Presentation is loading. Please wait.

Presentation is loading. Please wait.

Critical Host Database Overview. Critical Host Definition The current policy (which is being updated as we speak) defines a Critical Host as: The current.

Similar presentations


Presentation on theme: "Critical Host Database Overview. Critical Host Definition The current policy (which is being updated as we speak) defines a Critical Host as: The current."— Presentation transcript:

1 Critical Host Database Overview

2 Critical Host Definition The current policy (which is being updated as we speak) defines a Critical Host as: The current policy (which is being updated as we speak) defines a Critical Host as: Contain sensitive or confidential data including, but not limited to, personally identifiable medical records, payroll information, student grades and transcripts, or social security numbers, or Contain sensitive or confidential data including, but not limited to, personally identifiable medical records, payroll information, student grades and transcripts, or social security numbers, or Are used in planning, managing, or operating major academic, research, or administrative functions of the University. Are used in planning, managing, or operating major academic, research, or administrative functions of the University. You should also include all mission critical devices that could affect your school or center’s ability to conduct business You should also include all mission critical devices that could affect your school or center’s ability to conduct business

3 Obtaining an account You must be listed as host contact in the assignments database for the host you need to manage You must be listed as host contact in the assignments database for the host you need to manage Your IT Director or equivalent must send an email to security@isc.upenn.edu giving you authorization and include your email address, pennkey, first and last name Your IT Director or equivalent must send an email to security@isc.upenn.edu giving you authorization and include your email address, pennkey, first and last namesecurity@isc.upenn.edu Once the account is created you will receive an email confirmation. At this point you can begin to use the application. Once the account is created you will receive an email confirmation. At this point you can begin to use the application.

4 Critical Host Application The application uses the FAST database infrastructure and queries the assignments database for authorization (ie, host contact), IP Address and contact information The application uses the FAST database infrastructure and queries the assignments database for authorization (ie, host contact), IP Address and contact information Making a change in assignments will affect the data in critical host application but the application does not make changes to the assignments database. So, if you delete a record in assignments the critical host database will not be able to retrieve the data. Deleting or modifying a record in the crit host app will not affect the data in the assignments database. Making a change in assignments will affect the data in critical host application but the application does not make changes to the assignments database. So, if you delete a record in assignments the critical host database will not be able to retrieve the data. Deleting or modifying a record in the crit host app will not affect the data in the assignments database.

5 Using the application Log in with your pennkey and password (link provided later) Log in with your pennkey and password (link provided later) You will then have two main functions for managing your hosts. Finding records or Creating records. You will then have two main functions for managing your hosts. Finding records or Creating records.

6 Screen Capture

7 Register a host

8 If the record already exists or the assignments information is missing you will get an error. If the record already exists or the assignments information is missing you will get an error. Now click the “Select” button Now click the “Select” button

9 Register a host

10 Finding Searching for UPENN.EDU would give all hosts for the entire campus. However your authorization will only allow your own domain such as SECURITY.ISC.UPENN.EDU Searching for UPENN.EDU would give all hosts for the entire campus. However your authorization will only allow your own domain such as SECURITY.ISC.UPENN.EDU

11 Finding results

12 All for now Visit our security website and follow the Critical Hosts link http://www.upenn.edu/computing/security/ Visit our security website and follow the Critical Hosts link http://www.upenn.edu/computing/security/ http://www.upenn.edu/computing/security/ Or go directly to the application from https://medley.isc-seo.upenn.edu/criticalHosts/jsp/fast.do Or go directly to the application from https://medley.isc-seo.upenn.edu/criticalHosts/jsp/fast.do https://medley.isc-seo.upenn.edu/criticalHosts/jsp/fast.do If any of you have questions please send to LTR@ISC.UPENN.EDU If any of you have questions please send to LTR@ISC.UPENN.EDU


Download ppt "Critical Host Database Overview. Critical Host Definition The current policy (which is being updated as we speak) defines a Critical Host as: The current."

Similar presentations


Ads by Google