Proper preparation of all computing systems (desktops, laptops, servers, printers and mobile devices) must be conducted.
Systems found to be infected will be removed from the network until the infection is removed and the system has been properly protected.
Intrusion detection, network monitoring, incident logging, and response coordination necessary for the detection, elimination, and recovery from various forms of attack on university resources is managed by the IT department (See ISO-006 Security Incidents.).
Exceptions to the recommended tools such as firewalls, antivirus, and anti-malware should be approved by IT. Mac users can obtain free copies of the Symantec Endpoint Protection for Macintosh through the iTech Xpress store. Personal machines running Windows based operating systems can get free virus protection through Microsoft Security Essentials.
Antivirus software and updates are automatically distributed by IT to all Active Directory attached computing systems.