Microsoft Security Essentials Client Overview
Description: The Microsoft Security Essentials (MSE) client is the current recommended Antivirus/Malware application for personally-owned computers.  This application is a Non-Managed client; an overview of the client is offered below. For University-owned computers, Microsoft System Endpoint Protection is recommended. Please visit Microsoft System Center Endpoint Protection for more information. General Overview The Microsoft Security Essentials has four […]
» Subjects: , , , , , » Tags: , , , ,

Installing Microsoft Security Essentials
Description: The University recommends that Microsoft Security Essentials be installed on any personal computer used by Faculty, Staff, or Students.  For University-owned computers, Microsoft System Endpoint Protection is recommended.   Please follow the instructions below to install Microsoft Security Essentials. You will need to uninstall Symantec Anti-Virus before you can install Microsoft Security Essentials.  Please visit […]
» Subjects: , , , , , » Tags: ,

Network Security FAQ
Description: Introduction The following is a list of frequently-asked questions about Network Security. Please feel free to write to with further questions or problems. Questions & Answers What is a Hardware Address (a.k.a. MAC Address or Physical Address)? Every Ethernet Network card that has ever been made is supposed to have a unique Hardware Address. […]
» Subjects: » Tags: , ,

Securing Smart Phones
Description: Smart Phone Security With the increasing use of mobile devices comes accompanying risks to data stored on the devices. Following are a number of best practices to help users secure their smart phones. Best Practices for General Smart Phone Security Be aware of the possibility of theft. Smart phones are small and easily misplaced or lost. […]
» Subjects: , » Tags: , , , , , , , , , ,

Basic Security Checklist
Description: Introduction This basic security checklist addresses general security topics. Password Security Your computer password is your best defense against damaging intrusions. Without a well-chosen password or set of passwords, any other security measures protecting your data are greatly weakened. Never share your passwords with anyone. The most frequent password mistakes made include choosing an obvious […]
» Subjects: , » Tags: ,

Information Security Policy Guide
Description:   A Guide to Assist in Locating the Policies and Standards that Apply to You The University of North Carolina at Chapel Hill maintains an expansive network of Information Technology (IT) services and systems. From Sakai, email and wireless access to more specialized types of technology such as Qualys, Research Clusters and PeopleSoft, these services […]
» Subjects: , » Tags: , , , , ,

Network Access Control Overview
Description: To connect to the UNC Campus Network, it has always been the case that a customer’s computer must meet certain minimum requirements, including having anti-virus software installed, running and up-to-date. It must also have specific operating system updates installed to prevent the computer from being compromised. In the past, this policy was enforced using a […]
» Tags: , , , , , , , , ,

Windows Security Checklist
Description: If your computer is maintained by a departmental IT technician, many of these steps may have already been taken. Make sure you have password protected your Windows account. You can set a password by going to Start Menu >  Control Panel > User Accounts. Make sure all of your passwords are strong and complex. Visit […]
» Subjects: , » Tags: , , , ,

Macintosh Security Checklist
Description: Take the following steps to ensure the security of your Macintosh system: Make sure that your Mac is password protected. To set or change your password, go to the Apple menu > System Preferences > Accounts > My Account . A password protected screensaver can be set up to keep your computer from being accessed […]
» Subjects: , » Tags: , ,