• SIGNA™ Hero 3.0T Service Methods
  • 5852800-8EN Revision 1.0
  • Object ID: 00000018WIA30379450GYZ
  • Topic ID: id_2022711 Version: 2.15
  • Date: Oct 11, 2021 6:34:13 PM

MR Cyber Security Manual

These procedures outline the configuration of a secure environment for your MR system.

Prerequisites

Personnel requirements
Required personsPreliminary requirementsProcedureFinalization
1Variable timing based on facility security options desired- -
Note: All of the prerequisite requirements mentioned in table are based on customer’s choice of implementation either by choosing to implement the security feature or by ordering the applicable option keys for the feature.
Tools and test equipment
ItemPart numberApplicability
BIOS Password-All configurations
All EA3 Account Usernames, Roles, and Passwords-All configurations
ePO Server Details for McAfee Antivirus:
  • Server name
  • IP address
  • Port number
  • Username and password
-

Software release 29 and later

Latest McAfee .dat file on a USB
Note: This is the least preferred method for updating dat files. Use ePO server if available at site.
-

Software release 29 and later

Antivirus option key-

Software release 29 and later

Certificates as needed for TLS based secure communications-

Software release 29 and later

DICOM Destinations and Information-All configurations
Safety

Before working in any GE Healthcare MR suite or performing any GE Healthcare service procedure, you must:

  • Have read and understood all hazard conditions and safety requirements in the latest revision of the GE Healthcare MR Service Safety Manual (5452735).
  • Have successfully completed all relevant GE Healthcare Environmental Health and Safety (EHS) courses (or for non-GE employees, equivalent workplace training courses).
  • Comply with all site-specific training and workplace safety requirements.

If you have any safety concerns at any time, do not begin work or immediately stop work and move to a safe location. Immediately contact your supervisor or site safety officer for instructions on how to proceed.

Procedure

  1. Setting the boot sequence
  2. Setting or changing the BIOS password
  3. Security levels
  4. Security levels for software 29.0 and later
  5. SSH hardening changes for MR 29 and later
  6. Product Network Filter (PNF) firewall
  7. Importing and exporting TLS certificates
  8. Accessing the EA3 admin utility
    1. Creating local users
    2. Setting up enterprise authentication
    3. Logging on and off
    4. Configure user accounts for Role Based access controls
    5. Configuring password controls
    6. Managing default users
    7. Creating a customized logon message
    8. Enabling or disabling emergency logon authority
  9. MR customer password management process for software 29.0 and later
    1. MR password life-cycle
    2. Customer workflow changes
    3. Changing the Operating System password
    4. Passwords rules
  10. Configuring DICOM networking (standard or DICOM over TLS)
  11. Installing antivirus software
  12. Enterprise Audit Trail (EAT)-audit logging
  13. Checking the SW Media integrity (Iso # Checksum)