Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The University of Connecticut uses Device Management platforms to enhance the security of university-owned devices and better protect individual’s individuals' and institutional data. ITS uses Intune for Windows and Jamf for Macs.  These are both comprehensive device management platforms that ensure workstations have up-to-date security. This includes:

...

Enrollment includes Microsoft Endpoint Detection and Response (EDR), which allows ITS to better prevent, respond, and contain attacks targeting UConn.  It also enables ITS to mitigate data exposure. If a machine is compromised, then every device associated with it – every device you’ve logged into and every device on your network – is also at risk until they hit a control barrier. EDR provides us the ability to quarantine a compromised device and contain it, minimizing , prevent spread to other devices, and minimize the damage to the institution.

It also enables remote remediation, which vastly reduces the institutional response required if When a device is lost, stolen, or otherwise compromised. When a device is lost there is a labor intensive , a lengthy and intrusive process is initiated to determine what was on the device. information it contained.  With Intune and Jamf, we can ensure encryption and remotely wipe the device to prevent unauthorized access to your information.  This greatly reduces the institutional response.

Why Does UConn Manage Devices?

...

  • The Data Classification policy defines the classifications of institutional data (i.e., the categories of data that the University is responsible for safeguarding) and the associated measures that are necessary to safeguard each classification. 

  • The Data Roles and Responsibilities policy defines the responsibilities of individuals within the organization in protecting the University of Connecticut’s data assets. 

  • The Mobile and Remote Device Security Policy defines the minimum device configuration and requirements for university and non-university owned devices, such as cellphones, tablets, laptops, and other transportable assets.

  • The System and Application Security Policy defines the responsibilities of university employees who are the owner of a technology system, service, or device. Most employees are the identified system owner for their individual university computing device.

  • The Information Technology Acceptable Use Policy defines allowable uses of university technology and systems as well as individual responsibilities for university-owned and personally owned devices used to access university technology or systems.

Failure to comply with standards comes at a cost to the University because it increases risk. It is very labor intensive and difficult for individuals to comply with the applicable policies.  Failure to do so increases risk and cost to the university.  Device Management ensures that university-owned devices meet policy and security obligations and removes the burden from individuals.

...