Manuals

TSMS8 Instrument Security Procedures

In many cases it is imperative that the TSMS8 mobile network scanner be used in a secured environment. Generally these highly secured environments will not allow any test equipment to leave the area unless it can be proven that no user information will leave with the test equipment. Security concerns can arise when signal analyzers need to leave a secured area to be calibrated or serviced.

This document describes the types of memory and their usage in the TSMS8 mobile network scanner. It also addresses methods of ensuring that no user data will leave the secured area should the product be removed for calibration or service needs.

Name
Type
Версия
Дата
Size
R&S®TSMS8 instrument security procedures
R&S®TSMS8 instrument security procedures
🛈 Чтобы получить доступ к этому контенту, войдите в систему
Type
Security
Версия
01
Дата
Dec 09, 2025
Size
249 kB