MGH Research Computer Upgrade. Presenters: Harry Orf, PhD. Neil Coplan,

Size: px
Start display at page:

Download "MGH Research Computer Upgrade. Presenters: Harry Orf, PhD. Neil Coplan,"

Transcription

1 MGH Research Computer Upgrade Presenters: Harry Orf, PhD. Neil Coplan,

2 MGH Desktop Upgrade Agenda Welcome (We need your Help) Who is on the team? Why does this need to be done? What is the project scope? What are the details? How will we accomplish this? What if I am unable to upgrade? How do I obtain a variance? Where are we starting the work? Where can I go for reference? Questions & Answers Next Step 2

3 Who is on the team? This project is a collaboration of the following groups MGH Research Management MGH Research IT Administrators MGH IS Partners IS Enterprise Research Infrastructure and Services (ERIS) Information Security MGH Research Space Management 3

4 Why does this need to be done? We need your help to ensure computers at MGH are up to date and secure to support future compatibility to facilitate research. Maintain safe and secure systems which are up to date and protected from viruses, malware, and security vulnerabilities (i.e. java deficiencies) Aid in software access (i.e. Microsoft Office, VPN, etc.) Address software compatibility 4

5 What is the project scope? Work with the research community to bring legacy computers up to current MGH standards. High Level Options - Windows Computers 1. Upgrade compatible system which have legacy unsupported versions of Windows to Windows 7 2. Replace older PCs that cannot be upgraded to Windows 7 with standard Partners PCs for improved support 3. Variance process to identify & track the computer with Information Security teams High Level Options - Macintosh Computers 1. Upgrade unsupported Mac Operating Systems to compatible versions (currently OS X Yosemite or 10.9 if needed) 2. Replace older Mac desktops that cannot be upgraded to OS X 10.9 with a new Mac Mini 3. Variance process to identify & track the computer with Information Security teams 5

6 What are the details? Minimum standard operating system PC: Windows 7 Mac: OS X 10.9 or Encryption of all computers (desktops and laptops) Antivirus and Malware PC: installation to meet enterprise standards Mac: optional installation Self Service Software Support Self service software distribution Automatic OS security patches Encryption auditing 6

7 How will we accomplish this? The Approach Step 1: Initial contact with lab or department contact Step 2: Consultation meeting and design work plan Step 3: Schedule plan start Step 4: Perform the upgrade work Step 5: Dispose of replaced computers Step 6: Deliver status and reporting 7

8 What if I am unable to upgrade? Not all computers will be able to meet the MGH minimum standards and will require a variance from Information Security. Examples A peripheral or the software cannot be easily upgraded to work with the new operating system. A computer is provided by and under contract with a vendor for use with peripheral equipment. A computer runs lab equipment and requires vendor support during an upgrade/replacement. A computer is not connected to the Partners network, does it need to be upgraded 8

9 What options exist for replacement? The following options are available and will need to be determined prior to the tech visit. 1. Partners standard desktop hardware (32 bit), which supports the standard partners configuration. 2. Partners standard desktop hardware (64 bit), which has some standard partners configuration. 3. Mac desktops will be replaced by Partners standard Apple Mac Mini. 4. If the Partners options above do not meet the needs, alternate requests will be reviewed by the Project Steering Committee (Harry Orf, Keith Jennings, Brent Richter Deverie Bongard and Doug Demio). 9

10 How do I obtain a variance? Fill out and submit the webform using the following link: EncryptionVariance/NewForm.aspx (Partners username and password is required) Information Security asks that you select the Disk Encryption of a Partners computer Policy for this purpose. Information Security will review and contact you. 10

11 Where are we starting the work? Project is now being piloted with a lab at CNY 149. After agreeing on Lab/department remediation plans, the project will start at the following locations Group 1 Group 2 Group 3 Site 1: CNY 149 Site 2: CNY 114 Site 3: CNY 75 Site 1: Simches Site 2: MGH Main Campus TBD Labs/Departments that want to start earlier will be reviewed on a case by case basis. You can contact the project team at the following address. MGHMacPCupgrade@partners.org 11

12 Where can I go for reference? Useful Project Links You can get more information at: You can review FAQ s at 12

13 Questions and Answers / Next Steps Q & A Next Steps Wait to be contacted Offer your lab resources for earlier implementation 13

Student Laptop Computer FAQs

Student Laptop Computer FAQs Gateway Technical College students often bring their own laptop, notebook or tablet computers with them to class or to aid in studying. Some Gateway academic programs are requiring that students have a

More information

Clinical Systems Access for Remote Nonemployees. Rachel Ackman MGH Compliance 11/10/15

Clinical Systems Access for Remote Nonemployees. Rachel Ackman MGH Compliance 11/10/15 Clinical Systems Access for Remote Nonemployees Rachel Ackman MGH Compliance 11/10/15 Remote Nonemployees Collaborators occasionally request access to MGH clinical systems for research purposes Employees

More information

Data Stored on an External Hard Drive. All requests for data must include the following information.

Data Stored on an External Hard Drive. All requests for data must include the following information. Attachment A Form to Describe Sensitive Data Security Plan for the Use of Sensitive Data from the National Longitudinal Study of Adolescent to Adult Health Data Stored on an External Hard Drive All requests

More information

Computing at MIT: Basics

Computing at MIT: Basics Computing at MIT: Basics Phyllis Galt and Stuart Peloquin Information Services and Technology August 2007 Key take-aways: Utilizing the MIT residential network Responsible network behavior Safe Computing

More information

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure

More information

Network Team. Document for connecting a Mac to the University VPN system

Network Team. Document for connecting a Mac to the University VPN system Academic Services Information & Computing Services Division Network Team Network Team Document for connecting a Mac to the University VPN system Document reference: Document type: Document status: Review

More information

a. UTRGV owned, leased or managed computers that fall within the regular UTRGV Computer Security Standard

a. UTRGV owned, leased or managed computers that fall within the regular UTRGV Computer Security Standard Kiosk Security Standard 1. Purpose This standard was created to set minimum requirements for generally shared devices that need to be easily accessible for faculty, staff, students, and the general public,

More information

RU-VPN2 - GlobalProtect Installation for Windows

RU-VPN2 - GlobalProtect Installation for Windows RU-VPN2 - GlobalProtect Installation for Windows Use RU-VPN2 for a secure connection to Ryerson's Administrative system via the Internet. To use RU- VPN2, you will need to install and use client software

More information

Server Hardening Title Author Contributors Date Reviewed By Document Version

Server Hardening Title Author Contributors Date Reviewed By Document Version Server Hardening The University of Waikato Title Server Hardening Author Milton Markose (Systems Administrator Security) Contributors Information Security Forum (ISF) Date 21-08-2014 Reviewed By Information

More information

HOW TO ACCESS IROQUOIS ONLINE

HOW TO ACCESS IROQUOIS ONLINE HOW TO ACCESS IROQUOIS ONLINE 1. PURPOSE The purpose of this document is to provide users with best effort instructions on how to access the Iroquois OnLine (Citrix) environment from the public Internet.

More information

Read Naturally SE Update Windows Network Installation Instructions

Read Naturally SE Update Windows Network Installation Instructions Windows Network This document explains how to apply the Read Naturally Software Edition 2.0.3 update to existing installations of SE version 2.0, 2.0.1, or 2.0.2. First update the SE server software, and

More information

IT Service Upgrades Announcement

IT Service Upgrades Announcement IT Service Upgrades Announcement Beginning in late 2008, AgriLife Information Technology under the direction of the Office of the Vice Chancellor and Dean of Agriculture and Life Sciences conducted a study

More information

PS Suite EMR ASP Remote Access Setup Guide for Macintosh computers

PS Suite EMR ASP Remote Access Setup Guide for Macintosh computers PS Suite EMR ASP Remote Access Setup Guide for Macintosh computers MDQS-6-3639 Rev 4.0 Revised June 13, 2017. PS Suite EMR software and related products and services are owned by TELUS. PS Suite EMR and

More information

Computer Hardware and Software Standards for OSU Extension

Computer Hardware and Software Standards for OSU Extension Computer Hardware and Software Standards for OSU Extension Sections 1. Executive Summary 2. Criteria for Establishing Standards 3. Computers a. Primary Choices for Highest Level of Support b. Secondary

More information

CompTIA A+ Accelerated course for & exams

CompTIA A+ Accelerated course for & exams CompTIA A+ Accelerated course for 220-901 & 220-902 exams Course overview Target Audience This course is for Participants wishing to take and pass both CompTIA A+ exams (220-901 and 220-902) exam. It is

More information

GEARS + CounterACT. Advanced Compliance Enforcement for Healthcare. December 16, Presented by:

GEARS + CounterACT. Advanced Compliance Enforcement for Healthcare. December 16, Presented by: Advanced Compliance Enforcement for Healthcare Presented by: December 16, 2014 Adam Winn GEARS Product Manager OPSWAT Kevin Mayer Product Manager ForeScout Agenda Challenges for the healthcare industry

More information

RU-VPN2 - GlobalProtect Installation for Windows

RU-VPN2 - GlobalProtect Installation for Windows RU-VPN2 - GlobalProtect Installation for Windows Use RU-VPN2 for a secure connection to Ryerson's Administrative system via the Internet. To use RU-VPN2, you will need to install and use client software

More information

San Jac ITS Desktop Support Guidelines

San Jac ITS Desktop Support Guidelines San Jac ITS Desktop Support Guidelines Our goal at (ITS) is to provide the highest level of technical support and customer service to all San Jacinto College students and employees. We are constantly striving

More information

Data Loss Protection Guidelines For Insurance Agents. By Insurance Standing Committee for Cyber Security (ISCCS)

Data Loss Protection Guidelines For Insurance Agents. By Insurance Standing Committee for Cyber Security (ISCCS) Data Loss Protection Guidelines For Insurance Agents By Insurance Standing Committee for Cyber Security (ISCCS) 6 February 2017 Change History Version Change Description by Date 1.0 Initial Official release

More information

RU-VPN2 - GlobalProtect Installation for Mac

RU-VPN2 - GlobalProtect Installation for Mac RU-VPN2 - GlobalProtect Installation for Mac Use RU-VPN2 for a secure connection to Ryerson's Administrative system via the Internet. To use RU-VPN2, you will need to install and use client software called

More information

Client Computing Security Standard (CCSS)

Client Computing Security Standard (CCSS) Client Computing Security Standard (CCSS) 1. Background The purpose of the Client Computing Security Standard (CCSS) is to (a) help protect each user s device from harm, (b) to protect other users devices

More information

Install Kaspersky Endpoint Security for Mac Version b (This user guide is applicable to Mac OS X 10.9 macos )

Install Kaspersky Endpoint Security for Mac Version b (This user guide is applicable to Mac OS X 10.9 macos ) Install Kaspersky Endpoint Security for Mac Version 10.2.1.319b (This user guide is applicable to Mac OS X 10.9 macos 10.14.) Contents A. Download Kaspersky Endpoint Security 10 for Mac... 1 B. Install

More information

Kaspersky ONE. Universal Security. Smartphone. Security Solution. Tablet. Devices. Quick Start Guide

Kaspersky ONE. Universal Security. Smartphone. Security Solution. Tablet. Devices. Quick Start Guide Kaspersky ONE Universal Security Smartphone PC Quick Start Guide One Mac Security Solution for Your Android Tablet Devices Kaspersky ONE Universal Security Contents Welcome to Kaspersky ONE Windows Installation...

More information

Uptake Internal. Aug 2017

Uptake Internal. Aug 2017 Uptake Internal Executive Summary Report Aug 2017 Uptake Digital 10-16 Forest St Bendigo, Victoria Overall Score Desktops Servers Metric Score Metric Score 91 Antivirus 100 Malware 66 Antivirus Availability

More information

CoreMax Consulting s Cyber Security Roadmap

CoreMax Consulting s Cyber Security Roadmap CoreMax Consulting s Cyber Security Roadmap What is a Cyber Security Roadmap? The CoreMax consulting cyber security unit has created a simple process to access the unique needs of each client and allows

More information

CompTIA A+ Certification ( ) Study Guide Table of Contents

CompTIA A+ Certification ( ) Study Guide Table of Contents CompTIA A+ Certification (220-902) Study Guide Table of Contents Course Introduction About This Course About CompTIA Certifications Module 1 / Supporting Windows 1 Module 1 / Unit 1 Windows Operating System

More information

Access COTY PROSPER database Computer Setup Instructions

Access COTY PROSPER database Computer Setup Instructions PROSPER: COTY Specification Database Introduction Access COTY PROSPER database s These instructions are for all users who must access PROSPER. Both Coty internal employees, and external users working as

More information

RU-VPN GlobalProtect Installation for Mac

RU-VPN GlobalProtect Installation for Mac RU-VPN GlobalProtect Installation for Mac Use RU-VPN2 for a secure connection to Ryerson's Administrative system via the Internet. To use RU-VPN2, you will need to install and use client software called

More information

Trusted Computing Today: Benefits and Solutions

Trusted Computing Today: Benefits and Solutions Trusted Computing Today: Benefits and Solutions Brian D. Berger EVP Marketing & Sales Wave Systems Corp. bberger@wavesys.com Copyright 2009 Trusted Computing Group Agenda TCG Vision TCG Benefits Solution

More information

IT in St John s College

IT in St John s College IT in St John s College Welcome to St John s. Below is some information on the main IT systems you ll find in both St John s College and the University as well as some help to get you online. It will also

More information

Executive Summery. Siddharta Saha. Downloaded from

Executive Summery. Siddharta Saha. Downloaded from 1 Executive Summery In the last quarter of century the world has seen a tremendous growth in IT and IT enabled services. IT infrastructure of any organization is the most precious since business process

More information

Course 10747D: Administering System Center 2012 Configuration Manager Exam Code:

Course 10747D: Administering System Center 2012 Configuration Manager Exam Code: Course 10747D: Administering System Center 2012 Configuration Manager Exam Code: 70-243 Course Outline Module 1: Overview of System Center 2012 R2 Configuration Manager In this module, you will learn about

More information

Cisco s AnyConnect VPN Client (version 2.4)

Cisco s AnyConnect VPN Client (version 2.4) Table of Contents [TOC]: Introduction Getting Started Installation Overview Using the Softphone System Requirements Introduction: Valley City State University is deploying Cisco s AnyConnect Virtual Private

More information

Accessing CharityMaster data from another location

Accessing CharityMaster data from another location Accessing CharityMaster data from another location When all of your computers are on the same Local Area Network (LAN), you can place the back end files (including your data and the Word templates) onto

More information

Administering System Center 2012 Configuration Manager

Administering System Center 2012 Configuration Manager Administering System Center 2012 Configuration Manager Duration: 5 Days Course Code:10747D About this Course This course describes how to configure and manage a System Center 2012 R Configuration Manager

More information

Java Installation Instructions Mac Os X 10.9 From Usb-stick >>>CLICK HERE<<<

Java Installation Instructions Mac Os X 10.9 From Usb-stick >>>CLICK HERE<<< Java Installation Instructions Mac Os X 10.9 From Usb-stick Jul 10, 2014. I lost a previous hard drive in the machine before upgrading from 2 to 4GB DDR2 Can I update the OSX to 10.9.4 without danger crashing

More information

STEP 1: PREPARE FOR DATA MIGRATION 1. Right-click the desktop and choose New > Folder. a. Type For Transferring and press Enter to name the folder.

STEP 1: PREPARE FOR DATA MIGRATION 1. Right-click the desktop and choose New > Folder. a. Type For Transferring and press Enter to name the folder. PC Support and Repair Chapter 5 Data Migration Lab 5144 When a new computer is purchased or a new operating system is installed, it is often desirable to migrate a user s data to the new computer or OS.

More information

Type Purpose Company

Type Purpose Company Type Purpose Company AV Classroom Presentation Crestron AV Classroom Presentation AV Classroom Presentation AV Classroom Presentation AV Meeting Room Presentation Crestron AV Meeting Room Presentation

More information

Mountain Lion v10.8.3? Yes, you Boot Camp 4.0 Installation & Setup Guide OS X Lion

Mountain Lion v10.8.3? Yes, you Boot Camp 4.0 Installation & Setup Guide OS X Lion Boot Camp Installation Setup Guide Pdf Mountain Lion I am running Mountain Lion and Bootcamp V. 5.0 Neither the Boot Camp Installation & Setup Guide nor on-line answers to questions say at what point you.

More information

Remove Java Manual Mac Os X Mountain Lion Server

Remove Java Manual Mac Os X Mountain Lion Server Remove Java Manual Mac Os X Mountain Lion Server Update OS X and other software that you got through the App Store or from Apple. OS X Yosemite can install updates automatically as they become available

More information

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2 APPENDIX 2 SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the Safecom SecureWeb Custom service. If you require more detailed technical information,

More information

What is VMware View. IMPORTANT: Connecting from Off-Campus. Connecting to View Desktops. Downloading the Client

What is VMware View. IMPORTANT: Connecting from Off-Campus. Connecting to View Desktops. Downloading the Client 1. What is VMware View 2. Connecting from Off-Campus 3. Connecting to View Desktops 4. Extra View Tips 5. What to do if something is wrong What is VMware View VMware View is a technology that allows us

More information

Hardware and Software Full Requirements

Hardware and Software Full Requirements CGM webpractice v7.4 Hardware and Software Full Requirements 2 CGM webpractice_v7 4_SystemReq Revised: 2.21.2019 Table of Contents Full System Requirements... 3 Client Computer Specifications... 3 Peripheral

More information

Remotely accessing GPH ICT systems

Remotely accessing GPH ICT systems Remotely accessing GPH ICT systems Version: 1.7 CONTENTS 1. Background and Support... 2 2. Setting up remote access... 3 2.1 Installing the Symantec VIP MOBILE App... 3 2.2 Registering your device... 4

More information

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo Vendor: CompTIA Exam Code: 220-902 Exam Name: CompTIA A+ Certification Exam (902) Version: Demo DEMO QUESTION 1 Which of the following best practices is used to fix a zero-day vulnerability on Linux? A.

More information

BROWSER POLICY: DESCRIPTION OF SUPPORT 2 SUPPORTED BROWSERS 2 TIER 2 SUPPORTED BROWSERS 2 UNSUPPORTED BROWSERS 2

BROWSER POLICY: DESCRIPTION OF SUPPORT 2 SUPPORTED BROWSERS 2 TIER 2 SUPPORTED BROWSERS 2 UNSUPPORTED BROWSERS 2 Browser Policy June 2016 Table of Contents BROWSER POLICY: DESCRIPTION OF SUPPORT 2 SUPPORTED BROWSERS 2 TIER 1 SUPPORTED BROWSERS 2 TIER 2 SUPPORTED BROWSERS 2 UNSUPPORTED BROWSERS 2 SCOPE OF APPLICABILITY

More information

PeopleSoft Finance Access and Security Audit

PeopleSoft Finance Access and Security Audit PeopleSoft Finance Access and Security Audit City of Minneapolis Internal Audit Department September 20, 2016 1 Contents Page Background... 3 Objective, Scope and Approach... 3 Audit Results and Recommendations...

More information

Magento Enterprise Edition Customer Support Guide

Magento Enterprise Edition Customer Support Guide Magento Enterprise Edition Customer Support Guide April 2017 magento.com/support 2017 Magento, Inc. All rights reserved. Thank You for using Magento Enterprise Edition Customer support is a vital part

More information

PCI DSS v3.2 Mapping 1.4. Kaspersky Endpoint Security. Kaspersky Enterprise Cybersecurity

PCI DSS v3.2 Mapping 1.4. Kaspersky Endpoint Security. Kaspersky Enterprise Cybersecurity Kaspersky Enterprise Cybersecurity Kaspersky Endpoint Security v3.2 Mapping 3.2 regulates many technical security requirements and settings for systems operating with credit card data. Sub-points 1.4,

More information

VMWARE HORIZON CLIENT OFF CAMPUS TUTORIAL. Software Installed: What is VMware Horizon Client? In This Manual

VMWARE HORIZON CLIENT OFF CAMPUS TUTORIAL. Software Installed: What is VMware Horizon Client? In This Manual VMWARE HORIZON CLIENT OFF CAMPUS TUTORIAL Revised May 2017 What is VMware Horizon Client? VMware Horizon Client for Windows operating systems allows you to connect to our department VMware Horizon View

More information

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Allowed Personally Owned Device Policy Every 2 years or as needed Purpose: A personally owned information system or device

More information

Remove Java Manually Mac Os X Lion Server

Remove Java Manually Mac Os X Lion Server Remove Java Manually Mac Os X Lion Server Jul 31, 2014. OS X Mountain Lion- Protect your Mac from malware I have uninstalled manually, Firefox off and on again and now everything is ok. infection and is

More information

2. install windows vista

2. install windows vista 2. install windows vista Windows Vista comes preloaded on many brand-new PCs. If you already have a computer with Windows Vista installed, you can go directly to Chapter 3, Move from another PC. If you

More information

HPE Intelligent Management Center

HPE Intelligent Management Center HPE Intelligent Management Center EAD Security Policy Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with the TAM

More information

Uninstall Mcafee Agent Cannot Be Removed

Uninstall Mcafee Agent Cannot Be Removed Uninstall Mcafee Agent Cannot Be Removed Because Other Products Are Still Using It We haven't come across this in other customers until now. Using add/remove programs doesn't work, as the uninstall process

More information

Comodo IT and Security Manager Software Version 6.6

Comodo IT and Security Manager Software Version 6.6 Comodo IT and Security Manager Software Version 6.6 End User Guide Guide Version 6.6.053117 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo IT

More information

Managed Security Services - Endpoint Managed Security on Cloud

Managed Security Services - Endpoint Managed Security on Cloud Services Description Managed Security Services - Endpoint Managed Security on Cloud The services described herein are governed by the terms and conditions of the agreement specified in the Order Document

More information

TUCA COLLEGE OF OSTEOPATHIC MEDICINE TECHNOLOGY PRIMER

TUCA COLLEGE OF OSTEOPATHIC MEDICINE TECHNOLOGY PRIMER TUCA COLLEGE OF OSTEOPATHIC MEDICINE TECHNOLOGY PRIMER This PowerPoint contains some basic information which will help improve usage of technology on campus. Please take the time to review all the information

More information

Remotely accessing GPH ICT systems

Remotely accessing GPH ICT systems Remotely accessing GPH ICT systems Version: 1.6 FINAL CONTENTS 1. Background and Support... 2 2. Setting up remote access... 3 2.1 Installing the Symantec VIP MOBILE App... 3 2.2 Registering your device...

More information

Certiport IC3-1. Computing Fundamentals. Download Full Version :

Certiport IC3-1. Computing Fundamentals. Download Full Version : Certiport IC3-1 Computing Fundamentals Download Full Version : https://killexams.com/pass4sure/exam-detail/ic3-1 QUESTION: 296 Which of the following is a storage device that can be inserted into a digital

More information

LO CompTIA A+ : (Exam ) Course Outline Sep 2018

LO CompTIA A+ : (Exam ) Course Outline Sep 2018 Course Outline LO CompTIA A+ : (Exam 220902) 09 Sep 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training

More information

Installation manual of Mac Sratailor. Last update: 23-Sep-2016 Shinya Oki Kyushu University Contact: soki [at] dev.med.kyushu-u.ac.

Installation manual of Mac Sratailor. Last update: 23-Sep-2016 Shinya Oki Kyushu University Contact: soki [at] dev.med.kyushu-u.ac. Installation manual of Mac Sratailor Last update: 23-Sep-2016 Shinya Oki Kyushu University Contact: soki [at] dev.med.kyushu-u.ac.jp 1. Download (1) Log in your Mac as an administrator. Administrator privileges

More information

Request for Proposal Technology Services, Maintenance and Support

Request for Proposal Technology Services, Maintenance and Support Maintenance and Support April 26 th, 2018 Request for Proposal Technology Services, Maintenance and Support Celerity Schools Louisiana Inc. is seeking an IT consulting firm to manage Maintenance of our

More information

Mobile devices boon or curse

Mobile devices boon or curse Mobile devices boon or curse Oliver Ng - Director of Training Kishor Sonawane - India Lead Security Compass Consulting & Training Consumerization According to Apple s chief operating officer, 65 percent

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

Comodo IT and Security Manager Software Version 6.9

Comodo IT and Security Manager Software Version 6.9 Comodo IT and Security Manager Software Version 6.9 End User Guide Guide Version 6.9.072817 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo IT

More information

Microsoft Remote Desktop Connection Client For Mac Os X

Microsoft Remote Desktop Connection Client For Mac Os X Microsoft Remote Desktop Connection Client For Mac Os X 10.8.3 I have a user who upgraded their MS rdp client for mac to version 8.0.3 and and Microsoft RDC 2.1.1 (110309) on OS X 10.6.8 and all connections

More information

Kaspersky Security for Small and Medium Business

Kaspersky Security for Small and Medium Business Kaspersky Security for Small and Medium Business 2018 SMB Have Unique Problems and Requirements Shift to Cloud IT Simple, all-in one solution Pay-as-you-go Zoo of software and hardware No monitoring systems

More information

Personal Computing Devices Registration Procedure. 1. Background

Personal Computing Devices Registration Procedure. 1. Background Personal Computing Devices Registration Procedure 1. Background CGI 241 required that personal computing devices accessing and/or storing classified information be registered with ITSD and conforming to

More information

L2F Case Study Overview

L2F Case Study Overview L2F Case Study Overview Introduction This case study describes how one Internet service provider (ISP) plans, designs, and implements an access virtual private network (VPN) by using Layer 2 Forwarding

More information

Uninstall Java Manually Mac Os X 10.8 Server

Uninstall Java Manually Mac Os X 10.8 Server Uninstall Java Manually Mac Os X 10.8 Server Java. Available for: OS X Lion v10.7 or later, OS X Lion Server v10.7 or later, OS X Mountain Lion 10.8 or later. Impact: Multiple vulnerabilities in Java 1.6.0_37.

More information

ClearPath OS 2200 System LAN Security Overview. White paper

ClearPath OS 2200 System LAN Security Overview. White paper ClearPath OS 2200 System LAN Security Overview White paper Table of Contents Introduction 3 Baseline Security 3 LAN Configurations 4 Security Protection Measures 4 Software and Security Updates 4 Security

More information

NB TEEN APPRENTICE PROGRAM NBTAP EMPLOYER ACCOUNT: FAQS CONNECTING STUDENTS TO CAREERS IN THE SKILLED TRADES

NB TEEN APPRENTICE PROGRAM NBTAP EMPLOYER ACCOUNT: FAQS CONNECTING STUDENTS TO CAREERS IN THE SKILLED TRADES NBTAP EMPLOYER ACCOUNT: FAQS TOPICS 1.0 Do I need to set up my Employer Account?... 3 2.0 What do I use my Employer Account for?... 3 3.0 How do I login to my Employer Account?... 3 4.0 How do I reset

More information

Exam : Title : Security Solutions for Systems Engineers(SSSE) Version : Demo

Exam : Title : Security Solutions for Systems Engineers(SSSE) Version : Demo Exam : 642-565 Title : Security Solutions for Systems Engineers(SSSE) Version : Demo 1. SomeCompany, Ltd. wants to implement the the PCI Data Security Standard to protect sensitive cardholder information.

More information

Manual Update Java Mac Os X Lion

Manual Update Java Mac Os X Lion Manual Update Java Mac Os X 10.6 8 Lion Update OS X and other software that you got through the App Store or from Apple. If you're using an iphone as an Instant Hotspot, install updates manually. OS X

More information

AUTHORITY FOR ELECTRICITY REGULATION

AUTHORITY FOR ELECTRICITY REGULATION SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...

More information

IT Briefing. May 17, 2012 Goizueta Business School Room 231

IT Briefing. May 17, 2012 Goizueta Business School Room 231 IT Briefing May 17, 2012 Goizueta Business School Room 231 IT Briefing Agenda Unified Messaging Update ServiceNow - Request 2.0 University Service Desk Security Update Business Intelligence Jay Flanagan

More information

Security Checklist Frequently Asked Questions

Security Checklist Frequently Asked Questions Security Checklist Frequently Asked Questions 1. Q: Is drive encryption required? A: Mobile devices such as tablets, phones, notebooks and laptops must have their drives encrypted. For desktop devices

More information

CompTIA Exam CAS-002 CompTIA Advanced Security Practitioner (CASP) Version: 6.0 [ Total Questions: 532 ]

CompTIA Exam CAS-002 CompTIA Advanced Security Practitioner (CASP) Version: 6.0 [ Total Questions: 532 ] s@lm@n CompTIA Exam CAS-002 CompTIA Advanced Security Practitioner (CASP) Version: 6.0 [ Total Questions: 532 ] Topic break down Topic No. of Questions Topic 1: Volume A 117 Topic 2: Volume B 122 Topic

More information

ARCHITECTURE & INFRASTRUCTURE COMMITTEE MEETING AGENDA FRIDAY, January 10, :00-10:30 AM FAC 228D

ARCHITECTURE & INFRASTRUCTURE COMMITTEE MEETING AGENDA FRIDAY, January 10, :00-10:30 AM FAC 228D ARCHITECTURE & INFRASTRUCTURE COMMITTEE MEETING AGENDA FRIDAY, January 10, 2014 9:00-10:30 AM FAC 228D I. 9:00 9:30 Wireless Access Point Upgrade Endorsement (William Green) II. 9:30 10:00 System Management

More information

Best Practices of IBM Notes Traveler Deployment. Date: 27 Aug 2015

Best Practices of IBM Notes Traveler Deployment. Date: 27 Aug 2015 Best Practices of IBM Notes Traveler Deployment Date: 27 Aug 2015 Open Mic Team Sandip Singh - IBM ICS Support engineer Presenter Sukanya Yenneti - IBM ICS Support engineer Presenter Ranjit Rai - IBM ICS

More information

Remote Access Instructions Windows 7 From Mac Os X Lion >>>CLICK HERE<<<

Remote Access Instructions Windows 7 From Mac Os X Lion >>>CLICK HERE<<< Remote Access Instructions Windows 7 From Mac Os X Lion How to Install Windows 8 on a Mac running OS X Mountain Lion In this tutorial, you'll learn how to set up OS X so that its shared printers are available

More information

Upgrading Your Skills to MCSA Windows 8

Upgrading Your Skills to MCSA Windows 8 Course 20689D: Upgrading Your Skills to MCSA Windows 8 Course Details Course Outline Module 1: Windows 8.1 in an Enterprise Network Environment This module explains how the features and related solutions

More information

Symantec Endpoint Encryption Full Disk Maintenance Pack Release Notes

Symantec Endpoint Encryption Full Disk Maintenance Pack Release Notes Symantec Endpoint Encryption Full Disk Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of

More information

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project

More information

Standard CIP 007 3a Cyber Security Systems Security Management

Standard CIP 007 3a Cyber Security Systems Security Management A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-3a 3. Purpose: Standard CIP-007-3 requires Responsible Entities to define methods, processes, and procedures for

More information

NUIT Tech Talk: Agenda

NUIT Tech Talk: Agenda NUIT Tech Talk: May 14, 2008 Leigh Underwood NUIT Senior Consultant Agenda Tips for Staying Secure Tips for Staying Connected Forwarding E-mail Special Instructions for Graduates Where to Go for Help Keep

More information

Licensing Windows and Microsoft Office for use on the Macintosh

Licensing Windows and Microsoft Office for use on the Macintosh Volume Licensing brief Licensing Windows and Microsoft Office for use on the Macintosh This brief applies to all Volume Licensing programs. Table of Contents Summary... 1 What s new in this brief... 1

More information

A Binary Tree SMART Migration Webinar. Designing an Active Directory Migration to Meet Real- World Requirements

A Binary Tree SMART Migration Webinar. Designing an Active Directory Migration to Meet Real- World Requirements A Binary Tree SMART Migration Webinar Designing an Active Directory Migration to Meet Real- World Requirements Our Speakers Gary Steere Microsoft Certified Master Microsoft MVP: Exchange Microsoft Certified

More information

Computer Systems Lab. David Parter Director of Academic Computing Services Computer Sciences Department. New Grad Student Orientation August 26, 2013

Computer Systems Lab. David Parter Director of Academic Computing Services Computer Sciences Department. New Grad Student Orientation August 26, 2013 Computer Systems Lab David Parter Director of Academic Computing Services Computer Sciences Department New Grad Student Orientation August 26, 2013 1 Welcome! There is too much to tell you today, but I'll

More information

Adobe Captivate Tuesday, January 26, 2016

Adobe Captivate Tuesday, January 26, 2016 Slide 1 - Slide 1 Welcome to the course: CareEvolve Log in and Creating your Desktop Icon. OhioHealth Laboratory Services partners with CareEvolve to bring you the OhioHealth Laboratory Services Results

More information

IT Briefing. October 16, 2014 North Decatur Building 4 th Floor Auditorium

IT Briefing. October 16, 2014 North Decatur Building 4 th Floor Auditorium IT Briefing October 16, 2014 North Decatur Building 4 th Floor Auditorium IT Briefing Agenda Security Update Apple OS (Yosemite) McAfee Kronos Update ART Review Process Office 365 Update IdM and SingleNet

More information

Symantec Network Access Control Starter Edition

Symantec Network Access Control Starter Edition Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access

More information

WHITE PAPER- Managed Services Security Practices

WHITE PAPER- Managed Services Security Practices WHITE PAPER- Managed Services Security Practices The information security practices outlined below provide standards expected of each staff member, consultant, or customer staff member granted access to

More information

Attachment 3 (B); Security Exhibit. As of March 29, 2016

Attachment 3 (B); Security Exhibit. As of March 29, 2016 Attachment 3 (B); Security Exhibit As of March 29, 2016 UVA Medical Center (UVaMC) Security Requirements The term System shall mean computer equipment, peripheral equipment, system software, application

More information

Murray Bridge High School Connecting to the BYOD Network Mac OS X Version 3 Amended 2/10/2014

Murray Bridge High School Connecting to the BYOD Network Mac OS X Version 3 Amended 2/10/2014 Murray Bridge High School Connecting to the BYOD Network Mac OS X 10.7 10.9 Version 3 Amended 2/10/2014 Use of the Murray Bridge High School BYOD (Bring Your Own Device) facilities and network is subject

More information

Comodo IT and Security Manager Software Version 6.4

Comodo IT and Security Manager Software Version 6.4 Comodo IT and Security Manager Software Version 6.4 End User Guide Guide Version 6.4.040417 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo IT

More information

Upgrades Option Selection - Earlier Versions of CM

Upgrades Option Selection - Earlier Versions of CM Upgrades Option Selection - Earlier Versions of CM Audience: AVAYA and Partners Customers should leverage the Avaya Services team for this process Module Scope: This process shows the conversion and upgrade

More information

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips Table of Contents Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips 2 Current State of BYOD in the Enterprise Defining BYOD Bring-Your-Own-Device (BYOD): a business practice

More information

Computer Classroom Security Standard

Computer Classroom Security Standard Computer Classroom Security Standard Cal State Fullerton operates a heterogeneous network environment composed of centrally supported workstations, servers, and the network infrastructure. Along with administrative

More information