database that you want to archive.
a. In Save archive to, click the browse button to select the directory where the archive
will be saved.
NOTE: You can only save an archive to a directory on the local machine, not to a
location on the network.
c. (Optional) Edit the default archive filename to follow your naming conventions.
NOTE: The database name is restricted to characters A-Z, a-z, 0-9, and _
(underscore).
NOTE: The database name is restricted to characters A-Z, a-z, 0-9, and _
(underscore).
4. Specify the date range of the data that you want to archive. For Start, select The beginning
of the database or select Date and enter a date and time. Enter a date and time for End
Date.
5. Under Trim after archive select whether or not you want to remove archived data from the
database.
You need to select The beginning of the database for the start date range for trimming the
live database, otherwise the Trim after archive option is disabled.
6. Click OK.
The Progress field displays the current progress of the archive process. If a manual archive does
not succeed, a message appears and the Database Archive dialog remains open with the OK
button grayed out — examine the Progress field to discover where the process did not succeed.
If the archive is successful, the dialog closes automatically.
1. Right-click Databases and select Export Registry Setting to open the Database Registry
Key Export dialog.
2. Type the path and filename for the file or click the browse button to specify the location
for the saved the database registry key.
The directory ...\Power Monitoring Expert\config\cfg\ is the default save location for the
exported database registry key.
3. Click OK.
1. Right-click Databases and select New ION_Data Database to open the New Historical
Database dialog.
NOTE: Do not name it “ION_Data” as this is the default name for the existing ION
database. Database names are restricted to characters A-Z, a-z, 0-9, and _ (underscore).
4. Click OK.
Trim
The Trim action removes data from a database.
NOTICE
LOSS OF DATA
• Back up the database at regular intervals.
• Back up the database before upgrading or migrating the system.
• Back up the database before trimming it.
• Back up the database before making manual database edits.
• Verify correct database behavior after making database or system changes.
Failure to follow these instructions can result in permanent loss of data.
1. Right-click Databases, ION_Data or ION_SystemLog and select Trim to open the Trim
Database dialog.
2. Select the database you want to trim from the Database to trim list.
3. Under Trim Range, specify the date range of data you want to trim (for the ION_Data
database) or set the maximum data age in days (for the ION_SystemLog database).
4. For the ION_Data database, select the data types you want to trim (Data Records,
Waveforms, Events) in the Data Types section. You can select any combination of data
types to trim.
5. Click OK. A message appears to notify you that the selected data will be removed. Click Yes
to continue or No to cancel.
Upgrade Database
The Upgrade Databases action upgrades the selected database to the latest database schema.
1. Right-click Databases and select Upgrade Databases to open the ION Database
Upgrade dialog.
The Power Monitoring Expert installer automatically upgrades your databases with the new
database schemas when you install Power Monitoring Expert on an existing server. If you
install the latest version of the product on a different server so that you can manually copy
older database files to the new computer, you can run this action on the older databases
(that is, on the ION_Data, ION_SystemLog, and ION_Network databases, and archives) to
upgrade them with the new schema.
2. Select the database in the list that you want to upgrade and click OK.
Restoring a database
You can restore a database from a backup by logging in to SQL Server Management Studio as a
user with syadmin access authority for the Restore Database function. (Database backups are
specified as a scheduled job in Windows Task Scheduler. See Database maintenance for more
information.)
2. Open SQL Server Management Studio, enter your password if required and click
Connect to access your SQL Server.
3. In the Object Explorer pane on the left, expand Databases, right-click the database you
want to restore and click Tasks > Restore > Database to open the Restore Database
dialog.
4. Under Source, select Database and click the database you want to restore in the dropdown
list if it is not already selected.
5. Under Backup sets to restore, select the checkbox in the Restore column for the
database you want to restore.
For Recovery state, select RESTORE WITH RECOVERY from the dropdown list.
A message indicates that the database has been restored successfully. If the restore
operation is not successful, the database reverts to its original state.
NOTE: After you restore the database, you need to assign its ownership to the ION user as
follows:
a. In SQL Server Management Studio, right-click the restored database and click
Properties in the menu to open the Database Properties dialog.
c. Click the button on the right of the Owner field to open the Select Database Owner
dialog.
d. Type ION in the field labeled Enter the object names to select and click Check
Names to adjust the format of your entry to [ION].
2. Under Source, select Device and click Browse to open the Select backup devices dialog.
3. Select File in Backup media type list if it is not already specified and then click Add to open
the Locate Backup File dialog.
4. Navigate to and select the backup file you want to restore and click OK.
5. Verify that the file referenced in the Specify Backup dialog is the one you selected and click
OK to return to the Restore Database dialog.
6. Under Select the backup sets to restore, select the checkbox in the Restore column for
the database you are restoring.
Under Recovery state, select RESTORE WITH RECOVERY from the dropdown list.
A message indicates that the database has been restored successfully. If the restore
operation is not successful, the database reverts to its original state.
NOTE: After you restore the database, you need to assign its ownership to the ION user as
follows:
a. In SQL Server Management Studio, right-click the restored database and click
Properties in the menu to open the Database Properties dialog.
c. Click the button on the right of the Owner field to open the Select Database Owner
dialog.
d. Type ION in the field labeled Enter the object names to select and click Check
Names.
NOTE: Before editing the settings in the registry, confirm that your PME system has been taken
out of service and that all system services have been stopped.
To configure the software to trust or not trust self-signed certificates on the database server:
Example
NOTE: Use the Database Growth Calculator tool to estimate the database growth for your
system. The tool is available through the Exchange Community. See Resources for link
information.
The following shows the database growth estimate for logging of a single measurement every 15
minutes:
NOTE: Use the Database Growth Calculator tool to estimate the database growth for your
system. The tool is available through the Exchange Community. See Resources for link
information.
NOTE: Use the Database Growth Calculator tool to estimate the database growth for your
system. The tool is available through the Exchange Community. See Resources for link
information.
Prerequisite: The custom application must be in the same Application Pool as the regular PME
applications, and must use the same authentication configuration.
NOTE: If you want your application to take part in keeping PME non-idle, but you do not
want your application to log itself out after the idle period, you can add the following JSON
as a parameter to the idle() method: {enableLogoutRedirection: false;}
The diagnostics and usage service collects and sends data to Schneider Electric weekly on
Monday at 2:00 a.m. (server time), over HTTPS at port 443. Each time the service runs, it creates
a log file in the system\bin folder in the Power Monitoring Expert install location.
NOTE: All diagnostics and usage data are sent to Schneider Electric anonymously. None of the
collected information identifies you or your company. For more information on the Schneider
Electric Privacy Policy, see the Schneider Data Privacy and Cookie Policy.
• City or region
• Screen DPI
1. Open Web Applications and click Settings > Registration & Analytics > Diagnostics and
Services.
2. Select Disable in the dropdown list and click Save to apply the change.
Decommissioning Reference
This section contains detailed instructions for decommissioning your system. For an overview,
see Decommission.
NOTICE
UNINTENDED DATA LOSS OR LOSS OF SOFTWARE FUNCTION
• Only decommission PME systems that are no longer needed.
• Archive important PME data and files before decommissioning. You cannot recover,
reinstall, or otherwise retrieve any part of PME after decommissioning.
Failure to follow these instructions can result in irreversible damage to software and
databases.
You must decommission PME on all PME Servers, Database Servers, and PME Clients.
Decommissioning does not completely restore your computers to the state they were in before
PME was installed. Decommissioning does not remove third-party software used by PME (for
instance, the .NET framework), even if this software was installed using the PME installer.
NOTE: Decommissioning will not remove PME data that has been exported from PME or PME
information in third-party software. This includes, but is not limited to:
• Data exported to other systems using EcoStruxure Web Services (EWS), OPC DA server,
ETL, ODBC, PQDIF or VIP.
• Registration information shared with Schneider Electric.
• Files or data copied, backed-up, exported, or otherwise saved to a file location other than
the PME folder.
Destroy
WARNING
HAZARD OF PHYSICAL INJURY
• Do not destroy hard drives without the proper safety training.
• Never burn a hard drive, put a hard drive in a microwave, or pour acid on a hard drive.
Failure to follow these instructions can result in death or serious injury.
NOTE: If you do not have the proper safety training, consult your IT department to select an
asset disposal company.
1. Identify all computers where PME is installed. In a Distributed Database architecture, this
includes all PME Servers, Database Servers, and PME Clients.
2. Remove all hard drives from the computers identified in the previous step.
Overwrite
NOTICE
UNINTENDED DATA LOSS OR LOSS OF SOFTWARE FUNCTION
• Only overwrite files and folders from PME.
• Back up important files from other software before overwriting PME.
Failure to follow these instructions can result in irreversible damage to software and
databases.
To overwrite PME:
1. Open the Windows Control Panel and select Programs and Features.
2. Uninstall PME.
3. Select and install a data destruction tool. There are many commercial and open-source data
destruction tools available. Consult your IT department if you are unsure about which tool to
choose.
b. In the Object Explorer pane on the left, expand Databases, right-click the database
archive you want to detach and click Tasks > Detach… to open the Detach Database
dialog.
5. Locate your PME folder under Program Files. The PME folder contains the following
subfolders:
\Applications
\config
\Database
\diagnostic
\Diagnostics Tool
\Licenses
\Setup
\SetupLogs
\system
\Uninst_PowerMonitoringExpert
\web
6. Follow instructions provided with your data destruction tool to overwrite the entire PME
folder located in the previous step.
7. Locate any custom PME files in folders outside of the PME folder. This may include, but is
not limited to, following file types:
Vista and Designer files: .cfg, .dgm, .wsn, .wsg
8. Follow instructions provided with your data destruction tool to overwrite the files located in
the previous step.
9. Repeat the steps above on all PME Servers, Database Servers, and PME Clients.
IP Ports
The following table lists the ports used by PME for the communication between its components
and the connected devices:
139/445 NetBIOS/SMB PME Server Engineering client (File and Printer Sharing) No
13667 TCP PME Server Diagnostics Viewer (Server access from client machine) No
13666
13670 TCP PME Server Services (Vista and Designer access from client machines) No
13671
+33 (0) 1 41 29 70 00
www.se.com
7EN02-0488-00 07/2023
To comply with IEC 62443 standards for cybersecurity, PME systems should adopt several measures, including using Windows users over standard users to manage access, leveraging Windows' functionality to limit invalid login attempts . Additionally, administrators should regularly review user accounts, update passwords, and decommission unused accounts to maintain security consistency . Network security should include intrusion detection and prevention, securing wireless and remote access, and employing firewalls and device security protocols . These actions collectively help fulfill IEC 62443 requirements, which focus on maintaining robust industrial automation control system security .
To enhance cybersecurity during the setup of the EcoStruxure Power Monitoring Expert (PME) system, several measures are recommended: 1) Obtain and replace the system's default self-signed certificate with one from a trusted Certificate Authority to ensure encrypted, authenticated communications . 2) Define and manage user access by creating Windows user accounts instead of standard users for improved security and compliance with IEC 62443 . 3) Implement network security measures such as firewalls, intrusion detection and prevention systems, manage wireless access, and implement device security . 4) Disable or block unused IP and hardware ports to minimize potential entry points for unauthorized access . 5) Regularly update operating systems, SQL servers, and PME software to protect against vulnerabilities .
Conducting regular system updates and audits in administering PME systems is vital for maintaining optimal performance, security, and data integrity. Regular updates for the operating system, SQL Server, and PME ensure that the system stays protected against vulnerabilities, which can potentially lead to serious risks such as data breaches or unauthorized access . Updates also help in enhancing system efficiency by applying the latest improvements and fixes . Regular system audits through health checks and maintenance tasks, such as database trimming and backup, prevent performance degradation and data loss, ensuring the system operates smoothly and remains reliable over time . Auditing also involves monitoring system health indicators like processor and memory usage, service status, and disk space, which can identify potential issues before they cause system failures . Furthermore, updating and maintaining the system supports compliance with cybersecurity standards, helping protect against malware and other cyber threats ."} предпринимательством взахлёб. Образно выражаясь, само слово остался в памяти, отыскал его в словаре, и после окончания первого класса, когда необходимо было заполнять самодеятельную анкету друзей, указал его в графе "мечта".
For critical PME systems, set the ION_Data database recovery model to Full and schedule daily full backups along with hourly transaction log backups to ensure quick recovery in case of disaster. Keep the last two full backup files and the last 24 transaction log backup files on the server, while increasing storage space to accommodate these backups . Regularly archive and trim the ION_Data database in small batches, performing a trim after each archive. Ensure the archived data does not remain in the live database, as real-time analytics require access to live data . Do not shrink the database, as it can cause fragmentation, and monitor the hardware space requirements to ensure the system meets growing demands . Test and document the backup process, keeping records outside the PME server ."}
Implementing a Full recovery model for the ION_Data database supports disaster recovery for PME systems without onboard logging by enabling point-in-time recovery, thus minimizing data loss during a disaster. The Full recovery model keeps a comprehensive transaction log, allowing restoration to the exact moment before the disaster occurred, which is critical for systems without onboard logging that rely solely on external databases for historical data . This approach supports quick recovery with minimal downtime, as required by critical PME systems, by providing finer control over backup and restore options compared to the Simple recovery model .
The PME system's backup strategy supports disaster recovery by ensuring data can be restored to a specific point in time, minimizing downtime and data loss through documented and tested recovery strategies . It includes frequent backups and a diverse storage system following the 3-2-1 rule: storing backups locally on a RAID-protected drive for quick recovery, on centralized disks for accessibility, and off-site for safeguarding against site disasters . For steady state performance, the strategy balances backup frequency and system load, recommending daily or weekly backups based on the criticality of the system to avoid performance degradation caused by excessive logging . The proper allocation of storage and testing of backup integrity ensures both disaster recovery and steady system performance .
Organizations should carefully configure antivirus software to optimize performance while maintaining cybersecurity for PME systems by excluding SQL Server data and log files from on-access scans, as these can affect system performance significantly . Special configuration might be needed following the instructions provided by antivirus software vendors, and application whitelisting products can also enhance security alongside antivirus software . Proper configuration ensures that PME systems are secure without compromising performance .
The IONMaintenance account is used to execute database maintenance tasks for Power Monitoring Expert (PME) systems by running scheduled tasks in Windows Task Scheduler. In a Standalone PME system, the IONMaintenance account is automatically created by the installer for this purpose. For Distributed PME systems, a similar account must be created manually. To perform its role, the IONMaintenance account requires specific permissions in both Windows and SQL Server. In Windows, it must be a member of the Users group and have the 'Log on as a batch job' policy setting, while also being denied local log-on rights. In SQL Server, the account needs a public server role and should have db_backupoperator, db_ddladmin, Maintenance, and public roles on specified PME databases (ION_Data, ION_Network, ION_SystemLog, ApplicationModules). Additionally, for the archive task, which involves creating archive databases, a sysadmin server role is required .
The Recovery Time Objective (RTO) defines the maximum acceptable time period that business operations can be disrupted before it significantly impacts the business. This metric dictates how quickly the EcoStruxure Power Monitoring Expert (PME) system needs to be recovered following a disaster. For example, if the RTO is set to 24 hours, measures should be in place to ensure the system can be restored within this time frame to minimize business impact . An effective disaster recovery strategy must include preparatory steps such as having standby servers, backup power systems, and documented recovery procedures to meet this RTO requirement .
Removing PME Web Applications shortcuts from the server and restricting server access is advised to minimize vulnerabilities and reduce the risk of unauthorized changes to the system. Using a web browser on the server increases susceptibility to attacks that may compromise the server and the network . By restricting Windows login permissions to only PME system administrators, non-administrator users are prevented from potentially harmful activities, which enhances the overall cybersecurity of the PME system .