Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

SERVICES

Self Managed

User’s Options?

OS Installation

Latest Windows 7OS

Latest Mac OS 10.9 via CNS DoIT Imaging Systems minus absolute manage

Admin agrees to manage application, OS updates, and upgrades.

Hardware Repair

Dells Optiplex/Latitude line
Apple line
Others are best effort

CNSOIT runs diagnostics on hardware:
If hardware fails, admin/dept responsible for purchasing hardware.
If hardware is hard drive, CNSOIT images and Admin/User configures/restores from their backup.

Software Support

Reinstall only

Do not provide Application support, only reinstalls. Admin/Staff responsible for supplying software and licenses.

Administrative Access

IT admin access
User assigned to System

CNSOIT retains admin access to computer to assist with best effort troubleshooting. Admin/Staff retains admin access to manage computer updates/upgrades/compliance. Password Policies

Software Updates

User responsibility

Admin responsible for all critical updates. ISO will quarantine if critical updates are missing. Un-quarantine procedure includes admin scanning for viruses and running updates. Admin alerts CNSOIT of cleaned/updated box. CNSOIT removes quarantine.

Antivirus

User responsibility

Admin responsible for all antivirus updates. ISO will quarantine if the machine is infected. Un-quarantine procedure includes admin scanning for viruses and running updates. Admin alerts CNSOIT of cleaned/updated box. CNSOIT removes quarantine.

Data Backup

User responsibility

Admin responsible for backing up data using UTBackup or 3rd party service with encrypted external volume. Admin responsible for file restores from these backups. CNSOIT responsible for re-imaging if OS damaged and Admin responsible for data/software restore.

Data RetentionUser responsibilityBased on data classification standards, users must identify such data and apply data retention schedules against it.

Data Recovery

Best Effort

CNSOIT runs diagnostic and data recovery (if possible). If unrecoverable, alternative option lies with third-party and admin/dept assumes financial responsibility for using service.

Encryption

User responsibility

Admin responsible for complying with ISO requiresments requirements for data encryption. All machines on the network must be encrypted. Admin responsible for supplying inventory of encrypted machines and encryption key management. https://security.utexas.edu/policies/encryption

**Inventory

User responsibility

Admin responsible for maintaining an inventory of all equipment under their administration. Periodic inventory audits will require that they identify all machines noted in the audit.

Network Quarantines due to viruses

CNS IT handles case via a format/OS reinstall minus Absolute Manage User handles data recovery and other software installs.

Admin scans for viruses and running updates. Admin alerts CNSOIT of cleaned/updated box. CNSOIT removes quarantine. If the system is quarantined more than once during a semester, the quarantine will only be lifted after CNSOIT re- images the system and the Admin restores cleaned files/software from backup.

...

NOTE: By default, users are set as standard users on their systems.  A local CNSOIT management account is set as admin to allow the support tools to interact with the client machine.  If there is a business case for having administrative access (provided that you have read and understood the Administraive Administrative Responsibility Matrix), an exception must be filed with the UT Information Security Office.  Once approved, the administrative account will be supplied and the customer will be responsible for using it only to escalate privileges to perform certain tasks on the device.  IT IS NOT to be used to log in regularly as a regular account to perform daily activities like email or web browsing. IT IT IS NOT to be used to escalate any standard account to admin account or any admin account to standard account.  This must be performed only by the CNS IT group once an exception for the change has been granted.  IT IS NOT to be used to remove management or administrative tools installed by CNS IT.  Such actions will be reported to the CNS Executive Director of IT and could be escalated to the UT Information Security Office for further disciplinary action.

...