Information Technology at Emory Information Technology Division Technical Services IT Briefing Agenda 3/18/04 March Action Items Kronos Update eVac Demonstration.

Slides:



Advertisements
Similar presentations
Feedback on the report. It is like the exam The way I mark your report is similar to the way I shall mark your exam.
Advertisements

Information Technology at Emory Information Technology Division Technical Services IT Briefing Agenda 4/21/05 SPAM Update Manage IT Update Manage IT Demo.
7 Effective Habits when using the Internet Philip O’Kane 1.
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
E-commerce Web Site: Sales and Inventory Management System Markku Marjoneva.
Symantec AntiVirus Update Mark Reynolds Manager of Support Services Technology Support Services Michael Satut Manager of Distributed Support Services Technology.
Trend Micro Round Table May 19, Agenda Introduction – why switch? Timeline for implementation Related policies Trend Micro product descriptions.
SIRT Contact Orientation Security Incident Response Team Departmental Security Contacts April 16, 2004.
1 CS6320 – Why Servlets? L. Grewe 2 What is a Servlet? Servlets are Java programs that can be run dynamically from a Web Server Servlets are Java programs.
How to Protect Your PC Grayware Adware, Malware, Spyware.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Bear Access Fall 2005 Dan Bartholomew Lee Brink May 25, 2005.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Module 6: Patches and Security Updates 1. Overview Installing Patches and Security Updates Recent patches and security updates for IIS Recent patches.
Deploying Visual Studio Team System 2008 Team Foundation Server at Microsoft Published: June 2008 Using Visual Studio 2008 to Improve Software Development.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Avanade: 10 tips for å sikring av dine SQL Server databaser Bernt Lervik Infrastructure Architect Avanade.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Small Business Edition 4 C707 – Technical overview.
Information Technology at Emory Information Technology Division Technical Services IT Briefing Agenda 7/15/04 PS Support Overview June Action Items TS.
Cyber Patriot Training
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
IT Update Faculty Senate September 1, 2004 University of Houston Information Technology.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Securing Your Home Computer Securing Your Home Computer Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
POSITIONING STATEMENT For people who operate shared computers with Genuine Windows XP, the Shared Computer Toolkit is an affordable, integrated, and easy-to-use.
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
Publish Calendars to the Web. CCUweb Presentation (10 Minutes) 1 Demonstration of published calendars (10 minutes) 2 Demonstration of importing calendar.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
PC MANAGER MEETING January 23, Agenda  Next Meeting  Training  Windows Policy  Main Topic: Windows AV Service Review.
PASS Migration * PASS Migration Update Part IV * PASS Beta Test Launched – Review.
Information Technology IT Briefing May Information Technology 1 IT Briefing May 17, 2007  Quick Updates  Meeting Maker Update  University Exchange.
1 Welcome to CSC 301 Web Programming Charles Frank.
Information Technology at Emory Information Technology Division Technical Services IT Briefing Agenda 7/17/05 New scanning tools EOL/eVax & BTS Oracle.
Information Technology at Emory Information Technology Division Technical Services IT Briefing Agenda 8/19/04 SW Distribution Update CSD Updates –iCommand.
IT Briefing April IT Briefing Agenda 4/20/06 Web Update eSubmissions Overview AAIT Finance Team Overview IT Website Enhancements Security Updates.
Information Technology at Emory Information Technology Division Technical Services IT Briefing Agenda 5/19/05 Dell Update Manage IT Update Exchange Update.
Migrating Your Business To An E-Business Migrating Your Business to an E-Business Robert Edmiston Technology Manager
Small Business Security Keith Slagle April 24, 2007.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Google Apps and Education Jack Nieporte St James of the Valley
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Web Security. Introduction Webserver hacking refers to attackers taking advantage of vulnerabilities inherent to the web server software itself These.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Sydney Baize Mrs. Shirley Miller BPC110. “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious.
Information Technology IT Briefing May Information Technology 1 IT Briefing May 17, 2007  Quick Updates  Meeting Maker Update  University Exchange.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Application Migration Fritz Ohman Alphageek
Web Server Security: Protecting Your Pages NOAA OAR WebShop 2001 August 2 nd, 2001 Jeremy Warren.
John Samuels October, Why Now?  Vista Problems  New Features  >4GB Memory Support  Experience.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
bitdefender virus protection
Botnets A collection of compromised machines
What are they? The Package Repository Client is a set of Tcl scripts that are capable of locating, downloading, and installing packages for both Tcl and.
Introduction to System Administration
Introduction to System Administration
Botnets A collection of compromised machines
Contact Norton Antivirus | Norton Antivirus Support UK
Web Servers / Deployment
Designing IIS Security (IIS – Internet Information Service)
Web Servers (IIS and Apache)
SBS 2008 – One year on David Overton
Presentation transcript:

Information Technology at Emory Information Technology Division Technical Services IT Briefing Agenda 3/18/04 March Action Items Kronos Update eVac Demonstration Netscape Migration Vacation App. Karen Jenkins Byron Nash Garrett Bryant Mahbuba Ferdousi Theresa Goriczynski

Information Technology at Emory eVax protect your digital self.

Information Technology at Emory Information Technology Division Technical Services What makes our job tough? Viruses Trojans Worms Hackers Spyware Unaware users

Information Technology at Emory Information Technology Division Technical Services Goals Reduce virus presence on networked computers Reduce visibility and vulnerability of networked computers to hackers Be as automated as possible Be easily customized or OEM’ed Be easy to update

Information Technology at Emory Information Technology Division Technical Services Methodology Clean sweep approach Best-effort known-state localization Fixed order of operations to ensure best results

Information Technology at Emory Information Technology Division Technical Services What’s the answer? For now, it’s eVax.

Information Technology at Emory Information Technology Division Technical Services Features Detailed OS Detection Run Removal Tools Install Latest Service Pack Install Latest Critical Updates Set Windows to Auto-update Setup the Built-in Firewall

Information Technology at Emory Information Technology Division Technical Services Features, cont. Install/Update/Scan with Symantec Anti-Virus Install/Update/Scan with Lavasoft Ad-Aware Blank password account detection Sends user to windowsupdate upon completion

Information Technology at Emory Information Technology Division Technical Services Design Architecture Modular, portable file structure Application agnostic Scriptable for OEMs Fully-automatic mode for end users A la carte mode for advanced users

Information Technology at Emory Information Technology Division Technical Services Case Study: ResNet 600 calls have been run with eVax since Freshmen Arrival Weekend Zero blue-screens 75% of calls in the ResNet queue are resolved by an RCC with eVax alone and don’t make it to tier II

Information Technology at Emory Information Technology Division Technical Services Current Impact: ResNet Shifting nature of Tier II calls back away from virus and hack attempts to application issues RCCs resolving more calls on their own Better overall perception from customers of fast, effective service

Information Technology at Emory Information Technology Division Technical Services Future Impact: ResNet eVax distributed to end users in Fall 2004, eliminating 50-75% of calls RCCs have fewer, but more difficult calls; we can train them for this RCCs begin to handle some Tier II calls, allowing more expensive staff to be re-tasked as appropriate

Information Technology at Emory Information Technology Division Technical Services What’s the Catch? Some items are very date-sensitive: –Removal Tools –Critical Updates –Virus Definitions –Spyware Definitions Some are less sensitive: –Service Packs Some are not: –Setting windows auto-update –Setting the built-in firewall

Information Technology at Emory Information Technology Division Technical Services What’s Next? Empower the end users Continual testing and feedback on eVax help make it better for everyone Distribution to end users is the ultimate goal: reduce support burden

Information Technology at Emory Information Technology Division Technical Services The Future of eVax Advanced user toolkit add-on: –Symantec Registry Removal Tool –Undo for Firewall/Auto update –“Trojan Hunter” scripting language Longhorn support built-in through its modularity Client-server model to pull down updates after initial run

Information Technology at Emory Information Technology Division Technical Services Q & A R. Garrett Bryant (404)

Information Technology at Emory Migrating from the current web server (www-source) to the new web server (“Maple”) Mahbuba Ferdousi Technical Services

Information Technology at Emory Information Technology Division Technical Services Why Migrate ?  Demand for new technologies  Cold Fusion  PHP  Database Access  Security requirements / Protection  Move from Netscape to Apache

Information Technology at Emory Information Technology Division Technical Services What is Maple? Maple is the new web server environment Created 2 years ago Target date to decommission the old web server environment using Netscape by July 30, It is not feasible for us to continue both services

Information Technology at Emory Information Technology Division Technical Services Migrating Anyone who has content in the current web server (www-source) should begin migrating their content to the new web server (“Maple”). For help, please go to:

Information Technology at Emory Information Technology Division Technical Services What Changed? The way in which you create your web content will not change, you can still use the web- editing tool you are familiar with. Knowledge of Cold Fusion, PHP or databases is not necessary to use Maple. How you transfer your files will change. The change that will affect everyone is that “ftp” is not available in the new web server.

Information Technology at Emory Information Technology Division Technical Services What Changed? The new transfer method (protocol) is called WebDAV and is used to upload/download files. If you are currently using ftp to upload/download files, you will now use WebDAV. WebDAV is easy to learn.

Information Technology at Emory Information Technology Division Technical Services Available Training ITD will conduct a training session to help you migrate your content to Maple. How to use WebDAV to upload/download your files Training is scheduled for Tuesday, March 30, 2004 in the North Decatur Bldg., in 4th floor Auditorium For more information on migrating visit -

Information Technology at Emory Information Technology Division Technical Services Migration Process Met with content owners on 3/15/04 Obtained a list of action items from the community Formed a technical team to discuss known issues with Mac OS/X, WebDAV and Dreamweaver

Information Technology at Emory Information Technology Division Technical Services Migration Process (cont.) Will setup a training session for people using Dreamweaver Will schedule future meetings for April, May and June. Continue to communicate to Local Support. Communicate via the

Information Technology at Emory Information Technology Division Technical Services Questions?