General information, A.4.1. general information, A.4.1.1 – BECKHOFF IPC-Security User Manual
Page 39: A.4.1.2
A.4.1. General information
A.4.1.1. Overview Beckhoff web-based services
The following table gives an overview about all Beckhoff web-based services that are included by default
in operating system images deployed by Beckhoff. These services are hosted by the Internet Information
Service (IIS) by the corresponding operating system.
Name
Description
OS
IPC-Diagnostics
Website that displays Hard- and
Software information about the
IPC or EPC.
WinCE, WinXP*
TcOpcXmlDa
Provides an OPC-XML-DA end-
point to get data access to PLC
symbols.
WinCE
* WinXP = Windows XP Pro, Windows 7 Pro, Windows Embedded
A.4.1.2. Complex passwords
Strong passwords are an important protection that helps to configure safe environments. The following
requirements define a strong password and are adapted from a Microsoft article about strong passwords:
▪ Password length: Make sure that the password consists of at least 8 characters
▪ Password complexity: Include letters, punctuations, symbols and numbers
▪ Password variation: Change the password often
▪ Password variety: Do not use the same password for everything
There are many ways to create a strong password. The following table shows some suggestions that might
help you to remember a password easily:
What to do
Example
Start with a sentence or two
Complex passwords are safer
Remove the spaces between the words
Complexpasswordsaresafer
Turn words into shorthand or intensionally misspell a
word
ComplekspasswordsRsafer
Add length with numbers and symbols
ComplekspasswordsRsafer#2013#
Keep in mind: Cyber criminals use sophisticated tools that can rapidly decipher passwords. Avoid creating
passwords that use:
▪ Dictionary words in any language
▪ Words spelled backwards, common misspellings and abbreviations
▪ Sequences or repeated characters, e.g. 12345678 or abcdefgh
▪ Personal information, e.g. birthday or passport number
IPC Security
39