To resolve the issue, update the Floating License Manager to version 2.6. The setup file for Floating License Manager version 2.6 can be found in the folder named 'FloatingLicenseManager' on the Control Expert 15,SP1 installation dvd.
It is not necessary to return the license before updating to version 2.6.
Released for: Schneider Electric Malaysia


Need help?
Product Selector
Quickly and easily find the right products and accessories for your applications.
Get a Quote
Start your sales enquiry online and an expert will connect with you.
Where to buy?
Easily find the nearest Schneider Electric distributor in your location.
Help Centre
Find support resources for all your needs, in one place.
What is managed security services?
Managed security services (MSS) refers to a broad range of cybersecurity services or solutions provided by third-party providers or managed security service providers (MSSPs). MSS offerings cover the entire spectrum of cybersecurity, including basic system monitoring to extensive SOC as a service (SOCaaS) solutions that manage a customer’s complete security operations.
What is an MSS provider?
MSS providers are expert entities that typically offer cybersecurity managed services. They support businesses in identifying vulnerabilities, deploying security measures, and ensuring compliance with industry standards and regulations. The role of MSS providers is to actively monitor threats, detect them, and then respond before they escalate. These providers implement various controls to safeguard networks, data, and operational technology (OT) environments through services such as managed IT services security and managed network and security services.
How does MSS work?
The basis for managed security services is a proactive approach to cybersecurity, where the service providers monitor and manage security systems on behalf of their clients. This process starts with assessing the client's existing security posture and infrastructure needs. With an agreed plan, leading security experts work on developing a customised security strategy that aligns with the specific requirements of the business. The established security framework helps managed security service providers monitor threats and conduct continuous analysis of network traffic to identify anomalies that may indicate a security breach. If any potential threats are detected, experts establish protocols for incident response, ensuring that they can quickly neutralise risks before they impact the organisation.