/
Minimum Security Profile for Supported Computers

Minimum Security Profile for Supported Computers

 

Overview

To ensure the effective support, security, and maintenance of the computers used by faculty and staff, the University Information Security Office (ISO) has established minimum security requirements for all computers used for University business.

ISO Standards

Standard

Description

Standard

Description

Account and Directory Standards

All computers shall use Austin Active Directory managed user accounts.

Application Patch Management Standards

Core applications shall be regularly patched.

Backup Standards

All computers shall be configured to be backed up via UTBackup services.

Computer Naming Standards

All managed computers shall adhere to the Computer Naming Standard.

End User Administrative Accounts

User accounts shall be configured as non-administrator accounts. Users with and administrator privileges must comply with best practices for the usage of that account.

IT Staff Administrative Account Standards

All computers shall have an administrative account configured for usage by technical support staff. Anyone using accounts with elevated access privileges of this type must adhere to the UT-IRUSP access requirements.

Encryption Standards

All computers shall be encrypted.

Operating System Standards

All computers shall have an Operating System that is supported by the vendor, and updated to the current patch release.

Security Setting Standards

All computers shall have the following security settings implemented:

System Log Standards

All computers shall be configured to provide a minimum of 14 days of system logs.

Systems Management Tool Standards

All computers shall be enrolled in the appropriate Endpoint Management Platform.

Vulnerability Management Standards

All computers shall have the Nessus vulnerability agent installed.

Virus and Prohibited Software Standards

All computers shall have Defender for Endpoints installed and enabled. University computers shall be compliant with ISO prohibited technology and covered applications policy.


 

Date

Action

Implementer

Date

Action

Implementer

2025-03-03

  • Policy Update: policies have been verified as current.

  • Migration: Article migrated to the LAITS public space for enhanced accessibility.

 

Related content