ALERTON COMPASS 2 Building Automation System User Guide
ALERTON COMPASS 2 Building Automation System User Guide
CONTENTS
Welcome to Compass Security ................................................................................................................ 6
Disclaimer ............................................................................................................................................... 6
Introduction and Intended Audience ......................................................................................................... 7
Related security documents ................................................................................................................... 7
System Overview..................................................................................................................................... 8
Design and planning .............................................................................................................................. 10
Disaster recovery planning ................................................................................................................... 10
Developing a disaster recovery plan ................................................................................................. 10
Backup and recovery strategy........................................................................................................... 10
Installation, configuration, and system delivery....................................................................................... 12
Maintenance and monitoring .................................................................................................................. 13
Access control system .......................................................................................................................... 13
Security updates and service packs...................................................................................................... 13
Microsoft security updates ................................................................................................................ 13
Microsoft service packs .................................................................................................................... 13
Compass patches and updates......................................................................................................... 13
Virus protection .................................................................................................................................... 13
Installing antivirus software ............................................................................................................... 13
Ensure frequent updates to antivirus signature files .......................................................................... 13
Configuring active antivirus scanning ................................................................................................ 14
System performance ........................................................................................................................ 14
System monitoring ............................................................................................................................... 14
Detecting network intrusion............................................................................................................... 14
Disaster recovery maintenance activities .............................................................................................. 15
Restoring the Compass job and database......................................................................................... 15
Decommissioning and disposal.............................................................................................................. 17
Compass installation security checklist .................................................................................................. 18
31-00212-01
2 Compass End User Security Guide | March 2022
©2022 Honeywell
Welcome to Compass Security
This is a legal "Agreement," concerning the purchase of Products and use of Software, Firmware and/or
Documentation, between you, the "User" (either individually or as an authorized representative of the company that is
purchasing, has purchased, or is using the Products, Software, Firmware or Documentation) and Honeywell, 715,
Peachtree street NE, Atlanta, GA, 30308 USA. ("Honeywell").
Honeywell provides Alerton products ("Products"), software programs ("Software"), firmware, e.g., protocols, software
program code, device drivers and related hardware ("Firmware") and accompanying documentation
("Documentation") and grants a non-exclusive and non-transferable license ("License") to User to use the Software
and the Firmware only on the following terms and conditions. Taken together, Products, licensed Software, licensed
Firmware, and accompanying Documentation are collectively defined as "Alerton Product(s)" in this Agreement.
1. Copyright. The Software, Firmware, and Documentation are copyrighted and protected by United States copyright
laws and international treaty provisions and laws, contain valuable proprietary products, information, and trade
secrets, and shall remain the property of Honeywell. User may not and shall not copy or otherwise reproduce or make
available to any other party any part or all of the Software, Firmware or Documentation nor decompile, disassemble,
reverse engineer, manufacture or modify any portion of the Products, Software, Firmware, Documentation or any
portion of the same for any purpose or otherwise attempt to determine the underlying source code of the Software or
Firmware or permit any such action; provided however, User may either (a) make one (1) copy of the Software solely
for backup or archival purposes, or (b) transfer one (1) image of the Software to a single hard disk, CD or other
comparable media, provided User keeps the original solely for backup or archival purposes.
2. License. User is hereby licensed to use one (1) copy of the Software for User's own use in operating the Products.
User may not rent, lease or otherwise assign or transfer all or any part of the Software, Firmware, or Documentation.
In addition, User may not sublicense, assign or transfer this License or Agreement, or any part thereof. Any attempt
to do so shall terminate this License and User's right to use the Software and Firmware and shall subject User to
liability for damages to Honeywell. LICENSING TO USER OF THE SOFTWARE AND FIRMWARE COMMENCES
WHEN USER USES THE SOFTWARE, FIRMWARE AND / OR ACCOMPANYING DOCUMENTATION.
3. Copies, Modification, or Merger. Except as specifically set forth in Paragraph 1, User may not copy, modify,
transfer all or any portion of the Software, Firmware, or Documentation or merge it or them into another program,
unless expressly authorized in advance in writing by Honeywell. User must, as a condition of this License, reproduce
and include the identifying marks, copyright, and proprietary notices on any permitted copy of the Software,
Firmware, and Documentation. "Copies" shall include, without limitation, any complete or partial duplication on any
media, adaptations, translations, compilations, partial copies within modifications, mergers with other material from
whatever source, and updated works. User will use its best efforts to prevent any unauthorized copying or other
activity with respect to the Software, Firmware, and Documentation.
4. Third-Party Beneficiary. For any software or other technology under this Agreement licensed by Honeywell from
Microsoft (or other licensors), Microsoft or the applicable licensor is a third-party beneficiary of this Agreement with
the right to enforce the obligations set forth in this Agreement.
5. Warranty. Honeywell warrants Honeywell manufactured or produced Alerton Products to be materially free from
defects and to substantially conform to Honeywell's published specifications for a period of twenty -four (24) months
from date of shipment from Honeywell (the "Product Warranty Period"). This entire Section 5 is defined as the
"Warranty."
31-00212-01
©2022 Honeywell
Compass End User Security Guide | March 2022 3
Compass End User Security Guide
Honeywell also warrants Alerton Products that it has previously repaired or replaced for the greater of ninety (90)
days from the date of their shipment from Honeywell or the remainder of the Product Warranty Period of the originally
shipped Alerton Product (the "Repair/Replacement Warranty Period").
During the Product Warranty or Repair/Replacement Warranty Period, Honeywell will repair or replace the applicable
Alerton Products without charge and will add applicable engineering changes and upgrades.
This Warranty only applies to defective materials and workmanship of Alerton Products and excludes defects that
result from misuse, neglect, improper installation, unauthorized repair or alteration, damage during or after shipping,
accident, and/or misapplication of such products. This Warranty does not apply to parts, equipment, software,
firmware, components, documentation, or any other item that Honeywell does not manufacture or produce. This
Warranty is also voided by removal or alteration of Alerton Product identification labels.
Honeywell's sole responsibility with respect to Alerton Products shall be, within the applicable Product Warranty
Period, to furnish a replacement Alerton Product (FOB factory) or, at the option of Honeywell, to repair and return
(FOB Factory) the defective Alerton Product. HONEYWELL HEREBY EXCLUDES ALL IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE AND ALL OTHER EXPRESS OR IMPLIED
WARRANTIES WHATSOEVER WITH RESPECT TO ALERTON PRODUCTS. In no event shall Honeywell be liable
for personal injury, loss of profit, loss of production, loss of business or goodwill, business interruption, loss of
business information or data, loss due to delays, any other pecuniary loss, any cost or liability of Users or any other
parties, to themselves or to others, increased or uncovered operating or fixed costs, inefficiency, or any other special,
exemplary, consequential, incidental, indirect or remote damages in any manner, directly or indirectly, related to
design, manufacturing, supply, installation or use of, or inability to use, Alerton Products, or any other act or failure to
act by Honeywell or its agents or contractors.
User's exclusive remedy and Honeywell's entire liability arising from or in connection with the Alerton Products,
Software, Firmware, Documentation and/or this License and Agreement (including, without limitation, any breach of
any warranty, express or implied) shall be, at Honeywell's option, the repair or replacement of the Products or
Software or Firmware as applicable, as stated above. ACCORDINGLY, HONEYWELL AND ITS DESIGNATED
DEALERS AND THEIR DESIGNATED ASSOCIATE DEALERS HAVE EXCLUDED AND DISCLAIM ANY AND ALL
IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE AND ALL OTHER
WARRANTIES, EXPRESS OR IMPLIED, WHATSOEVER, WITH RESPECT TO THE PRODUCTS, THE
SOFTWARE, THE FIRMWARE, THE DOCUMENTATION AND/OR THE LICENSE. USER HEREBY
ACKNOWLEDGES THE SAME.
6. Remedies of Honeywell. IF USER BREACHES THIS AGREEMENT, USER'S LICENSE HEREUNDER SHALL BE
AUTOMATICALLY TERMINATED. Upon termination, User shall return the Software, Firmware, and all
Documentation to Honeywell and destroy any copies of the Software, Firmware, and the Documentation or any
portions thereof which have not been returned to Honeywell, including copies resident on electronic or digital media.
If User breaches this Agreement, Honeywell shall be entitled to all damages suffered by Honeywell resulting from
such breach and Honeywell shall be entitled to equitable and injunctive relief in addition to all other remedies at law.
In this regard, User acknowledges that its breach of any provision of this Agreement will cause Honeywell immediate
and irreparable injury for which there are inadequate remedies at law. The prevailing party in any dispute concerning
this Agreement shall be entitled to the costs of collection and enforcement, including but not limited to reasonable
attorneys' fees, court costs, and all necessary expenses, regardless of whether litigation is commenced.
31-00212-01
4 Compass End User Security Guide | March 2022
©2022 Honeywell
Welcome to Compass Security
7. Export. Alerton Products are subject to regulation by local laws and United States government agencies, which
prohibit export or diversion of certain products, information about the products, and direct products of the products to
certain countries and certain persons. User agrees that User will not export in any manner any Alerton Product or
direct product of Alerton Product, without first obtaining all necessary approval from appropriate local and United
States government agencies.
8. RESTRICTED RIGHTS NOTICE. Alerton Products, Software, Firmware, and Documentation have been developed
entirely at private expense and are commercially provided with RESTRICTED RIGHTS. Use, duplication, or
disclosure by the U.S. Government or a U.S. Government subcontractor is subject to the restrictions pursuant to
DFARS 227.72013 (October 1988) and DFARS 52.227-19 (June 1987), as amended and as applicable.
Manufacturer, licensor, and publisher is Honeywell, 715, Peachtree street NE, Atlanta, GA, 30308 USA.
9. Statute of Limitations. No action for any breach of a warranty, if any, deemed or actual, may be commenced more
than one (1) year following the expiration of such warranty.
10. Other. User further agrees that this Agreement is the complete and exclusive statement of the agreement
between User and Honeywell and supersedes any proposal or prior agreement or any other communications
between Honeywell or any of its representatives and User relating to the use of the Software, Firmware,
Documentation, and purchase of the Products. This Agreement may only be modified by a physically signed writing
between User and Honeywell. Waiver of terms or excuse of breach must be in writing and shall not constitute
subsequent consent, waiver, or excuse. If any provision of this Agreement is finally determined to be unenforceable,
the remaining provisions shall remain in effect. The laws of the State of Georgia and the United States, including U.S.
copyright laws, shall govern this Agreement. Venue in the event of any suit, proceeding, or claim shall be in the
courts located in Fulton County, Georgia, USA. If User has any questions regarding this Agreement, User may
contact Honeywell by writing Honeywell at the above address.
This Agreement shall inure to the benefit of and be binding upon the parties and their successors, administrators,
heirs and permitted assigns. Notwithstanding any termination of this Agreement and not in limitation of any other
provision of this Agreement, User shall specifically continue to be fully obligated to comply with all of the requirements
of paragraphs one (1) through four (4), as if the Agreement were not terminated and all remedy provisions hereunder
shall apply to any breach of such obligations.
31-00212-01
©2022 Honeywell
Compass End User Security Guide | March 2022 5
Compass End User Security Guide
DISCLAIMER
While we have engaged in efforts to assure the accuracy of this document, Alerton is not
responsible for damages of any kind, including without limitations consequential damages
arising from the application or use of the information contained herein. Information and
specifications published here are current as of the date of this publication and are subject to
change without notice. The latest product specifications can be found on our website or by
contacting our corporate office in Atlanta, Georgia.
Alerton
715, Peachtree street, NE
Atlanta, GA 30308, USA
[email protected]
31-00212-01
6 Compass End User Security Guide | March 2022
©2022 Honeywell
Introduction and Intended Audience
Document Description
Compass Dealer Security Guide Provides security-related instructions for planning, installing, and configuring a
(31-00211) Compass system. The intended audience is an Alerton dealer.
Compass End-User Security Guide Provides security-related instructions for maintaining and decommissioning a
Compass system. The intended audience is the Compass system owner and
(31-00212) end-user.
ACM Dealer Security Guide Provides security-related instructions for planning, installing, and configuring
(31-00213) an ACM. The intended audience is an Alerton dealer.
ACM End-User Security Guide Provides security-related instructions for maintaining and decommissioning an
(31-00214) ACM. The intended audience is the Compass system owner and end-user.
31-00212-01
©2022 Honeywell
Compass End User Security Guide | March 2022 7
Compass End User Security Guide
SYSTEM OVERVIEW
The following is a diagram of a typical Ascent system installation.
31-00212-01
8 Compass End User Security Guide | March 2022
©2022 Honeywell
System Overview
BAS management interfaces (e.g. the Compass primary workstation web user interface) but
must provide access to the Internet so that Compass computers can check for and download
operating system and virus scanner updates unless another means to do this is provided.
BAS network: This network is used solely for BAS protocols, which consists of BACnet/IP,
BACnet/Ethernet, and any protocols that Niagara Integration Services on an ACM might use.
This network must not be the same network as the Internet/intranet/corporate network.
BAS firewall: To provide additional separation and protection to the BAS, a firewall must be
used between the Internet/intranet/corporate network and any BAS device that connects to it,
such as the Compass primary workstation, Compass workstations, and ACMs. This firewall
limits access to the BAS to only computers that are authorized and may help reduce the risk of
attacks, such as a denial-of-service attack.
Compass primary workstation: The Compass primary workstation is a computer running
Compass software. It requires two network connections – one for connecting to the
management web user interface through a web browser (usually on the
Internet/intranet/corporate network) and another for connecting to the BAS network.
Web browser: Compass software provides a web-based management interface that is
accessed through a web browser.
ACM and BCMs: The Alerton Control Module (ACM) and BACtalk Control Modules (BCMs) are
global controllers that connect to an Ethernet network and host MS/TP network segments.
MS/TP is a low-bandwidth connection that is used to connect controllers and sensors.
• ACM Niagara Integration Services: The ACM has an instance of Niagara and so it can run
Niagara code, including a web server. If this functionality is used, then connect the ACM’s
second network to the Internet/intranet/corporate network through the BAS firewall.
Compass workstation (optional): If access to the Compass primary workstation’s thick client
interface is not allowed, for example, the Compass primary workstation is run in a virtual
machine or console access to it is not allowed, then install a Compass workstation on a
separate computer to access thick client functionality.
VIP & VXIO: The Alerton VisualLogic IP Controller (VIP) is a BACnet Advanced Application
Controller (B-AAC) with a real-time clock, high resolution 16-bit universal inputs and outputs,
and a 32-bit processor.
VLX, VLC, or EXP: The Alerton controllers are advanced application controller with a high-
resolution converter and new, high performance processor and real-time clock that supports its
own schedules, trendlogs and alarms. The controllers include monitored on-board Hand-Off-
Auto (HOA) switches, Ethernet or MS/TP connectivity, and additional math functions beyond the
standard VLC/VAV controllers.
SQL Server (optional): Compass software can be configured to use an external SQL Server.
31-00212-01
©2022 Honeywell
Compass End User Security Guide | March 2022 9
Compass End User Security Guide
31-00212-01
10 Compass End User Security Guide | March 2022
©2022 Honeywell
Design and planning
• Media failure: If one or more disk drives fail, there is a potential for a complete loss of data
unless the system was properly backed up.
• User error: If a user makes invalid modifications to configuration data, then an effective way
to undo these changes is to restore the data from backup.
• Permanent loss of a server: If a server becomes permanently unusable, then the system and
data have to be reconstructed unless you have a backup.
• Virus or worm infection: If a virus infects the Compass workstation, then it could delete or
corrupt files making it difficult or impossible to restore the system configuration.
Also consider:
• CD and DVD are not considered to be reliable backup mediums.
• Backups can be CPU- and disk-intensive operations on a large system. Perform backups at
times that do not have a lot of system load.
• Do not store backup images on the Compass primary workstation or, if used, the SQL
Server computer.
• Do not store backup images on the same computer being backed up.
• Backup images should be stored on network drives.
• If network drives are not available, then store backup images to a connected drive using
USB.
• Not all backup products support backing up SQL Server, especially when SQL Server is
running with open files.
• Configure your backup software product to do a full backup weekly and incremental backups
nightly to lower the load and performance impact from backup activities.
• Ensure that you have enough file storage space to hold all backups.
• Ensure that verification is performed after the backup has completed to guarantee that the
data was backed up correctly.
An effective Disaster Recovery Plan must be documented and all personnel involved must be
knowledgeable of its content and storage location.
31-00212-01
©2022 Honeywell
Compass End User Security Guide | March 2022 11
Compass End User Security Guide
31-00212-01
12 Compass End User Security Guide | March 2022
©2022 Honeywell
Maintenance and monitoring
Virus protection
Ensuring that antivirus software is installed, properly configured, regularly updated, and
monitored is an essential part of system security.
Installing antivirus software
If antivirus was not installed by your Alerton dealer, then install it on every computer in the
network, including:
• Compass primary workstation
• Compass client workstations and web clients
After installing antivirus software, check the Windows Event Logs to ensure no errors are
reported. If the system starts experiencing failures, the inability to read or write files, the logs
show deadlock errors, or the system shows any other unusual behavior, disable the antivirus
software to see if the failures continue. Note that some antivirus software may need to be
completely uninstalled in order to be disabled.
Ensure frequent updates to antivirus signature files
It is important to update antivirus signature files frequently by:
31-00212-01
©2022 Honeywell
Compass End User Security Guide | March 2022 13
Compass End User Security Guide
System monitoring
Diligent system monitoring will help guard your system against unauthorized access. However,
there is always the possibility that an attacker will succeed in circumventing all the safeguards
and compromise the system. If this happens, it is important to discover the breach and prevent
further damage as rapidly as possible. The earlier a system breach is detected and the more
evidence that is captured, then the less damage is likely to occur and the greater the chances of
identifying the intruder. Logs that may be collected in the system are:
• Windows Audit Logs (if enabled)
• Antivirus software logs or reports
• Access control system
Detecting network intrusion
Network Intrusion Detection Systems (NIDS) can take many forms. NIDS can be a dedicated
server on the same network branch, freeware software available under GNU or similar licenses
(most of these are aimed at UNIX systems), or commercial products aimed specifically at
Windows systems.
31-00212-01
14 Compass End User Security Guide | March 2022
©2022 Honeywell
Maintenance and monitoring
The purpose of NIDS is to scan incoming network packets and look for unusual traffic or for
specific malformed packets known to be associated with attacks. If anomalies are found, NIDS
take action such as raising alerts or even disconnecting the computer from the network. The
latter is a dangerous option which causes its own denial of service while preventing damage to
the system by closing network ports, and so on.
Most firewalls, switches, and routers have reporting capabilities that can report various levels of
events ranging from debugging to emergency failure. These reports can be viewed using telnet,
collected by a central logging server, or emailed to an administrator. For example, the Cisco PIX
firewall and Catalyst 4500 switches can be configured to send selected levels of events to a
central syslog server where further analysis can occur and significant events can be detected.
Syslog servers are common on Unix systems, and third-party syslog services are available for
Windows. They vary in functionality and cost, from freeware, which simply writes to a log file, to
sophisticated NIDS that analyze the logs in detail. As well as being able to control the level of
severity of events, the PIX firewall allows the suppression of individual messages. This can
significantly reduce clutter and also provide some ability to recognize common attack signatures
and raise appropriate alarms.
When you configure network event logs, maintain a balance between collecting too many
events (and missing something important) and filling storage disks and deleting information
(which is subsequently needed for an intrusion investigation).
Other forms of intrusion detection will search event logs looking for unusual events, or will
compare the current file system to a known good image. Be careful when running such tools to
prevent them from using too many resources and interfering with the control system.
31-00212-01
©2022 Honeywell
Compass End User Security Guide | March 2022 15
Compass End User Security Guide
The process for restoring the job backup can be found in the Compass online Help by searching
for Restore Utility.
Restoring a SQL Server backup is best handled by the site’s DBA; see Restore a Database
Backup (SQL Server Management Studio) on Microsoft’s Developer Network at
http://msdn.microsoft.com/en-us/library/ms177429.aspx for more information.
31-00212-01
16 Compass End User Security Guide | March 2022
©2022 Honeywell
Decommissioning and disposal
31-00212-01
©2022 Honeywell
Compass End User Security Guide | March 2022 17
Compass End User Security Guide
31-00212-01
18 Compass End User Security Guide | March 2022
©2022 Honeywell
This page is intentionally left blank.
ALERTON
31-00212-01 I 2022-04
715 Peachtree St NE
© 2022 All Rights Reserved
Atlanta, Georgia 30308
alerton.com Honeywell International Inc.