UAB Cyber Security Ini1a1ve



Similar documents
IT Change Management Process Training

Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars

/Endpoint Security and More Rondi Jamison

Bacula Open Source Project Bacula Systems (professional support)

How To Protect Virtualized Data From Security Threats

Building your cloud porbolio APS Connect

ITS Strategic Plan Enabling an Unbounded University

Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies

Capitalize on your carbon management solu4on investment

Phone Systems Buyer s Guide

Exchange of experience from a SuccessFactors LMS Implementa9on

Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko

Connec(ng to the NC Educa(on Cloud

How To Use Splunk For Android (Windows) With A Mobile App On A Microsoft Tablet (Windows 8) For Free (Windows 7) For A Limited Time (Windows 10) For $99.99) For Two Years (Windows 9

NETWORK DEVICE SECURITY AUDITING

UNIFIED, END- TO- END EDISCOVERY

Fixed Scope Offering (FSO) for Oracle SRM

Data Management in the Cloud: Limitations and Opportunities. Annies Ductan

Privacy- Preserving P2P Data Sharing with OneSwarm. Presented by. Adnan Malik

SPI/UL Cable Hea.ng Study AUTHOR- FRED DAWSON THE CHEMOURS COMPANY NEC PANEL 16 PRINCIPAL MEMBER

Splunk implementa-on. Our experiences throughout the 3 year journey

How To Manage A Mobile Device Management At Harvard

Cloud Based Tes,ng & Capacity Planning (CloudPerf)

Kaseya Fundamentals Workshop DAY ONE

Case Study. The SACM Journey at the Ontario Government

Modernizing EDI: How to Cut Your Migra6on Costs by Over 50%

Best Prac*ces for Deploying Oracle So6ware on Virtual Compute Appliance

Ubuntu, FEAP, and Virtualiza3on. Jonathan Wong Lab Mee3ng 11/08/10

CSER & emerge Consor.a EHR Working Group Collabora.on on Display and Storage of Gene.c Informa.on in Electronic Health Records

An Econocom Group company. Your partner in the transi4on towards Mobile IT

Enterprise. Thousands of companies save 1me and money by using SIMMS to manage their inventory.

Introduc)on of Pla/orm ISF. Weina Ma

Selling Hosted MS Exchange 2010 & SharePoint

Financial Opera,ons Track: ROI vs. ROCE (Return on Customer Experience) Speaker: Robert Lane, Strategic Sourcing Manager, Premier Health Partners

Migrating to Hosted Telephony. Your ultimate guide to migrating from on premise to hosted telephony.

Data Center Evolu.on and the Cloud. Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM

BadUSB On accessories that turn evil

Cloud Compu)ng in Educa)on and Research

DDC Sequencing and Redundancy

IT Asset Management Best Practices Using RFID. Stephen Schwartz

Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts. October 3, 2013

MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term

DTCC Data Quality Survey Industry Report

Pu?ng B2B Research to the Legal Test

Reports Analyzing Your Performance

Online Enrollment Op>ons - Sales Training Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1

Project Por)olio Management

Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS

Big Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas

- Welcome to AdvisorLoans

Offensive & Defensive & Forensic Techniques for Determining Web User Iden<ty

Strategies for Medical Device So2ware Development Presented By Anthony Giles of Blackwood Embedded Solu;ons And a Case Study by Francis Amoah of Creo

Computer Security Incident Handling Detec6on and Analysis

We are pleased to offer the following program to Woodstock Area Educators:

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP HP ENTERPRISE SECURITY SERVICES

Everything You Need to Know about Cloud BI. Freek Kamst

Transcription:

UAB Cyber Security Ini1a1ve

Purpose of the Cyber Security Ini1a1ve? To provide a secure Compu1ng Environment Individual Mechanisms Single Source for Inventory and Asset Management Current Repor1ng Environment Secured Environment

MicrosoC System Center Configura1on Manager

Campus SCCM Overview

Why MicrosoC SCCM? Inventory collec1on for mul1ple OS plahorms Key SCCM Features Asset Intelligence and Inventory Endpoint Protec1on SoCware Update Management Remote Management

Establishing a Campus Environment September 2014 Built and Deployed SCCM Environment November 2014 Expanded the SCCM Environment to support campus ini1a1ve December 2014 Department Integra1on & Pilot Kicked Off Current Collec1ng Inventory for 2000+ Systems

Campus SCCM Readiness Criteria General Factors OS Requirements Disk Space Public or NAT IP Addresses SCCM not currently deployed Systems can ini1ate communica1on with SCCM Windows 7 / Windows 2003 or Later Supported versions of Mac / Linux / Unix Systems have 500 MB Free (5 GB Preferred)

Campus SCCM Agent Deployment Process Complete Readiness Survey & Address Gaps Submit AskIT Ticket to Par1cipate Determine SCCM Agent Deployment Methods Test SCCM Agent Deployments Deploy SCCM Agents Complete Feedback Survey

Campus SCCM Benefits Features and Roadmap

MicrosoC SCCM Features Computer Asset Repor1ng Remote Management Managing Virus Protec1on Deploying MicrosoC Updates

Campus MicrosoC SCCM Roadmap Applica1on Deployment Opera1ng System Deployment Managing Configura1on Se`ngs Reloca1ng User Profiles

Role Based Access Administrators with the same Security Roles are s1ll limited to the objects they can manage by Scope SCCM Security Roles SCCM Security Scopes

Assistance and Training UAB IT will partner with you throughout the en1re deployment process and is available to answer any ques1ons you may have. We can provide training videos & addi1onal documenta1on as needed. For professional training, we recommend Quickstart (www.quickstart.com).

Pilot Review School of Engineering

School of Engineering Environment 31 Servers (Windows, Linux) 420 Desktop Computers (Windows, Mac, Linux) Custom socware & hardware management tool VDI for 300 concurrent desktops

Why we chose SCCM? We were invited to par1cipate in the pilot by Interim VP of IT, Jeff Neyland. We wanted a management system that was more off the shelf than custom wrifen. We were looking for efficient use of IT Staff 1me.

Our Implementa1on Experience Ini1al mee1ng with SCCM team Comple1on of Readiness Survey Deployed SCCM Client across network via custom script Upgraded An1virus protec1on to Endpoint Created Collec1ons for All ENG machines as well as by Department. Added policies to control which collec1on(s) should be allowed to receive An1virus update, patches, and Remote Control.

Current Benefits Able to manage patched and unpatched machines more effec1vely Remote control has been effec1ve when suppor1ng users at different loca1ons across campus Ease of monitoring of An1- virus ac1vity

Moving ahead with SCCM Addi1onal Training to unlock and gain knowledge of the full poten1al that SCCM has to offer Applying 3 rd party updates and socware installa1on Suppor1ng installa1on of socware and updates on Macs Crea1ng custom reports

Cyber Security Ini1a1ve Next Steps for Campus

What is next? Timeline for repor1ng August 14 th repor1ng only August 21 st installing SCCM Scheduling Installa1ons Prepare final report for campus review prior to UA system mandate date

Develop Advisory Teams Guidelines for iden1fying and repor1ng sensi1ve data Guidelines for risk mi1ga1on Guidelines for maintaining and adding hardware

Together Create Campus Ac1on Plan Iden1fying sensi1ve data Risk mi1ga1on of reported inventory Adop1ng a single SCCM solu1on for the en1re campus

Ques1ons?