Educause Security Discussion mailing list archives

Desktop Management Policies and Procedures


From: Gary Flynn <flynngn () JMU EDU>
Date: Tue, 16 Oct 2007 11:52:40 -0400

We're looking for sample policies and procedures related
to desktop management. Specifically, we're looking for
decision, testing, approval, and notification processes
around functions such as:

1) Software/hardware inventory sweeps
2) Third party software updates due to security
   defects ( e.g. Quicktime, Acrobat, Java ).
3) Login or network based WMI script runs across installed
   base - visible/invisible/maybe-invisible to operator
4) Group policy changes - visible/invisible/maybe-invisible
   to operator

--
Gary Flynn
Security Engineer
James Madison University
www.jmu.edu/computing/security

Current thread: