M.3
Date Code 20170927 Instruction Manual SEL-751 Relay
Cybersecurity Features
Malware Protection
All settings changes are logged to the SER log. Analysis of this log indicates
if any unauthorized settings changes occurred. The SALARM Relay Word bit
also indicates changes in the relay configuration by pulsing for approximately
one second when any of the following occur:
➤ Settings are changed or saved
➤ A password changes
➤ The relay switches settings groups
See Self-Test on page 11.13 for more information regarding the Relay Word
bit SALARM.
Malware Protection
The SEL-751 has inherent and continuous monitoring for Malware. For a full
description of this, see selinc.com/mitigating_malware/.
Security Vulnerabilities
If SEL finds a security vulnerability with the SEL-751, it will be disclosed
using our standard security notification process. For a full description of this
process, see selinc.com/support/security-notifications/.
Settings Erasure
It is often desirable to erase the settings from the relay when it is removed
from service. You can completely erase all the configuration settings from the
SEL-751 using this procedure:
Step 1. Go to CAL access level. See Access Levels on page 7.17.
Step 2. Execute the R_S command.
Step 3. Allow the relay to restart.
NOTE: Do not erase the settings
when sending the relay to the factory
for service. SEL needs to be able to
see how the relay was configured to
properly diagnose any problems.
Once this procedure is complete, all internal instances of user settings and
passwords will be erased. Do not do this when sending in the relay for service
at the factory. SEL needs to see how the relay was configured in order to
properly diagnose many problems.