Installing Microsoft System Center Endpoint Protection Non-Managed Client
Description: The University is transitioning from the Symantec Endpoint Protection (SEP).  The Microsoft System Center Endpoint Protection (SCEP) is the current recommended Antivirus/Malware application for University computers.  This application allows for Managed and Non-Managed client.  If you need uninstall Symantec Endpoint protection please visit Migration from Symantec to Microsoft Antivirus.  The University recommends Microsoft Security Essentials for […]
» Subjects: , , , , ,

Microsoft System Center EndPoint Protection
Description: The University is transitioning from the Symantec Endpoint Protection (SEP).  The Microsoft System Center Endpoint Protection (SCEP) is the current recommended Antivirus/Malware application for university-owned computers.  This application allows for Managed and Non-Managed client.  For an overview of the client please visit Microsoft System Center Endpoint Protection Overview document.  The University recommends Microsoft Security Essentials […]
» Subjects: , , , , ,

How to Work Securely from Home
Description: Table of Contents   Keep it separated Keep it clean Install security software on all home and personally owned computers Protect your home wireless network Keep it backed up   Who doesn’t like the flexibility of working from home instead of the office? With gas prices skyrocketing, and commute times becoming longer, the ability to […]
» Subjects: » Tags: ,

Viruses
Description: (1) What is a Virus? A virus is a computer program that attempts to replicate itself and infect other computers. Some viruses are relatively benign, while others might slow down your computer, delete your files, send emails to everyone in your address book, or perform other malicious tasks. You can get a virus by running […]
» Subjects: , » Tags: ,

Computer Compromises
Description: What does “compromised” mean? “Compromised” is a nice way of saying that someone or something has maliciously broken into your computer without your knowledge or permission. It means that you can not trust the integrity of any file on your computer (including program files, image files, operating system files, etc.). You can not find out […]
» Subjects: , , » Tags: , ,

Restrictions on Connecting Via Remote Desktop Protocol (RDP) from Off-Campus
Description: Over the past few months, the campus has seen a marked increase in attacks from off-campus computers using Remote Desktop Protocol (RDP). Additionally, two vendors have issued security advisories for their products that, like RDP, involve connecting to the university network from remote computers. First, Symantec advised users of its pcAnywhere software to cease using […]
» Subjects: , » Tags: , , , ,

Setup Procedures for Authenticated Qualys Scans in UNIX (Onyen Restricted)
Description: -
» Subjects:

Sensitive Information (Onyen Restricted)
Description: -
» Subjects: , , » Tags: , ,

Qualys Scan Requirements Prior to Firewall Edits (Onyen Restricted)
Description: -
» Subjects: , » Tags: ,

Vulnerability Management Guidelines (Onyen Restricted)
Description: -
» Subjects: » Tags: ,