You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

Self-supporting a Cornell computer means taking on additional tasks and responsibilities.

Task or ResponsibilityTips, courtesy ChemITFYI: How it is done for managed computers.Notes
Creating an Admin account

Create a strong password

http://www.it.cornell.edu/security/how.cfm?cat=4&tip=144

Group's faculty member and IT Rep. is offered this account, using password entered by IT Rep.

CU Policy 5.4.1, p9: Protect the resources under your control with the responsible use of secure passwords and by appropriately establishing an administrator password.

http://www.it.cornell.edu/security/how.cfm?cat=4

Creating and primarily using a User (non-Admin) accountThis is required by Cornell policyAutomatic, via Cornell's Active Directory

CU Policy 5.10, p16: Configure user privileges to be as low as possible while still meeting operational needs. Consistent or regular use of any account with administrative privileges is inappropriate.

Keeping the OS and applications updated   
Responding to IT Security Office inquiries   
Installing local printers   
Installing MS Office

Download from Office 365 account:

Use Cornell's central licensing infrastructure and processes for IT support providers. 
Adobe Acrobat or Adobe CS

Employees only:

Use Cornell's central licensing infrastructure and processes for IT support providers. 
Encryption: Whole-disk Planning underway (as of April 2016)By Jan 2017: CU Policy 5.10, p17: All university-owned desktops, laptops, smartphones, tablets, and other portable computing devices must utilize whole-disk-encryption software to protect all local, persistent storage when the system is powered off.
  • No labels