On this page:

StruxureWare Data Center Operation is a client/server configuration. The server can be configured to run in cluster mode with multiple nodes including data recovery node. The client runs on standard PC. You can find system requirements here.

Default user account for client

When setting up a server, a default apc user account is created for logging on to the client. The default credentials should be changed. See Managing Users in the System.


It is recommended that the firewall is enabled. The firewall will reduce the number of open ports to the required minimum. It will also protect internal services, such as the database, against external attacks. The firewall will allow all outgoing traffic and incoming traffic according to these details.

Packages used in StruxureWare Data Center Operation

Packages and their version numbers being used in StruxureWare Data Center Operationcan be found here.

Software Vulnerability, Scan(s) and Certifications

3 different software scanning tools are run against  StruxureWare Data Center Operation. Status in terms of general known vulnerabilities can be found  here.


StruxureWare Data Center Operationdoes not include antivirus in the installation. From a functionality point of view, it is fine to install an antivirus program on the server. We do have experience that antivirus will affect client performance and that performance loss depending on configuration can potential lead to errors, e.g. in a cluster environment.


The DCO product has several log files capturing kernel, cron job, etc. based on standard Linux capabilities. Furthermore, DCO logs all user account changes, logins and logouts to the Audit Trail log (available with change module license). The logs do not contain confidential information but might include some of the data entered when building the model. 

Server log files are stored on the server and are accessible to system administrators via the server configuration interface, Webmin (StruxureWare DC Operation>Download Log Files).

Client log files are stored in the user folder, e.g. Windows 7: C:\Users\[Username]\.isxo\[Version]\Operations\application.log or Mac: ~/.isxo.

Asset Management Records: Asset additions, changes, moves, and removals are tracked and can be found in Audit Trail report in the Reports section. 

User Account Records: User additions, changes, and removals can be configured in User Rights and Authentication. These are tracked and can be found in the Audit Trail report in the Analytics->Reports section.

Database architecture

Currently the database and server make up one unit and cannot be separated. The database and operating system are running on the same partition on the server by default. The database technology is postgreSQL and cannot be exchanged with any other database type or technology. The database is protected using RSA 2048 bits certificate password encryption.  

Running in a cluster will also make the database run in a cluster. It is furthermore possible to have disaster recovery (DR) node in your cluster environment. You can find more information here.

ETL is open to other database types and technologies. You can find more information about ETL here.

Skip to end of metadata
Go to start of metadata

1 Comment

  1. Unknown User (gr75801)

    Nice article for beginers.