Reach PI System’s full potential

PI System™ Audit

Learn more

Integrate information silos and transform them into standards

PI System™ Infrastructure Implementation and Integration

Learn more

Connect new data sources to your PI System

PI System™ Interface Implementation

Learn more

We take care of your system administrationand support

PI System™ Administration and Support

Learn more

PI System™ Audit

For this service, the main objectives to achieve are:

  • Audit the existing PI System architecture in its current state.
  • Diagnose System security and performance problems.
  • Specify the conditions for the use of licenses and versions.
  • Evaluate current management practices and propose improvements.

The audit consists of reviewing the installation, configuration and use of PI System™ and its components, ending with the delivery of an audit report. The service is performed on site by professionals from PIPER Solutions, certified by OSIsoft as specialists in PI System infrastructure and installation.

The scope of this package is limited to a single site consist of 1 PI Server node, up to 5 interface nodes, 1 System Manager node, 3 custom or third-party applications and up to 5 PI Client stations.


  • Ensure optimal growth of the PI System™.
  • Reduce indirect costs in managing the PI System™.
  • Opportunity to implement best practices for PI System™ Administration.
  • PIPER offers improvement and solution alternatives to current problems that can be identified in the PI System™ infrastructure.
  • Opportunity to optimize the full performance of the PI Server.

Contents of the Audit Report

  • 1. Introduction.
  • 2. Audit deliverables.
  • 3. Current PI System™ architecture, licenses and use.
  • 4. PI System™ Logs.
  • 5. PI System™ Performance Metrics.
  • 6. PI Data Archive™ Security Model.
  • 7. PI Asset Framework™ Security Model.
  • 8. PI Tags Configuration.
  • 9. Asset Framework.
  • 10. Backup status and procedure.
  • 11. Inventory of third-party applications.
  • 12. Management Practices.
  • 13. Recommendations based on Best Practices.
  • 14. Facilities and training.
  • 15. High Availability Options.
  • 16. OSIsoft Technical Support.
  • 17. Conclusions.
  • 18. Additional information.
  • 19. Evidence.

Other Complementary Services

PIPER implements a new installation of the PI System™ infrastructure, if you already have this service, you may also be interested in the implementation of the interface, managing your infrastructure or auditing the PI System™.

Audit Service Deliverables

  • Pre-visit checklist review, confirmation that all essentials are met before continuing.
  • Software audit:

  • PI version inventory Server™, PI Client and PI Interface™.
  • Audit of license usage.

    Performance and configuration audit:

  • Review of the PI System ™ architecture.
  • Inventory of hardware and software.
  • Inspection of records PI System™.
  • PI System™ performance metrics and stress testing inspection.
  • Review the security model.
  • Review high availability options.
  • PI Tags configuration audit.
  • Review of PI System™ backups and restoration procedures.

    Audit of custom or third-party applications:

  • Architecture and functionality review of current or proposed third-party custom applications based on PI System.
  • Review of system administration practices.

  • Review of system administration practices.
  • Brief presentation of findings and recommendations at the end of the audit service.
  • Presentation of technical support and help the client to obtain assistance from OSIsoft technical support.

    Audit of custom or third-party applications:

  • Estimate of services recommended by PIPER.
  • Estimate of training courses recommended by PIPER.
  • Audit report (up to 80 pages).

Audit Schedule

The audit process, starts from order to completion, normally takes 3-4 weeks:

Week 1 - Communication of essentials. Confirmation of installation date with PIPER.

Week 2 - On-site visit (up to three days).

Week 3 - Prepare and transmit a final audit report.

Requirements to the Audit

  • Customer’s technical staff needs to be available to provide system access for the duration of the audit (PI System, Security, Network, and Control Systems).
  • Customer must provide the list of nodes to be audited (PI Server, PI Interface nodes, Administrator console, Custom or third-party applications and clients).
  • Customer must provide a configuration station with the PI System Management Tools™ (PI SMT) and Microsoft® Excel® software.
  • Customer must provide an up-to-date network architecture drawing.
  • Customer’s technical staff must be available to answer questions about existing data sources.
  • Customer’s application users must be available to answer questions about existing and desired applications.
  • Customer must arrange for safety training, and any permits required.
  • Customer must guarantee the validation of the security permits required for access to their organization as a prerequisite to the visit.

Why request the PI System™ auditservice with PIPER?

Commitment and Support in Peru
We become your Strategical Partners
Knowledge and Integration with the Industry
Certified Professionals in the PI System

Are you ready to start auditing the PI System™ infrastructure in your company?