Desktop Security Guidelines
Photo of It-digital-crystals
Desktop Security Guidelines
Policy Name: Desktop Security Guidelines
Policy Number: 03-05-015
Version Effective Date: June 15, 2005
Last Reviewed on: January 1, 2019
Policy Applies To: University wide
Responsible Office: Information Technology
INTRODUCTION AND STATEMENT OF PURPOSE
POLICY
In order to facilitate desktop security, the Department of Information Technology (IT) provides the following guidelines:
Activities for support personnel:
- All operating system updates and patches should be applied during the setup of a computer. In addition, the computer should be set up to check for and install updates automatically wherever possible.
- Updates and patches should be applied all campus-wide licensed applications installed on the computer.
- All computers should have the campus-license Enterprise McAfee anti-virus software installed and should retain the setting that schedules regular updates of virus definitions from the central server.
- New computer installation should have activated the built in firewall if available. All users should consider use of a commercial firewall, which offers additional protections not available from free products.
- Whenever possible, security policies should be set at the server level and applied to the desktop machines.
- All machines with Windows 2000 or XP should be checked with the Microsoft Baseline Security analyzer for obvious security holes.
- All compromised machines must be rebuilt by reformatting the hard drive and reinstalling all software and user data.
- When a computer is found to be compromised, ITS will disable network access from that system until it can be rebuilt or the issue corrected.
Activities for users:
- Do not install 鈥渇reeware鈥 products that install spyware and other malware.
- Periodically check that OS and Anti-virus software is updating correctly.
- Develop and initiate a regular backup strategy to network storage for all university-related documents and data.
- Do not share network access login information or leave logged in computers unattended.
DATE TO INITIATE REVIEW AND UPDATE
As deemed necessary or appropriate by the Policy Coordinator but at a minimum, at least every 5 years from the date of last review.