Information Technology Services 1 Copyright Copyright Marc Wallman and Theresa Semmens, 2006. This work is the intellectual property of the authors. Permission.

Slides:



Advertisements
Similar presentations
CHECK 2012 Bridging the Gap for Mobile Devices: Eager Adoption v. Practical Support Emporia State University The Faculty & Staff Support Perspective Cory.
Advertisements

A Successful Help Desk Process for all IT Support
Tools for Help Desk Management: Assessment & Guidance Karen Pothering Elinor Pennsylvania State University "Copyright.
What Does the Net Generation Expect From Us? SAC August 8, 2005 SAC August 8, 2005 Copyright © 2005, Joel L. Hartman. This work is the intellectual property.
Student, Faculty, and Staff Data Availability and Protection What’s the Back-Up Plan? (for academic computing) Sponsored by.
© Copyright Computer Lab Solutions All rights reserved. Do you need usage information about your computer labs? Copyright Computer Lab Solutions.
Cut Costs and Increase Productivity in your IT Organization with Effective Computer and Network Monitoring. Copyright © T3 Software Builders, Inc 2004.
The Academic Computing Assessment Data Repository: A New (Free) Tool for Program Assessment Heather Stewart, Director, Institute for Technology Development,
Copyright Dickinson College This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Andrea Eastman-Mullins Information & Technology Coordinator University of North Carolina, Office of the President Teaching and Learning with Technology.
Copyright Brian T. Huntley and Tim Antonowicz 2007 This work is the intellectual property of the authors. Permission is granted for this material to be.
Yale University Information Technology Services Administrative Systems Art Hunt 3/22/04 Software Service Level Agreement with Finance, Procurement and.
The Power of the Core Service Catalog Michele Morrison and Brian Hosier EDUCAUSE – Wednesday, October 19, 2005 Copyright Michele Morrison This work.
Copyright Jill M. Forrester This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
Delivering Windows OS Updates at Yale with SUS EDUCAUSE Security Professionals Workshop May 17, 2004 Washington DC Ken Hoover, Systems Programmer
Procurement From the 20 th to the 21 st Century Copyright Byron Honoré This work is the intellectual property of the author. Permission is granted.
Dana C. Voss Manager, Decision Support Services, UIS University Information Technology Services INDIANA UNIVERSITY May 2003 Copyright Dana C. Voss, 2003.
Making the Pieces Fit Together Barbara Draude, Director, Academic and Instructional Technology Services Middle Tennessee State University Lisa Rogers,
INDIANAUNIVERSITYINDIANAUNIVERSITY Automated Network Isolation at Indiana University David A. Greenberg Information Technology Security and Policy Office.
Copyright Shanna Smith & Tom Bohman (2003). This work is the intellectual property of the authors. Permission is granted for this material to be shared.
Moving Out of The Shadows: Shining a Light on Data David Rotman Director of Computer Services Mark Mazelin Web Development Coordinator Copyright David.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Moving Your Paperwork Online Western Washington University E-Sign Web Forms Copyright Western Washington University, This work is the intellectual.
Putting the We in… We are Penn State! Copyright [Carol Findley, Lisa Dibert] [2003]. This work is the intellectual property of the authors. Permission.
Invent the Future. Some information about VT ~28,000 students; 83% UG/17% Graduate Most users publish/utilize a single address such as
Identity Management – Why and How Experiences at CU-Boulder Copyright Linda Drake, Director of Development and Integration, University of Colorado, Boulder,
Baylor University and Xythos EduCause Southwest 2007 Dr. Sandra Bennett Program Manager Online Teaching and Learning System Copyright Sandra Bennett 2007.
Sharing MU's SharePoint Experience 2005 Midwest Regional Conference Innovative Use of Technology: Getting IT Done Wednesday, March 23, 2005.
I NDIANA U NIVERSITY C A N N I N G S P A M A T Copyright Notice Copyright Merri Beth Lavagnino, Marsha Waren, and Rick Jackson, This work is the.
1 No More Paper, No More Stamps: Targeted myWSU Communications Lavon R. Frazier April 27, 2005 Copyright Lavon R. Frazier, This work is the intellectual.
Partnering with Students, Enhancing Services John C. Borne - Cynthia M. Hadden, Ph.D. - Joel G. Williams.
Page 1 Copyright Jill M. Forrester This work is the intellectual property of the author. Permission is granted for this material to be shared for.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Sharing Information and Controlling Content: Continuing Challenges for Higher Education Susanna Frederick Fischer Assistant Professor Columbus School of.
Beyond the Campus Gates: Bringing Alumni, Parents, and Prospects into the Campus Portal William P. Wilson Mark R. Albert John C. Duffy Gettysburg College.
Catalyst Portfolio Tool Copyright Tom Lewis, This work is the intellectual property.
Copyright Michael White and Sandra Thompson, This work is the intellectual property of the author. Permission is granted for this material to be.
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
Center for Planning and Information Technology T HE C ATHOLIC U NIVERSITY of A MERICA ERP Systems: Ongoing Support Challenges and Opportunities Copyright.
Discussion Panelists: Justin C. Klein Keane Sr. Information Security Specialist University of Pennsylvania Jonathan Hanny Application Security Specialist.
Portal to the Rescue: First Year Information Copyright William P. Wilson This work is the intellectual property of the author. Permission is granted.
George Mason University Assessing Technology Support: Using Portfolios to Set Goals and Measure Progress Anne Agee, Star Muir, Walt Sevon Information Technology.
Center for Planning and Information Technology T HE C ATHOLIC U NIVERSITY of A MERICA Bringing IT All Back Home Centralized Systems in a Decentralized.
Copyright David A. Cox This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
Copyright [Dr. Michael Hoadley, Chat Chatterji, and John Henderson ] [2004]. This work is the intellectual property of the authors. Permission is granted.
Portals and Web Standards Lessons Learned and Applied David Cook Copyright The University of Texas at Austin This work is the.
A Strategy for Moving from Commercial to an Open Source Environment Jeshua Pacifici, GEDI Assistant Director and Learning Systems Consultant.
Legal Issues in the “E-Learning Business” Jonathan Alger University of Michigan October 29, 2001 Copyright Jonathan Alger This work is the intellectual.
2007 Carnegie Mellon University 1 Copyright Kelley Anderson and Mary L. Pretz- Lawson, This work is the intellectual property of the authors. Permission.
© Scottsdale Community College Leveraging the Power of E-Learning Taking your course to a higher level Presented by Sidne Tate Director, Instructional.
554 Access Denied Fermilab’s Experiences with Spamcop.net Kevin Hill Ray Pasetes Jack Schmidt.
University of Southern California Identity and Access Management (IAM)
Breaking Down Barriers & Building Bridges Improves Customer Satisfaction & Efficiency Wendy Woodward | March 15, 2011 Copyright Wendy Woodward 2011.
Federated Identity Management at Virginia Tech
Walking the Line Between Customer Service and Customer Codependency
Julian Hooker Assistant Managing Director Educause Southwest
Applications of Virtualization & Automation
Using Camtasia to Create Online Tutorials to Ease the Learning Curve
Decentralization in a Centralized IT Environment
Defining an IT Workflow, from Request to Support
IT All Staff M. Mundrane 16 March 2018.
Ed Barboni, Senior Advisor, Council of Independent Colleges
Blaine A. Brownell, President,
University of Southern California Identity and Access Management (IAM)
Privilege Management: the Big Picture
Project for OnLine Instructional Support (POLIS)
myIS.neu.edu – presentation screen shots accompany:
Signet Privilege Management
An App A Day Copyright Tina Oestreich and Brian Yuhnke This work is the intellectual property of the author. Permission is granted for this material.
Signet Privilege Management
Presentation transcript:

Information Technology Services 1 Copyright Copyright Marc Wallman and Theresa Semmens, This work is the intellectual property of the authors. Permission is granted for this material to be shared for non- commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the authors. To disseminate otherwise or to republish requires written permission from the author.

Information Technology Services 1.2 Open Source with Spam Filtering for the Enterprise North Dakota State University Fargo, ND

Information Technology Services 3 Overview Introductions About NDSU Description of Problem & Solution Development & Implementation Results Final Thoughts

Information Technology Services 4 About NDSU Land-grant institution – ,000 students, faculty and staff Part of HECN (Higher Education Computing Network) Provides services for six other ND institutions

Information Technology Services 5 Size and Scope of Services Typical message delivered <18 seconds Two systems –IMAP –GroupWise (approx. 400 accounts) Process for 23,000 addresses –Host IMAP accounts for 18,000 Accept approx. 135,000 messages daily for approx. 210,000 recipients

Information Technology Services 6 Problem Current spam filter not efficient Spam and unwanted received by campus community Diverse campus opinion on filtering angry complaints per day received by Help Desk

Information Technology Services 7 Solution Steps Solution required by University System Policy Users threatened lawsuits Plan of action –Spam Abatement Solutions Group –Spam Abatement Technical Group Project plan –ITLT approval –Provost approval

Information Technology Services 8 Spam Filter Solution An open source interim solution with varying levels of spam filtering the community could choose from –Year one budget: $35,440 (.5 FTE + hardware, support) –Year two budget: $21,380 (.25 FTE + hardware, support) –Year three budget: $15,130 (.25 FTE + hardware, support) Implement by August 2005

Information Technology Services 9 Filter Solution Levels LevelObvious SpamPotential Spam Disabled Deliver Quarantine Delete Deliver Quarantine Delete

Information Technology Services 10 Timeline Nov. 1, 2004 to August 2005: R&D April 1, 2005: Create policy May 1- July 30: Testing phase July 1-15: Survey Test Users July 30: Final assessment by testing group –Services Web page updated to include spam filter –Implement Safe & Block Sender Lists August 15: Filter is available service December 15: Review of project

Information Technology Services 11 Method: Tag and Deliver Delivery decision based on user selected rules. Tag all incoming mail as – Not Spam, – Potential Spam, or – Obvious Spam. Notes: Special tagging to accommodate Novell’s GroupWise. Manual delivery rules required for users forwarding their mail.

Information Technology Services 12 Benefits of Tag and Deliver 1.Quarantine is managed by user’s client. 2.Quarantined messages count against user’s quota.

Information Technology Services 13 Extra Features 1.Automatic purge of messages > 30 days in quarantine 2.Safe Sender and Block Sender lists 3.Re-registering for spam service will fix a user’s broken spam filter (e.g., a deleted quarantine folder)

Information Technology Services 14 Infrastructure

Information Technology Services 15 Advantages 1.Opt-in service 2.Solution integrated with existing services 3.Well defined, easy for end users to understand 4.Tagging method isolates mechanics of spam identification from user interface 5.All mail is tagged: Metrics on spam identification effectiveness are precise 6.Easy infrastructure maintenance 7.Scalable infrastructure

Information Technology Services 16 Disadvantages 1.Cannot make delivery decisions for users on systems where spam filtering takes place 2.Cannot make delivery decisions for back end mail servers (e.g., Listserv server) on systems where spam filtering takes place

Information Technology Services 17 Subscription Rate

Information Technology Services 18 Effectiveness

Information Technology Services 19 What it looks like

Information Technology Services 20 Tools Used Sendmail ( MailScanner ( Spamassassin ( Perdition Mail Retrieval Proxy ( UW IMAPd ( Procmail (

Information Technology Services 21 Questions? Marc Wallman Sr. Systems Administrator (701) Theresa Semmens NDSU IT Security Officer (701)