/
Endpoint Management in CNS
  • Verified
  • Endpoint Management in CNS

     

    Endpoint Management (EPM) refers to a set of tools used by IT to setup, maintain, and support computers. CNS OIT can provide better support because we can see information about your computer that we use along with remote support tools to resolve problems and fulfill requests. EPM also improves security by employing policies designed to protect access to University computers, data, and resources and identifying the presence of specific security vulnerabilities.

    The Endpoint Management (EPM) Centralization and Standardization Program was created to improve the consistency, efficiency, and security of UT devices by establishing centralized EPM tools. IT staff and administrators across UT collaborate to provide a robust and reliable EPM platform.

    The use of central EPM was written into policy at the direction of the Information Security Office, the Executive Vice President and Provost, and the President of the University of Texas at Austin after auditors found that networked devices— and especially computers— are one of the largest security risks we have.

    Security policies for device configuration and management require UT business be performed using computers enrolled in the central EPM platform and administered by trained IT staff. Additionally, IT staff must be able to prove all devices meet minimum security standards to auditors.

    Check back often for updates

    This content is still under development and new content is being added regularly. The date this page was last updated can be seen under the page title.

    Management is required for all UT-owned computers

    macOS

    Apple computers and tablets are managed using Jamf.

    Windows

    Windows computers and servers are managed using MECM.

    Linux

    Red Hat Enterprise Linux, CentOS Stream, Ubuntu, and Debian are managed using Orcharhino.