NetReg – Virus Killer? Spam Stopper? Copyright – 2006This work is the intellectual property of the authors. Permission is granted for this material to.

Slides:



Advertisements
Similar presentations
Student Laptop Program Victories and Defeats Dr. Timothy M. Chester, CIO Texas A&M University at Qatar
Advertisements

What Does the Net Generation Expect From Us? SAC August 8, 2005 SAC August 8, 2005 Copyright © 2005, Joel L. Hartman. This work is the intellectual property.
Student, Faculty, and Staff Data Availability and Protection What’s the Back-Up Plan? (for academic computing) Sponsored by.
So Your Computer is Infected, Now What? STC/STS Tech Training 3:00-4:00, Tuesday, August 18, 2009 Brian Allen Network Security Analyst,
© Copyright Computer Lab Solutions All rights reserved. Do you need usage information about your computer labs? Copyright Computer Lab Solutions.
Cut Costs and Increase Productivity in your IT Organization with Effective Computer and Network Monitoring. Copyright © T3 Software Builders, Inc 2004.
Securing BSC’s Wireless Network Nercomp Annual Conference March 7, 2005 Pat Cronin, Assoc. VP Information Technology Mike King, Telecommunications Technician.
The Academic Computing Assessment Data Repository: A New (Free) Tool for Program Assessment Heather Stewart, Director, Institute for Technology Development,
Information Technology Services & Office of Residence Life WIRED Computer Protection CD: Healing Students' Personally Owned Computers Information Technology.
EDUCAUSE Security Professionals Conference 2007 Monkey-in-the-Middle Attacks on Campus Networks Andrew J. KortySean KrulewitchIndiana University April.
Seeing the Forest and the Acorns in the Decision Tree Sandy Burke Computing Center HelpDesk Manager Copyright Sandy Burke, This work is the intellectual.
Delivering Windows OS Updates at Yale with SUS EDUCAUSE Security Professionals Workshop May 17, 2004 Washington DC Ken Hoover, Systems Programmer
Educause Security Professionals Conference Network Access Control through Quarantine, Remediation, and Verification Jonny Sweeny Incident Response Manager.
Educause Security 2007ISC Information Security Copyright Joshua Beeman, This work is the intellectual property of the author. Permission is granted.
Beyond Basic Computer Skills: Implementing Technology Fluency Cynthia Edwards, Professor of Psychology Kristin Watkins, Computer Applications Specialist.
"Copyright Kevin Lynch This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Copyright Anthony K. Holden, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Wireless LANs A Case Study of Baylor University’s Wireless Network Copyright Bob Hartland 2002 This work is the intellectual property of the author. Permission.
Web Portal Development with uPortal or.Net Midwest Educause: March 24-26, 2003 David B. Williams Mark Troester
1 EDUCAUSE 2002 IT Support Community Training Model University of Colorado at Boulder.
Copyright Shanna Smith & Tom Bohman (2003). This work is the intellectual property of the authors. Permission is granted for this material to be shared.
Mobile Computing and Security Authenticated Network Access (ANA) Jon Peters Associate Director Dave Packham Manager of Network Engineering NetCom University.
Moving Out of The Shadows: Shining a Light on Data David Rotman Director of Computer Services Mark Mazelin Web Development Coordinator Copyright David.
A Novel Idea in Application Development Ask the Users What They Want Michael Nola Copyright Mike Nola, This work is the intellectual property of.
Embedded Librarian Program: Librarians and Faculty Partnering to Serve Online Students NERCOMP Annual Conference Innovation and Reliability: Finding the.
Copyright © College of Mount St. Joseph, 2002 This work is the intellectual property of the authors. Permission is granted for this material to be shared.
Moving Your Paperwork Online Western Washington University E-Sign Web Forms Copyright Western Washington University, This work is the intellectual.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Unified Messaging at Williams College A Cost Model Analysis By Mark Berman Copyright Mark Berman, This work is the intellectual property of the author.
Baylor University and Xythos EduCause Southwest 2007 Dr. Sandra Bennett Program Manager Online Teaching and Learning System Copyright Sandra Bennett 2007.
Best Practices For Using Technology To Deliver Instructional Support Services Dr. Steven G. Sachs Northern Virginia Community College Copyright Steven.
Sharing Information and Controlling Content: Continuing Challenges for Higher Education Susanna Frederick Fischer Assistant Professor Columbus School of.
Catalyst Portfolio Tool Copyright Tom Lewis, This work is the intellectual property.
Please Note: Copyright –David L. Snellman This work is the intellectual property of the author. Permission is granted for this material to be shared.
Information Technology Services 1 Copyright Copyright Marc Wallman and Theresa Semmens, This work is the intellectual property of the authors. Permission.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
York Secure Scan vs Microsoft Windows Our story and how we dealt with it.
Building the Integrated Learning Center Having the right people at the table Chris Johnson, Senior Consultant for Learning Technologies University of Arizona.
Learning In A Techno World How Safe is Your Cyberspace?
Issues Associated with ePortfolios in Small Colleges EDUCAUSE Mid-Atlantic Regional Conference 2006 Ed Barboni, Senior Advisor, Council of Independent.
Campus Google Map Applications Copyright Robert Workman 2006 This work is the intellectual property of the author. Permission is granted for this material.
Megan Adams, Swarthmore College Mark Colvson, Bryn Mawr College January 17, 2003 Collaborative Virtual Reference Services: The Tri-College Libraries’ Experience.
Section 6 Theory Software Copyright, Viruses and Hacking.
The "How" and "Why" of a Large-Scale Wireless Deployment  March 3, 2004  EDUCAUSE Western Regional Conference Sacramento, CA Copyright Philip Reese,
Discussion Panelists: Justin C. Klein Keane Sr. Information Security Specialist University of Pennsylvania Jonathan Hanny Application Security Specialist.
NERCOMP 2002 Networks, Town and Gown: Collaborating with the Community Pat Cronin & Bill Davis Bridgewater State College Bridgewater, Massachusetts Copyright.
Simplifying the Configuration of Student Laptops — StirlingVPNSetup Simon Booth University of Stirling Laptop Forum 27th June 2006.
1 Improving Security Through Automated Policy Compliance Christopher Stevens Director of Network and Technical Services Lewis & Clark College Educause.
November 7, 2005EDUCAUSE Live1 An Eye to the Future with a Brief Look at the Past Jack McCredie UC Berkeley November 7, 2005 Copyright John W. McCredie.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Copyright © 2003, The University of Texas at Austin. This work is the intellectual property of the author. Permission is granted for this material to be.
Information Technology Services Getting Engaged: Renewing the IT Organization and Its Management in Large Universities Neil Thelander Queensland University.
Portals and Web Standards Lessons Learned and Applied David Cook Copyright The University of Texas at Austin This work is the.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
Copyright Statement Copyright Robert J. Brentrup This work is the intellectual property of the author. Permission is granted for this material to.
Copyright © 2011 Rachel Fourny. This work is the intellectual property of Rachel Fourny. Permission is granted for this material to be shared for non-commercial,
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
Trusted Electronic Communications for Federal Student Aid Mark Luker Vice President EDUCAUSE Copyright Mark Luker, This work is the intellectual.
The Duluth Area CIO’s Consortium Collaborating with Regional IT Organizations Copyright Linda Deneen and Lynne Hamre, This work is the intellectual.
Copyright James Kulich This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Copyright Michael White and Sylvia Maxwell, This work is the intellectual property of the author. Permission is granted for this material to be shared.
© Scottsdale Community College Leveraging the Power of E-Learning Taking your course to a higher level Presented by Sidne Tate Director, Instructional.
IPEmotion License Management PM (V1.2).
Copyright Joel Rosenblatt 2010
Ed Barboni, Senior Advisor, Council of Independent Colleges
Project for OnLine Instructional Support (POLIS)
myIS.neu.edu – presentation screen shots accompany:
An App A Day Copyright Tina Oestreich and Brian Yuhnke This work is the intellectual property of the author. Permission is granted for this material.
EDUCAUSE Networking 2002 Washington, D.C. April 17, 2002
Presentation transcript:

NetReg – Virus Killer? Spam Stopper? Copyright – 2006This work is the intellectual property of the authors. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the authors. To disseminate otherwise or to republish requires written permission from the authors. Matt Brzeski, David Love Educause Midwest Regional March 15, 2006

NetReg Virus Killer? Spam Stopper?

Agenda  What was the problem?  What resources did we use?  What benefits/lessons did we gain?

Presenters  Matt Brzeski Student Computing Coordinator  David Love Programmer / Computer Support Technician

Background  Carthage College Liberal arts 2200 enrollment Kenosha, WI 2/3 between Chicago and Milwaukee

Environment  Students own computers  Residential halls

Networking Wired – Each hall is subnet – Not port-per-pillow Wireless – VLAN per hall – VLAN for rest of campus

Problem  Students could not compute I cannot “IM” my friends!!! What are these popups? My computer is slow-w-w-w

Impact on campus  One infected PC took a whole dorm offline  Work to clean PCs

Technical Goals  Map MAC address to Novell username  Verify acceptance of A.U.P.  Enforce certain terms of A.U.P. Windows XP Service Pack 2 Symantec Anti-virus Definitions < 30 days old  Prevent access if conditions are not met

Solutions considered  NetReg  Nessus

NetReg  NetReg Used by St. Norbert’s, Amherst, University of Vermont, Duke, et alii  Validator (modified) Written by St. Norbert College

How NetReg Works

How the Validator Works  Download and run the program  Checks various registry keys Confirm SP2 installation Confirm Symantec installation Retrieve virus definition date  Send information to server  If matches conditions, set a cookie (which NetReg will check for)

Programming NetReg  Server setup Dual PII 400Mhz w/ 128 MB RAM SuSE LAMP stack (minus the M)  BIND + Dhcpd  Software NetReg Validator Cron job to fetch virus definitions

Is It Secure?  Do we care? 80 / 20 rule  Most problems caused (as earlier numbers show) by average Windows users Make everyone else (Mac, Linux, etc.) register, but no equivalent validator  If user is sophisticated enough to set a static IP or fudge the URL, unlikely to be a problem

What does it look like?

Registration page

Publicity  notices  Freshman orientation  College newspaper

(Perceived) Benefits  NetReg help instead of AntiVirus now shorter in duration keeps ‘problem’ PCs off network

Lessons Learned  ‘Old’ OSes remain  AOL Browser ‘in the way’  Definitions kept current  Spyware gets nasty Rootkits  Spam goes thru 3 rd party Login.postini.com

Questions?  

The End