Access Keys:
Skip to content (Access Key - 0)

System Administrator Security Preventative Measures Landing Page

This page is under construction
The information provided below may not be complete or fully tested. Take care when following draft instructions.

On this page:

Overview

IT providers should consider using management tools (for endpoints, mobile devices, and servers) to centralize the deployment and installation of security software and controls(Casper for Mac and SCCM for Windows) across the environment.  

To further protect their systems, providers should stay informed of available patches for operating systems to ensure you're up to date with the latest security fixes. Performing regular vulnerability scans will help identify critical OS and third party software application vulnerabilities that may be installed on your systems.  This information should be incorporated into a regular patch and vulnerability management cycle. 

You may also be interested in joining the IT Partners or Security FYI lists to stay up to date on the latest IT and information security news.

Endpoint Management Tools

System Center Configuration Manager (SCCM)

Casper

Mac Imaging

Windows Imaging

Vulnerability Scans

Vulnerabilities are weaknesses or flaws in hardware or software that can be exploited by malicious users to steal information, gain unauthorized access/privileges, manipulate system activity or cause damage to assets.  Depending on the damage potential, vulnerabilities are rated on a scale of low to critical with several online databases that keep track of all vulnerabilities discovered and reported, to include https://nvd.nist.gov/, and corrective actions users should take to fix weaknesses.  It is a best practice to prioritize the remediation of critical and high rated vulnerabilities. 

How To

  • Identify the hosts/ip addresses within your area of responsibility by completing an inventory.  See the KB here.
  • Contact the security team for more information

Search for the vulnerability at kb.cert.org and implement the solution recommended. 
Subsequent vulnerabilities scans should show fewer vulnerabilities as they are remediated.

Have Questions or Still Need Help?

IS&T Contributions

Documentation and information provided by IS&T staff members


Last Modified:

February 15, 2019

Get Help

Request help
from the Help Desk
Report a security incident
to the Security Team
Labels:
infoprotect infoprotect Delete
Enter labels to add to this page:
Please wait 
Looking for a label? Just start typing.
Feedback
This product/service is:
Easy to use
Average
Difficult to use

This article is:
Helpful
Inaccurate
Obsolete
Adaptavist Theme Builder (4.2.3) Powered by Atlassian Confluence 3.5.13, the Enterprise Wiki