18 / 374
SOCT User Manual Version 10.0 rev. A
- USB ports for connecting to various USB devices
Authentication of Users
The SOCT device uses Microsoft Windows 10 as the operating system. The operating system
itself allows the end user to establish and configure “User Accounts” and “User Passwords” so
that authentication is performed by password.
Auto-Logoff
User can select one of two available methods of automated log-off when working with the
SOCT application.
- The operating system has the ability to prevent access and misuse by unauthorized users if
the device is left idle for a period of time. The length of inactivity time before auto-
logoff/screen lock is user/administrator configurable. The auto-logoff/screen lock can be
manually invoked by the user.
- The SOCT application also comes with an automated log-off capability which the user can
easily setup in chapter 22.4 Users accounts.
For questions regarding cyber security contact the Manufacturer.
Ensure Trusted Content
Restrict Software of Firmware Updates to Authenticated Code. Software and firmware updates
are performed by OPTOPOL representative from a protected source. All updates require a
Privileged account.
Cybersecurity event
Provide information to the end user concerning appropriate actions to take upon detection of
a cybersecurity event.
- Disconnect the SOCT device from any network
- Contact the IT Administrator at the user facility for on-site evaluation
- Run a scan using the anti-virus software
- Quarantine and delete any identified threats using the anti-virus software
- Restore the database
- Reconnect to the network
- Contact OPTOPOL Technology representative if additional assistance is required
Recover
Methods for retention and recovery of device configuration by an authenticated privileged
user.
• The SOCT provides an option for a data backup on internal and externa storage
• The SOCT allows configuration to be backed up automatically at each launch or close of the
SOCT application