0% found this document useful (0 votes)
159 views1 page

Desktop Checklist-Systems Admins - 1

This document is a security checklist for systems administrators at RIT that outlines 17 security requirements for desktop and portable computers connecting to the RIT network. The checklist must be completed, signed, and reviewed on a regular basis. It requires computers to have up-to-date antivirus, operating systems, applications, firewalls, anti-spyware, and encryption for laptops. Computers must also be auditable through centralized management tools and users made aware of secure logging practices. Administrator privileges must be authorized and intrusion prevention systems installed.

Uploaded by

Omar Genis
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
159 views1 page

Desktop Checklist-Systems Admins - 1

This document is a security checklist for systems administrators at RIT that outlines 17 security requirements for desktop and portable computers connecting to the RIT network. The checklist must be completed, signed, and reviewed on a regular basis. It requires computers to have up-to-date antivirus, operating systems, applications, firewalls, anti-spyware, and encryption for laptops. Computers must also be auditable through centralized management tools and users made aware of secure logging practices. Administrator privileges must be authorized and intrusion prevention systems installed.

Uploaded by

Omar Genis
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Desktop and Portable Computer Standard

Security Checklist for Systems Administrators

Computer identification and location:

Completed by (please print): _______________________ Date: ______________

Signature: _________________________ Next scheduled review date: ______________

Manager’s signature: _________________________ Date: ______________

All computers that connect to the RIT network require the following: (5.1) Initials
1. Anti-virus software with updated signatures has been installed and enabled. (5.1.1)
2. All operating system and application security patches are up to date. (5.1.2)

3. Hardware or software that provides memory protection is enabled. F(5.1.3)


4. A personal firewall, software or hardware, is installed and enabled. (5.1.4)

5. Anti-spyware is installed, enabled, and up-to-date. (5.1.5)

6. Is this a laptop? (Y/N) ____________ (5.2.1)

If No, skip to number 12.


7. The laptop has whole-disk encryption enabled. (5.2.1)

8. The encryption solution has validated that it has been installed and is operating correctly. (5.2.1.1)

9. User-configurable settings do not interfere with the encryption software. (5.2.1.2)

10. Laptop is set to hibernate, rather than standby, when inactive for more than 30 minutes. (5.2.1.2.1)

11. The encryption software and its policies are controlled by centralized ISO-approved (5.2.1.3)
security personnel.
12. This computer can be audited from centralized and ISO-approved configuration and software (5.2.2.1)
management tools. (Y/N) ____________
If No, skip to number 14.
13. The audit is configured to include applications and patch inventory. (5.2.2.1.1)

14. Anti-phishing controls have been installed and enabled. (5.2.3.1)

15. Users are aware that they must not leave their computer unattended without logging off or (5.2.4.1)
locking the computer first.
16. Are administrator privileges being used on this computer? (Y/N) ____________ (5.2.5.1)

If Yes, who is the dean or VP that has authorized the privileges? ___________________________
17. An ISO-approved Host Intrusion Prevention System has been installed and enabled. (5.2.6.1)

RIT Information Security


[email protected]
https://www.rit.edu/security

Desktop Checklist-Systems Admins a2 1 of 1 revised 5/13/2009

You might also like