In order to provide a safe and clean network environment for all users, IT Services uses various technologies to detect and control machines on the network that are exhibiting malicious or disruptive activity.

In the event that a machine is thusly detected, the machine will be isolated from the broader network and placed into a quarantine where the owner will be provided with links to resources that will enable the owner to clean the machine. Once the machine is cleaned, and has remained clean for a period of three hours from the last time that malicious activity was detected (not including time when the machine was turned off or unplugged/removed from the network), full network services will be restored.

ABOUT IT SERVICES LINKS

Areas within IT Services

Organizational chart

Staff list (restricted to campus)

Employee recognition

IT Projects Status

Our location: Cudahy Hall

Check for career openings

Students: Apply for student jobs

Policies


SITE MENU