DE Service Definition Sandbox

(Work in progress to update customer web page and internal use wiki)




notes from web version:
My preference is that all contact is initiated through DSS helpdesks first as a filter.

  • Operating System and Software Support (****Note: Upon thinking about this, I don't think we need this in DSS. I don't want to have a user think they are limited to just these things. I'd rather have them call us and ask to fix whatever the issue is, and then we can either direct them to the right place or help them****) 
    • LAITS will assist supported faculty, staff, and researchers with most issues related to computing devices, including, but not limited to:
      • Patching and Security > link  to EPM
      • Software Applications / Self Service > link  to EPM
      • Remote Access > 


  • Patching and security standards
  • Enrolled computers will receive regular patching, malware protection, backup, and security
  • Enrollment includes BeyondTrust™ Remote Support Client as a standard application for remote assistance
  • standard software applications onsupported computers   
  • Automatic updates of Antivirus applications
  • Critical security updates may be applied outside of the regular patch schedule, with a notice to the customer contact as listed on the SLA
  • LAITS will work with end users to remediate any ISO quarantines on vulnerable systems, and will assist with evaluating and requesting exceptions as required for business purposes.
    If systems are quarantined by the ISO, LAITSWhen quarantined by ISO - Actively monitor and remediate vulnerabilities
  • File exceptions with ISO, when appropriate


web description

The desktop engineering team ensures customer computers and printers are configured and maintained to meet Information Security Office (ISO) requirements including regular patching, malware protection, backup, and security.


Computer Provisioning (Imaging)

Desktop Engineering formats computers with standard software, functionality and security privileges before they are released to users

  • Maintain base images with standard software for all recommended models (Dell Apple)

    • Recommended computers can usually be imaged with standard software and deployed within 5 business days of receipt.

  • Install non-standard software prior to deployment

    • DE staff must have the license information upon receipt of the computer. 

  • Install the latest approved OS by default

    • New Apple computers must be configured with the OS that they were delivered with.


  • Tablets and Mobile Devices 
    • Devices must be purchased through Campus Computer Store
    • Apple devices must be enrolled in Apple School Manager to facilitate patch management
    • Configured to prevent users from unintentionally wiping iPads and other iOS devices 
  • Prevent users from unintentionally wiping iPads and other iOS devices.


LAITS Staff do not:

  • Image devices that are unable to connect to our systems (no ethernet port).

  • Install software on unmanaged iOS devices.

  • Install non-current OSes unless a specific business reason is approved by LAITS management.

    • non-supported OSes are never allowed

  • Install Dual-boot systems.

  • Image machines that don't officially support one of our approved OSes.

  • Image custom-built computers, unless we built it.  (see notes)



Internal staff Notes

Preventing device wiping

This is known as "supervision" and has no other effect on the device.


Custom-built computers

There are some computers that were custom built in the past by LAITS, but this is a practice that will not be supported henceforth.



Fleet Management Policies

In order to successfully support, secure and maintain the fleet of computers in use by faculty and staff, LAITS staff have developed a minimum security profile for supported computers.

  • Apply Minimum Security Standards to all computers
    • EID Login required

    • Applications / OS are patched

    • Computers are backed up

    • Computer name is standardized

    • Faculty / Staff devices are encrypted

    • IT staff can access any device

    • Hardware must be modern

    • OS must be within the top two vendor supported versions

    • University Warning Banner presented at logon

    • SSH access disabled

    • File sharing disabled

    • 15-minute screen saver with password required

    • Firewall is enabled

    • Access is logged

    • Systems Management tools are installed

    • Virus/Malware protection is active


  • LAITS Staff do not:

    • Change top-level settings (Minimum Security Standards) without significant investigation and customer communication

    • Remove or change security settings due to user preference (business reason is required)

    • Restrict the ability to connect to a home wifi network

    • Support machines that do not have our management software or admin rights


Internal staff Notes

Exceptions - Review whether we want this on the actual service definition or not

Most exceptions have a standard way to compensate for the rules. Sometimes it's as simple as adding the computer to the correct group in LANRev. The exception form is still required, but make sure to check for existing exceptions before inventing a new strategy.

Screensaver exception procedure.


  • Allow exceptions to support research and business needs. (see notes)



Backup Management

Backup management is the process of monitoring, maintaining, testing and deleting obsolete backups on a regular basis to ensure your stored data is reliable, accessible and compliant with the University of Texas standards.

  • Configure Crashplan for individual computers.
  • Configure the client software to thdefault for LAITS-supported computers.
  • During deployment, ensure a backup is initiated and verify a successful client software connection to the service.
  • Before warranty repair, ensure a current backup exists.
  • Configure the client software to send alerts to the user when the backup fails.  (see notes)
  • Restore files from the cloud, if a backup is available.
  • Delete old backup records after a new computer is connected.
  • Move user & device accounts from other CSU's, when a user switches department. 
  • See Desktop Support (LINK)

The Desktop Engineering team is responsible for controlling the base configuration settings for our instance of Crashplan. The core service is ultimately owned and controlled by central ITS and as such we are limited in the scope of changes we can make. The Desktop Support team is available to assist with your individual backup configuration needs.


LAITS Staff do not:

  • Monitor backup status for client computers.

    • The user can contact LAITS Desktop Support for guidance on how to fix any issues.

  • Provision Crashplan for shared or research lab computers.


Internal staff Notes

Failed backup notifications

Users receive an automatic email notification after 14 and 30 days with no backups.

Backup for shared lab computers

This does exist in some places, but is not a good standard and will not be supported henceforth.




Operating Systems Support

Staff support the operating system (OS) which manages all of the software and hardware on a computer. 


Support macOS and Windows

  • OS must be within the top two vendor supported versions

  • Support is limited to the compatibility of our Systems Management tools

  • If a problem occurs on a lower Operating System, our first recommendation will be to update the OS

  • Keep a limited set of older OS versions which can be used for troubleshooting and special cases

  • Current recommendations - macOS (wiki link is internal, so what do we want customers to know? )

  • Current recommendations - Windows (wiki link is internal, so what do we want customers to know? )

I believe we agreed to eliminate the explicit definition of what versions we support for ease of page serviceability  

The currently-supported operating system versions are:

MinimumOS X 10.15.7 (Catalina)
For systems that are 2014 and older.
Recommended

OS X 12.4 (Monterey)
For systems newer than 2014 and have solid state drives.


Windows current supported operating systems versions are:

MinimumWindows 10 Enterprise v1709 (Semi-Annual Service Channel) OS build 16299
Recommended*

Windows 10 Enterprise v1903 (Semi-Annual Service Channel) OS build 18362


OS Upgrades

  • Review a new operating system when it is released and approve it when stable.

    • Once approved, the OS version becomes the default for deployment on new and re-imaged computers.

  • Prevent users from self-upgrading macOS until we've approved the new version

  • Find and upgrade computers when a Windows version is no longer supported by Microsoft (End of Life - EOL)


LAITS staff do not:

  • Guarantee compatibility with our software or security standards for macOS versions lower than or newer than our current recommendations

  • Test and push Windows updates (this is done by ITS through the campus WSUS server)

  • Support non-server Linux operating systems

  • Support Dual-boot for single-user machines


Internal staff Notes

Refer all special OS requests to the desktop engineering team

Staff do not 

  • Approve new macOS versions right away; generally, approval is not given until after 3 minor versions have been released (ex: 10.11.3)
    • beta versions are also not supported (see notes)

Beta/non-recommended versions

Beta or non-recommended new operating systems will be treated with Reasonable Support


Staff do not support dual boot  for single-user machines 

  • We can provide a Windows ISO and instruct the users as to VM options, and let them know that there is risk that ISO will quarantine the host machine if it doesn't have current patches. Recommendation is to keep the VM disconnected from the network.
    • If a quarantine occurs, we will not help troubleshoot, we will just remove the quarantine
    • Backup, etc. is the responsibility of the user, LAITS will not help

Malware and Antivirus Protection

Desktop Engineering installs Malware and Antivirus protection to scan, detect, and remove viruses, and to safeguard a device from spyware and worms designed to hack into a computer. 

  • Install Microsoft Defender for Endpoints on both Windows and macOS computers

  • Apply a default profile to each computer with the following settings:

    • Scan weekly on Sunday at 12:00 pm

    • Respond to virus alerts and quarantines

    • Scanning Exclusions for certain folders (programs and caches controlled by LAITS)

    • Monitor Program installation

    • Monitor Program execution

    • Monitor network connections

  • Configure scanning exceptions to support business needs


LAITS Staff do not:

  • Configure Antivirus applications to scan email

    • UT Ironports does this on the server side, so it is unnecessary to scan on the device


Internal staff Notes

LAITS Staff do not:

  • Configure Antivirus applications to scan email
    • UT Ironports does this on the server side, so it is unnecessary to scan on the device




Quarantines and Security/Abuse Notifications

Desktop Engineering staff actively monitor and remediate vulnerabilities referred by the UT Information Security Office.

  • Actively monitor and remediate vulnerabilities referred to us by ISO

  • Vulnerable/Compromised Devices - Respond to quarantines of devices on LAITS-managed networks (see notes)

    • UT Device - Fix the problem

    • Non-UT Device - disconnect from network, refer to ITS

  • DMCA notices - Identify user by EID (if possible) and reply to DMCA Agent

  • SSN remediation - Notify department head or IT contact

  • Deploy standard preventative settings as part of our Minimum Security Profile for Supported Computers

    • (List out the minimum lists for customers? Link is internal to LAITS)


LAITS staff do not:

  • Respond to quarantines for devices outside of LAITS-managed networks

  • Respond to Compromised EID notifications - no action, ITS must reset password

  • Guarantee protection from any kind of security problem

  • Threats are ever-evolving, but DE staff do their best to keep computers secure


Internal staff Notes

Responses are further defined in our Security and Abuse Notification and Remediation Policy


Quarantined devices

Quarantined devices can sometimes be difficult to track. If a device is quarantined on the wired network, it is not immediately quarantined via the wireless network. So, the user can simply unplug and walk away. If we cannot find the device, we cannot solve the problem. We will search:

  • LANRev
  • Network MAC lookup via the TSC Tools
  • CLAIM
  • Jamf
  • MECM

If device isn't found, we will leave the quarantine in-place until it expires.

Distributed Partners 

Some units provide their own desktop support and purchase only Desktop Engineering from LAITS.  

  • Provide limited access for our distributed partners to the following tools: (see notes)

    • Active Directory OU –  the technician will have full access

    • macOS local itadmin account - a separate password will be created and applied to their Zone device

    • Microsoft Deployment Toolkit (MDT) – access to deploy LAITS pre-configured images

    • Adobe Management Console - admin rights to their own VIP group

    • Crashplan - Org admin rights for relevant units

    • LANRev – add/remove/deploy software to their Zone

    • DeployStudio – access to deploy workflows (requires pre-staging from a LAITS staff member)

    • Bootstrappr - read & mount access to file.laits.utexas.edu, which contains images

  • Provide limited assistance in packaging unit-specific software

  • Configure Crashplan to deliver Org reports to partners

  • Enable ISO Quarantine notices to be sent to the partner (see notes)

    • help with identification/location, if necessary (not common)

  • Allow limited specific (already configured) software and configurations to be applied to a group of computers upon deployment


LATIS Staff do not:

  • Configure/Maintain specialized images unless there is a specific business reason or SLA.

  • Create separate local admin accounts (macOS) - itadmin is the only option

  • Monitor specialized software for new releases

  • Prioritize deploying new releases of specialized software (expect 2-3 weeks)

  • Do training for our tools, outside of previously published wiki articles.

Internal staff Notes

Toolset for Distributed Partners

Some partners have historically only had access to certain tools, but they are all entitled to this full set if they request it.


ISO Security Notifications

Distributed partners should be directed to have their department managers configure OHS contacts IT Security Custodian roles so that they receive ISO notices directly.


Mobile Devices

LAITS supports iPads for faculty and staff

  • LAITS supports iPads, but does not provide support for other mobile devices (iPhone, Android, Fire Tablet). 

  • Devices must be purchased through Campus Computer Store.

  • To be supported, devices must be enrolled in Apple School Manager and Jamf to facilitate patch management.

  • Any system that is no longer receiving software updates from Apple must be retired.

  • Staff will assist with theft recovery / activation lock as necessary


Internal Staff Notes:
Jamf enrollment is also required for such devices.

We supervise so that we can recover the device. if someone signs in with AppleID, supervision prevents the device from being locked to the personal Apple ID.



Software availability and distribution

DE staff maintain a portfolio of standard software available to install on customer computers


  •  (wiki FAQ)
    • ESRI ArcGIS
    • ERDAS Imagine
    • Mathworks MATLAB 
  • Include BeyondTrust™ Remote Support Client (formerly Bomgar™ Remote Support Client) as a standard application for remote assistance.

LAITS Staff do not:

  • Purchase non-Adobe software

    • Many products can be purchased here.

  • Store or manage license keys (see notes)

    • Specifically, Adobe Creative Cloud licenses are managed by departmental contacts

  • Install software outside of the terms of service

    • no unlimited re-installation of trial software

    • no terminal servers for circumventing licensing agreements

    • no other methods to circumvent licensing agreements

  • Install Microsoft Office using the O365 portal (use this method for personal machines)

  • Install Adobe Creative Cloud applications; customers can install them on their own through the Creative Cloud application once a license is assigned

    • This does NOT include student labs & classrooms

  • Keep track of releases of non-standard software



Internal staff Notes

We have VIP accounts for the following departments

      • COLA - LAITS-Jonathan  LAITS charges back to sub-department after purchase

      • ARCH - pre-approved named-user licenses for any faculty or staff member. They settle-up with Adobe at the end of the year.

      • David Welch to fill out rest of the list


License keys

Historically, we have stored keys when they were sent to us. This should not be relied upon, but may have useful historical information: Google Sheets List


Contacts:

ESRI: laits-license-help@utexas.edu - for license management (will open ticket in LAITS-License-Support) OR contact DE team member for connecting software clients to licenses

MATLAB: laits-license-help@utexas.edu (will open ticket in LAITS-License-Support)

Filemaker Pro: Andrew Masson

Standard Software: LAITS-DE@austin.utexas.edu



Software and Operating System Updates

(need a short declarative description of this service)

DE To decide on the italicized section

Application Updates

Most common application updates are curated and executed by the central Endpoint Management Team. Please refer to the following link for an exhaustive list of the software that is maintained as a part of this program:
3rd Party Updates List

  • The following applications are Staff Patch during the third week of each month (see notes):

    • Adobe Flash

    • Adobe Reader

    • Chrome

    • Firefox

    • Java

    • Microsoft Office


Operating System Updates

  • macOS updates

    • Safari

    • Apple Firmware (model-specific)

  • Windows OS updates

    • Internet Explorer / Edge

  • Enable automatic updates of Microsoft Defender for Endpoints

  • Allow reboots to be deferred up to 8 hours, and then the computer will be automatically rebooted (Windows only)

    • A script checks weekly at 4pm on Thursdays and starts a reboot with 8 hour timer, if a reboot is required after updates

  • Apply critical security updates outside of the regular patch schedule, with a notice to the customer contact as listed on the SLA

    • non-deferrable reboots may be employed, depending on severity


LAITS staff do not:

  • Patch software not defined in the list to the left

  • Patch more often than monthly

  • Maintain old versions of software

    • When software breaks due to old OS versions, the default answer will be to upgrade the OS before troubleshooting further



Print Management

LAITS maintains a list of recommended printers that are fully supported. They also review and update this list each summer or as new models are released.

DE staff support:

  • Printer Setup:

  • Set up new printers within 5 business days (recommended models), (see notes)

    • Non-standard printers may take longer to install, if possible at all...

  • Provide campus-only IP addresses and configure DNS records (Network Team)

  • Create print queues set up through the central LAITS print server

    • Includes Mac print driver packages

    • Deploy Printers to Windows & Mac via automated policy
  • Request Mail relay whitelist to allow scan-to-email

  • Connect Fax lines (see notes)

  • Standard configuration

    • Adherence to printer and print queue naming standards (Printer Naming Standards) DEPT-Room-Purpose-Feature

    • Adherence to standard security settings (Printer Security Standards)

  • Attempt to support non-recommended models (reasonable effort)


LAITS Staff do not: 

  • Obtain and maintain the contract with an approved university vendor

  • Refill or replace Paper or toner/ink

  • Support Fiery front ends

  • Provide Printer hardware maintenance

  • Manage print codes/restrictions  (see notes). LAITS does not configure or maintain User Authentication Management and Account Codes on departmental printers.

    • If a special driver is necessary, LAITS will push the driver remotely or send the package to a department contact for installation

  • Manage Accounting/usage data (see notes)

  • Manage address books or contact lists (see notes)


Internal staff Notes

New printer setup

LAITS should be notified immediately when a replacement printer contract is signed. If a printer arrives to replace an old one, we will not drop everything to go set up the new one (it may take up to 5 business days)


Fax lines

Fax lines require ITS chain of work to move or add and may take an additional two weeks to process.


Print code management/restrictions

Some departments have historically received limited accounting, print code, address book, and restriction services. If requested, refer to management to see whether this will continue.



Staff Resource Accounts

DE provides support to set up new resource accounts, shared calendars and departmental mailboxes.

  • Help assess the best tool for the customers' needs

    • UTList vs Resource Account vs Distribution Group

  • Set up new resource accounts, shared calendars, and departmental mailboxes

  • Create departmental shared UTBox folders

    • Add co-owners, who can then add editors on their own

  • Assist if all departmental representatives leave the university and the remaining department staff need access to mailing lists, distribution groups, shared calendars, or resource accounts.


LAITS staff do not:

  • Create or maintain UTLists

  • Handle daily management of UTBox folders (e.g., adding editors)


Internal staff Notes




Lost or Stolen Devices

If a computer is missing, DE staff can search the network to determine if the device is on campus or online.

Staff members must report lost or stolen equipment the UT Police Department and report to ISO

After devices have been submitted to Inventory as missing:

  • Search Endpoint Management applications immediately to determine if the IP is on-campus

  • Set alerts in Endpoint Management applications to watch for the device to come back online

  • Limit 5 devices, expect slow turnaround

LAITS Staff do not:

  • Certify departmental inventory, including:

    • Locating a list of devices prior to inventory being complete

    • Completing ISORA

  • Update computer locations in DEFINE during non-move support interactions

  • Monitor faculty and staff location moves

  • Store devices outside of unit-owned spaces: a departmental representative should hold all unused equipment


Internal staff Notes

Missing devices

Our limited network access means limited success, but we can see where a device has hard-wired connected in the past 180 days.




INTERNAL ONLY Contact Information

Helpful Links: