User manual SEFELEC 5x Series  167   v1.06 
 
 
17.1.7.  LOGGING AND EVENTS MANAGEMENT 
 
- EATON recommends logging all falling within system and application events, including all ad-
ministrative and maintenance activities. 
-   Logs should be protected from tampering and other risks to their integrity (for example, 
by restricting permissions to access and modify logs, transmitting logs to a security information 
and event management system, etc.). 
-   Ensure that logs are retained for a reasonable and appropriate length of time. 
-   Review the logs regularly. The frequency of review should be reasonable, taking into 
account the sensitivity and criticality of the System | Device and any data it processes 
17.1.8.  MALWARE DEFENCES: 
EATON recommends deploying adequate malware defences to protect the product or the plat-
forms used to run the EATON product. 
17.1.9.  SECURE MAINTENANCE: 
Best Practices 
Update device firmware prior to putting the device into production. Thereafter, apply firmware 
updates and software patches regularly. 
EATON publishes patches and updates for its products to protect them against vulnerabilities 
that are discovered. EATON encourages customers to maintain a consistent process to promptly 
monitor for and install new firmware updates. 
Please check EATON’s cybersecurity website for information bulletins about available firmware 
and software updates