The following table outlines the steps that you must complete to deploy and configure this module for the first time.
These tasks may be completed by multiple people in your organization. We recommend, however, that the tasks be completed in the order in which they are listed.
Note:
Step | Task | Notes |
---|---|---|
1 | Define alternate search queries. |
This step is required only if you do not want to use the baseline search queries. |
2 | Modify threshold values in the SIL Threshold family. |
This step is required only if you want to modify the default boundary values specified in the SIL Threshold family. Hint: To prevent ambiguity in SIL values for driving risk ranks that fall on the boundary value of two SIL thresholds, avoid specifying contiguous boundary values where the lower boundary value of one threshold is the upper boundary value of the preceding SIL threshold. For example, for the SIL value of 1, if you have specified a SIL threshold of 10 through 100, then, for a SIL value of 2 you can specify the SIL threshold of 100.1 through 1000. |
3 | Import data from an Exida project file. |
This step is required only if you want to create SIL Analyses using an Exida project file. |
4 | Export data from an Exida project file. |
This step is optional. |
5 |
This step is required only if you want to take advantage of the integration between the SIS Management module and Hazards Analysis. |
|
6 |
Assign View permissions to the Hazards Analysis family to SIS Management Security Groups in Configuration Manager . As needed, you can assign additional privileges. |
This step is required only for Security Groups that will be used in the integration between the SIS Management module and Hazards Analysis. |
7 | Review the SIS Management data model to determine which relationship definitions you will need to modify to include your custom equipment or location families. Modify any relationship definitions as needed using the Configuration Manager. |
This step is required only if you store equipment and location information in families other than the baseline Equipment and Functional Location families. |
|
Assign Security Users to one or more of the SIS Management Security |
This step is required. |
Copyright © 2018 General Electric Company. All rights reserved.