Satellite Exposure Risk

Security protocols protecting MCS satellites from unauthorized access and data exposure.

Server Security Protocols

Physical Server Disk Protection

Any unauthorized access to the Satellite interface is safeguarded against. The architecture ensures that unauthorized entities cannot access the physical server disk or file system. The Satellite operates strictly within its designated working directory, with no interactions beyond this domain.

MCS and Data Security Protocols

MCS Host Protection

Should an unauthorized party access the Satellite interface, they would be unable to reach the MCS host. While the URL or IP of the host may be visible, this information alone is insufficient for access — secured password authentication is mandatory.

Legacy Agent Settings

For legacy purposes, agent settings display an encrypted, obfuscated password pertinent only to older MCS engines. This encrypted password does not grant access to MCS — it functions solely as an authorization mechanism for MCS to process work orders.

Legacy agent password display showing encrypted, obfuscated values
Legacy agent passwords

Data Privacy

No private data traverses through a Satellite. The sole data exchanged between MCS and the Satellite pertains exclusively to the tests in operation.