Create a consistently configured environment that is secure against known vulnerabilities in operating system and application software. The server owner must know which security issues and software updates are relevant to their environment, and who is the person responsible for keeping up to date on newly released patches and security issues that affect the systems and applications deployed in their environment.
Firewall Rule Registration
Servers on the university’s network that require inbound access from the Internet must be approved and registered with the Information Security Office. To register, please fill out our form.
Server Owner Responsibilities
Anti-Virus and Spyware
Download the latest virus removal tools from a university-approved licensed anti-virus and spyware software product. The IT Service Desk can assist you with installing a university approved Anti-Virus and Anti-Spyware product.
Create a system and method for secure data transmission, data storage and data retrieval over the network. All data containing high-risk, restricted or confidential information must be encrypted.
Third party or guest servers may be hosted on the university’s network only in agreement with the Director of Systems and Network Management and must be registered with the Information Security Office. The person registering the site is responsible for ensuring that the server content and management comply with this guideline and university policies.
Generally accepted ports allowed in the firewall rules when registering a server include:
- 80 (HTTP)
- 443 (HTTPS)
- 22 (SSH/Secure Shell)
All other requests for ports that are required for inbound access from the Internet (affecting the perimeter firewall rules) must be documented with a legitimate business or academic purpose and approved by both the Information Security Office and Network Security Administrator. Any questions regarding the registering of a server can be sent to email@example.com.