Qualys Scan Requirements Prior to Firewall Edits (Onyen Restricted)
Description: -
» Subjects: , » Tags: ,

Vulnerability Management Guidelines (Onyen Restricted)
Description: -
» Subjects: » Tags: ,

How to Apply Qualys Scan Prep Group Policy for Windows Systems in ad.unc.edu (Onyen Restricted)
Description: -
» Subjects: » Tags: , , ,

Setup Procedures for Authorized Qualys Scans of Windows Systems with a Local Account (Not a domain account) (Onyen Restricted)
Description: -
» Subjects: » Tags: , ,

ClamX Antivirus
Description: The University’s ITS Security has released the new Antivirus Software for Mac OS X users. The software is called ClamX Antivirus. The software is an open source application that will scan your system similar to Symantec Antivirus used by the University. A version of the ClamX Antivirus can be downloaded from Clamxav site. Installation Instructions Please view the installation instructions […]
» Subjects: , , , ,

UNC-Chapel Hill Campus Standards for Electronic Media Disposal
Description: For UNC-Chapel Hill Standards on disposal of electronic media, please see the UNC-Chapel Hill Information Security Controls Standard listed on the ITS policy page at: https://its.unc.edu/about-us/how-we-operate/ More information about how to go about properly disposing of electronic media is available here: https://help.unc.edu/help/electronic-media-disposal-faq/
» Subjects: , » Tags:

Patching Progress in the Enterprise and How to Expedite It
Description: Patching Progress in the Enterprise and How to Expedite It Patching Progress in the Enterprise and How to Expedite It By: Bill Niester, Director – Public Sector Markets UNC Information Security Update Chapel Hill, NC June 10, 2010 Introduction Introduction Patch Management Patch Progress Data Common Steps Case Studies Lessons Learned Summary References Q&A 2 […]
» Subjects: » Tags:

Mass Email Requirements
Description: An electronic mass email request system (UNC Mass Mail) is available to support requesting, approving and scheduling official mass emails. The Mass Email System does not replace individual, school, or departmental address lists or mailing lists. These other methods are more appropriate for most announcements. The Mass Email System should only be used when a […]
» Subjects: , » Tags: ,

What is Sensitive Information?
Description: Sensitive information is defined as information that is protected against unwarranted disclosure. Access to sensitive information should be safeguarded. Protection of sensitive information may be required for legal or ethical reasons, for issues pertaining to personal privacy, or for proprietary considerations. Sensitive Information includes all data, in its original and duplicate form, which contains: Personal […]
» Subjects: , » Tags:

Protecting Your Sensitive Information
Description: The encryption solutions mentioned in this article deal exclusively with files and folders, not disks. For more information on whole disk encryption please contact ITS Information Security. File/folder encryption solutions handle copies of encrypted files differently. There are cases where one could unintentionally decrypt files when they are e-mailed, backed up, copied to another disk, […]
» Subjects: , » Tags: , , , , ,