Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Setup the hardware and get connected to the network
  2. Configure any software that is needed
    1. Configure Code42 Crashplan UTBackup
    2. Configure Cisco VPN
    3. Configure Box Drive
    4. Install Mainframe (if needed)
    5. Install FileMaker (if needed)
    6. Set up E-mail client
  3. Install printers and drivers
  4. Transfer data (if needed)
  5. Transfer Bookmarks (if needed)
  6. Configure admin account (if needed)
  7. Review the security standards applied to your computer
  8. Answer any questions you may have

...

UT Box: We highly recommend using UT box to store all your data. You sign into box with the username (Your EID)@eid.utexas.edu. Here are some benefits:

...

  1. The computer will lock after 15 minutes of inactivity to comply with IRUSP 15.2.5.
  2. You cannot use an admin account as your day to day account so if you need admin rights we setup an “admin-EID” account in order to comply with IRUSP 5.8.2. Please review this document that outlines the responsibility you take on when you have admin access to your computer.
  3. The computer is installed Cisco Amp for configured with Microsoft Defender for Endpoints for antivirus in order to comply with IRUSP 1.7.14
  4. The computer is firewalled to on campus and vpn networks for the following protocols to prevent the device from being quarantined by the University’s Information Security Office:
    1. VNC
    2. RDP
    3. SSH
    4. Port Mapper
    5. Print Sharing
    6. File Sharing
  5. If it is a Mac, iCloud Drive usage is locked in order to comply with IRUSP 11.2, if you need iCloud Drive please let us know and we can make accommodations as long as you sign off you will not store confidential data on iCloud Drive.
  6. Encrypt the computer using FileVault (Mac) and BitLocker (Windows) in order to comply with IRUSP 11.3.

...

You can access many pieces of software by opening the 'CNS App Store' on Mac or 'Software Center' on Windows. For a full list of available software via the App Store please see this list. We also offer the following licensed software-

...

  1. Verify you have signed the Acceptable Use Policy.
  2. Verify you have completed the security awareness training.
  3. Review the Sensitive Research Data Management.
  4. Review the Sensitive Data Classification.
  5. Review the Record Management Schedule.
  6. For a compressive list please see this page.