Microsoft Security Essentials Client Overview
Description: The Microsoft Security Essentials (MSE) client is the current recommended Antivirus/Malware application for personally-owned computers.  This application is a Non-Managed client; an overview of the client is offered below. For University-owned computers, Microsoft System Endpoint Protection is recommended. Please visit Microsoft System Center Endpoint Protection for more information. General Overview The Microsoft Security Essentials has four […]
» Subjects: , , , , , » Tags: , , , ,

Installing Microsoft Security Essentials
Description: The University recommends that Microsoft Security Essentials be installed on any personal computer used by Faculty, Staff, or Students.  For University-owned computers, Microsoft System Endpoint Protection is recommended.   Please follow the instructions below to install Microsoft Security Essentials. If you are a Windows 8.1 or Windows 10 user then either of those come with […]
» Subjects: , , , , , » Tags: ,

Network Security FAQ
Description: Introduction The following is a list of frequently-asked questions about Network Security. Please feel free to write to security@unc.edu with further questions or problems. Questions & Answers What is a Hardware Address (a.k.a. MAC Address or Physical Address)? Every Ethernet Network card that has ever been made is supposed to have a unique Hardware Address. […]
» Subjects: » Tags: , ,

Securing Smart Phones
Description: Smart Phone Security With the increasing use of mobile devices comes accompanying risks to data stored on the devices. Following are a number of best practices to help users secure their smart phones. Best Practices for General Smart Phone Security Be aware of the possibility of theft. Smart phones are small and easily misplaced or lost. […]
» Subjects: , » Tags: , , , , , , , , , ,

Basic Security Checklist
Description: Introduction This basic security checklist addresses general security topics. Password Security Your computer password is your best defense against damaging intrusions. Without a well-chosen password or set of passwords, any other security measures protecting your data are greatly weakened. Never share your passwords with anyone. The most frequent password mistakes made include choosing an obvious […]
» Subjects: , » Tags: ,

Information Security Policy Guide
Description:   A Guide to Assist in Locating the Policies and Standards that Apply to You The University of North Carolina at Chapel Hill maintains an expansive network of Information Technology (IT) services and systems. From Sakai, email and wireless access to more specialized types of technology such as Qualys, Research Clusters and PeopleSoft, these services […]
» Subjects: , » Tags: , , , , ,

Windows Security Checklist
Description: If your computer is maintained by a departmental IT technician, many of these steps may have already been taken. Make sure you have password protected your Windows account. You can set a password by going to Start Menu >  Control Panel > User Accounts. Make sure all of your passwords are strong and complex. Visit […]
» Subjects: , » Tags: , , , ,

Macintosh Security Checklist
Description: Faculty and staff should contact their IT support staff or ITS for assistance configuring and troubleshooting Apple macOS or OS X. All other affiliates please visit this site.      
» Subjects: , » Tags: , ,