Skip to Main Content
AVEVA™ PI System™ Feedback Portal

Welcome to our new feedback site!


We created this site to hear your enhancement ideas, suggestions and feedback about AVEVA products and services. All of the feedback you share here is monitored and reviewed by the AVEVA product managers.

To start, take a look at the ideas in the list below and VOTE for your favorite ideas submitted by other users. POST your own idea if it hasn’t been suggested yet. Include COMMENTS and share relevant business case details that will help our product team get more information on the suggestion. Please note that your ideas and comments are visible to all other users.


This page is for feedback specifically for AVEVA PI System. For links to our other feedback portals, please see the tab RESOURCES below.

Status Completed
Categories Security
Created by Guest
Created on Aug 20, 2022

Guidance on best practices

As an ICS systems engineer, I need to provide broad, real-time access to operations data using the PI System while assuring that sensitive systems are defended appropriately via standard security zones and authorization mechanisms. So I need guidance on best practices in deployment and security as well as tools to verify them.
  • ADMIN RESPONSE
    Aug 20, 2022
    We have compiled the seven best practices for securing the PI Server in the following article: https://customers.osisoft.com/s/knowledgearticle?knowledgeArticleUrl=KB00833
  • Attach files