Deployment of Computers
In order to provide better service, network performance and security, all devices attached to the UW-Superior network (wired or wireless) must be registered with, and certified by, Technology Services. Technology Services manage several device databases used for network security, performance and reporting. This policy does not apply to the UWS-Visitor network. In addition, there may be temporary wireless networks setup that may be exempt from this policy.
Campus IT staff has the authority to allow/deny attachment of the device based on its meeting the following criteria:
- The device must be registered with and authorized by Technology Services. This requirement may be filled through an automated system upon connecting to the network.
- University owned devices must have their initial configuration performed by Technology Services Staff.
- The device's network settings must be configured by a Technology Services. See below - Networking Configuration.
- The registration of the device must include information about the person assigned as primary user or/and administrator of the device. "Server" class systems must have designated systems administrators who are qualified and employed by the University. They will be responsible and accountable for any security breaches that originate from a system for which they are custodian. See section below - Device Classification.
- The device has to meet minimum security standards as defined by Technology Services. See section below - Minimum Security Standards.
- Local administrator access to University owned systems may only be granted if certain requirements are met.
All network-attached device purchases must be approved by the Technology Services. Upon delivery, the Technology Services Helpdesk must be notified to make arrangements for University Technicians to perform initial configuration and deployment. Any devices that do not comply with these policies may be disconnected from the network. See Policy on Disconnecting From the Network . Designated "Server" class systems administrators are required to sign a declaration attesting to their awareness and knowledge of the University Information Assurance policies. A user wishing to have local administrative privileges to a University owned device must contact the Technology Services Helpdesk in order to obtain the proper forms.
Please note under some circumstances, systems that would normally be deemed threatening to network performance, integrity and security may be authorized by Technology Services in an effort to facilitate the primary campus mission of educating students.
If a department feels that a device has been inappropriately blocked or restricted, it may request a review of the decision by the Chief Information Officer. If, after the review, there is still a disagreement with the decision, it may be further reviewed by the Provost.
- All devices attached to the network must have a name and an Internet Protocol (IP) address.
- IP addresses must be configured by a Technology Services Dynamic Host Configuration Protocol (DHCP) server.
- If a static IP address is necessary, Technology Services will provide one.
- Multi-user-attach computer, virtual machine or game console.
- Computer, Telephone, Tablet, MP3 Player
Minimum Security Standards
- All devices attached to the network may be scanned for viruses, vulnerabilities, security threats and restricted network services.
- Certain services will not be allowed without first notifying Technology Services.
- Must have adequate and current virus protection.
- Must be physically secured to prohibit access by unauthorized personnel