Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Summary of action

EPM is blocking access to the below listed applications and services on all devices enrolled in EPM using Microsoft Defender for Endpoints. 

Alipay 

This document details a planned approach to blocking restricted applications, domains, and services using Microsoft Defender and DNS network restrictions. UT Austin is currently out of compliance with Executive Order GA-48. The targeted applications to be blocked according to the Governor's Executive Order include: 

  • Alipay 

  • Tencent Holdings Ltd. 

  • ByteDance Ltd. 

  • Tiger

Brokers 
  • Brokers 

CamScanner 
  • CamScanner 

TikTok 
  • TikTok 

DeepSeek 
  • DeepSeek 

VMate 
  • VMate 

Kaspersky 
  • Kaspersky 

WeBull 
  • WeBull 

Lemon8 
  • Lemon8 

WeChat 
  • WeChat 

Moomoo 
  • Moomoo 

  • WeChat

Pay 
  • Pay 

  • QQ

Wallet 
  • Wallet 

  • WPS

Office 
  • Office 

RedNote 
  • RedNote 

  • Any subsidiary or affiliate of an entity listed

above 
  • above 

Estimated timelines

Windows and iOS:

Testing with TRECS and eligible academic ITSOs from 12/19/22 to 12/22/22. Successful testing criteria: 100% of devices enrolled block access to TikTok across all browsers. No other network activity is impacted. 

In production globally on 1/02/23.

macOS:

Testing with TRECS and eligible academic ITSOs from 12/20/22 to 12/22/22. Successful testing criteria: 100% of devices enrolled block access to TikTok across all browsers. No other network activity is impacted.  

In production globally as of 01/02/23. 

Windows

Requirements:

ITSOs must be onboarded to MECM and MDE and have removed any 3rd party antivirus (ex: Amp, Norton, etc) 

Steps:

Configuration Manager Introduction and Onboarding

Microsoft Defender for Endpoint (MDE) Introduction and Onboarding

Support notes:

Systems should be running a supported release version to be compatible with Network Protection in order for the block to be successfully applied.
Windows 10 any supported release version
Windows 11 any supported release version

End-user experience:

Some may see a SmartScreen notice such as the one below, many will see the various TikTok related domains returning an error that it's not available. 
Image Removed

The Microsoft store download itself is not blocked, so a user would be able to install the app however they will not be able to launch it.
Since the apps requires Edge, they will see the SmartScreen notification even if their default browser is set to something else:
Image Removed

The Windows Security message will appear for anyone attempts to open TikTok or a TikTok cookie is active in the background. If the notification is showing up persistently, cookies will need to be cleared from the browser going back to before TikTok was accessed. 

Image Removed

Apple

iOS:

Requirements:

iPad, or iOS device Supervised* and enrolled in central Jamf instance

Steps:

Configuration profile will be scoped globally. No additional steps are needed from ITSOs to take advantage of the TikTok block provided by EPM

Support notes:

*iOS devices are supervised when enrolled via Automated device enrollment. This can be accomplished using Apple School Manager or Apple Configurator 2. On device you will see "This device is supervised and managed by University of Texas as Austin" in the top most area of the settings app. 

End-user experience:

TikTok app will be removed from the iOS device if installed. If an end user tries to navigate to a TikTok URL they will see "You cannot browse this page at "tiktok.com" because it is restricted"

Image RemovedImage Removed

MacOS:

Requirements:

macOS computer is enrolled into the central Jamf Instance

Steps:

After the Jamf policy has been installed, the web browser will need to be quit for changes to take effect. If the browser is left running during installation, the URL redirect will not be enforced until it is next opened

macOS Policy will be scoped globally. No additional steps are needed from ITSOs to take advantage of the TikTok block provided by EPM

Support notes:

Policy is set to run at next check in of machine. (0-15 minute check in) 

End-user experience:

On macOS we are routing all TikTok URLs to a dead IP address. End users will see a failed to load webpage unique to the browser they are using. (ex: Safari can't open the page because the address isn't valid) No app exists for TikTok on macOS. 

Image RemovedImage Removed

Objectives 

Schedule 

  • Testing of added application block for the week of February 21st 

  • ITSO testing of the Cisco removal process during the weeks of February 21st   

  • Removal of Cisco AMP on February 25th 

  • ITSOs verify MDE is not in passive mode by Feb 26th 

  • Begin blocking all restricted applications for MDE and Networking DNS on COB Thursday February 27th 

QA for Managed Endpoints using MDE 

Already completed testing: 

  • The proposed blocking solution leveraging MDE will be using the same mechanisms that have been in place for 2 years on Windows devices with the TikTok block. The primary change is moving from manual curation to an automated vendor supported solution so that we can more easily include an expanded list of restricted technologies. 

  • The EPM team has blocked DeepSeek on all MDE enrolled devices using the new capability and curated list from Microsoft, as it was in use by a limited audience (86 out of 18,459) and the block was successful with no unintended consequences. 

  • The testing and publication of CiscoAmp removal  

  • Identify another low use application to enroll in blocking by COB February 19th 

Next Steps:

  • Publish the results to the EPM committee by February 21st 

What to Expect 

  • Networking: Implement DNS filtering of restricted technologies and applications in alignment with MDE

  • EPM: Enact block of restricted technologies and applications via MDE Network Protection 

  • EPM: Remove Cisco AMP from all workstations and install MDE  

  • ITSOs: Responsible for ensuring MDE is on all devices and not in passive mode. 

  • End User Experience: End users will experience limitations in accessing certain restricted applications on university own devices and via the UT network.

  • Applications will not be uninstalled from devices.

  • Personal devices are out of scope for EPM management and will not be controlled by MDE.

Examples of alerts for an end-user:  

image-20250220-211806.pngImage Addedimage-20250220-211855.pngImage Addedimage-20250220-211937.pngImage Added

Risks and Challenges 

  • UT Austin must attest to compliance with this state law and it’s likely we’ll be audited. If the proposal isn’t adopted UT Austin will be in violation of Texas State Law, which will make UT liable and vulnerable to legal action. 

  • The MDE block solution will be all or nothing. All devices using MDE will receive the EO complaint restricted application blocks. Exceptions will require unenrolling from management.  

  • A risk of EPM removing AMP is that some may have enabled Group or Local Policy to disable Defender. So that in removing Amp, Defender will not re-enable. Endpoints could be left without required Threat and Vulnerability Management software like Anti-Virus.  

Exceptions 

Based on DIR’s guidance:  

  • ITSOs will follow the current exception process to submit a request.  

  • The ISO will review and when ready, the request will then go to Legal Affairs for review, as well as the President for internal awareness/approval.  

  • After the President’s review, the request will then be submitted to the Board of Regents for awareness and also to DIR for review/approval.  

Communication Plan 

Clear and consistent communication will be maintained with all stakeholders to ensure awareness and understanding of the blocking measures. 

Communication 

Channels of Communication 

Audience 

UT Legal to send out announcement of need to comply with new EO

University Wide Email

Campus Wide

ISO to announce legal requirement to block restricted technology and what to expect as well as the implementation date (see above) 

UT IT Community, ISO website  

Campus Wide 

EPM cross post ISO announcement on Teams 

EPM ITSO Teams Channel 

ITSO admins 

EPM email to ITSOs 

IT Updates UT List 

Campus IT Community 

Networking announcements more communication and engagement will follow from the Networking team once a DNS filtering process is in place. 

IT Updates UT List 

Campus IT Community 

Technical Implementation 

  • Managed Endpoints: 

  • Windows hosts in MDE: Select applicable services to block from the available list. 

  • macOS hosts in MDE: Implement similar blocking measures as Windows hosts. 

  • Unmanaged Endpoints:  

    • Rely on network-based filters to block restricted applications. 

General Approach 

  • On managed endpoints move towards DNS name-based filtering based on filtering domains associated with prohibited services at the endpoint 

  • Maintenance of associated domains will be handled by Microsoft  

  • Categories/names of services in MDE to be blocked to be decided by ISO and Legal 

  • For unmanaged hosts DNS domain resolution filtering will be used 

  • Networking will implement DNS firewalling on the campus DNS resolver

  • Domains will align with the Microsoft-curated domains in MDE 

Scope 

  • UT-owned, centrally managed devices 29,654 

  • Policy prohibits installation and use of prohibited technologies  

  • Enforcement via EPM/MDE controls  

  • Controls applied on device and enforced on and off campus 

  • UT-owned, non-centrally managed devices ~2,225*i 

  • Policy prohibits installation and use of prohibited technologies 

  • Enforcement via network controls while device connected to UT network 

  • Non-UT-owned devices ~300,000 

  • Enforcement via network controls while device connected to UT network 

Managed Endpoints 

  • Windows hosts in MDE 

  • Select applicable services to block from available list 

  • macOS hosts in MDE 

  • Select applicable services to block from available list 

Unmanaged Endpoints 

  • Rely on network controls (DNS) 

Network 

  • DNS filtering implemented on campus DNS resolvers 

  • Align filter lists with domains associated with blocked services in MDE (updated daily)

Reference for Compliance and Security 

 

Insert excerpt
EPM Documentation
EPM Documentation
nopaneltrue

Panel
borderColorblack
titleColorwhite
titleBGColor#005f86
borderStylesolid
titleSection Content
Child pages
depth2
pageEPM Support and Reporting