Difference between revisions of "Network Policy"
(→Political Activity) |
(→Virus Scanning) |
||
(17 intermediate revisions by 2 users not shown) | |||
Line 5: | Line 5: | ||
=== Operating System Updates === | === Operating System Updates === | ||
− | Here at the IGB we generally have each person responsible to keep their operating system up to date with the current security patches provided by the manufacturer as it is not feasible for us to schedule time and then go to each machine on a weekly basis to check for these updates. For extremely critical updates, we will remind the everyone@igb.illinois.edu mailing list that updates are available. Depending on the situation, failure to comply with this policy can result in your network connection being terminated at least temporarily. If you have questions about how to do this, please | + | Here at the IGB we generally have each person responsible to keep their operating system up to date with the current security patches provided by the manufacturer as it is not feasible for us to schedule time and then go to each machine on a weekly basis to check for these updates. For extremely critical updates, we will remind the everyone@igb.illinois.edu mailing list that updates are available. Depending on the situation, failure to comply with this policy can result in your network connection being terminated at least temporarily. If you have questions about how to do this, please email help@igb.illinois.edu |
=== Virus Scanning === | === Virus Scanning === | ||
− | We also have each contact person for a machine responsible for keeping an Anti-Virus program installed on a machine and kept up to date as it is not feasible for us to schedule time and then go to each machine on a weekly (or more frequent) basis. As viruses come out that we might think could be causing problems, we will notify the everyone@igb.illinois.edu mailing list regarding them. Depending on the situation, failure to comply with this policy can result in your network connection being terminated at least temporarily. | + | We also have each contact person for a machine responsible for keeping an Anti-Virus program installed on a machine and kept up to date as it is not feasible for us to schedule time and then go to each machine on a weekly (or more frequent) basis. As viruses come out that we might think could be causing problems, we will notify the everyone@igb.illinois.edu mailing list regarding them. Depending on the situation, failure to comply with this policy can result in your network connection being terminated at least temporarily. |
− | Generally speaking, switches, routers, access points, and/or hubs are not allowed on the IGB network without the express written permission of the CNRG office. This is due to our required | + | If Windows 7 is your operating system, you will need to download and install Microsoft Security Essentials at |
+ | https://support.microsoft.com/en-us/help/14210/security-essentials-download | ||
+ | |||
+ | If you are using Windows 10, Windows Defender is part of your operating system. Search for it in the search bar and make sure that it is turned on. | ||
+ | |||
+ | === Switches, Routers, Access Points, and Hubs === | ||
+ | |||
+ | Generally speaking, switches, routers, access points, and/or hubs are not allowed on the IGB network without the express written permission of the CNRG office. This is due to our required compliance with CITES regulations for the campus network, the fact that these devices will slow down the network for everyone else, difficulties this creates with backup, and difficulties they create in our need to track down problem machines on the network. On a temporary basis we will allow switches to be checked out from us on the condition that there is a sincere need, and that it is understood when the switch will be returned. Failure to comply with this policy will result in us removing the device and keeping it until a discussion with the appropriate professor or theme leader occurs. | ||
=== Network Cables === | === Network Cables === | ||
− | CNRG provides network cables in 5, 10, and | + | CNRG provides network cables in 5, 10, and 15 feet lengths. All non-CNRG provided cables are strictly prohibited over the network because this can cause problems with the network. Network cables cannot be strung through ceilings, through walls, across doorways, or through walkways as this will cause problems on the the larger network or fire hazards. Failure to comply with this policy will result in us removing the network cable. |
=== Existing Network Jacks === | === Existing Network Jacks === | ||
− | To reduce vulnerability to rogue machines on the network, all unused network jacks will be deactivated in the network closet. To get these jacks activated or to deactivate them when they are no longer in use, please e-mail the jack number and the room number the jack is | + | To reduce vulnerability to rogue machines on the network, all unused network jacks will be deactivated in the network closet. To get these jacks activated or to deactivate them when they are no longer in use, please e-mail CNRG the jack number and the room number where the jack is located. |
=== New Network Jacks === | === New Network Jacks === | ||
− | Network jacks can be added virtually anywhere, but need to be paid for by the user or group requesting the jacks. The normal cost for each box with lines being added | + | Network jacks can be added virtually anywhere, but need to be paid for by the user or group requesting the jacks. The normal cost for each box with lines being added is $500 for the first line and $50 for each additional line although the actual value will vary as CNRG does not do the actual installation. If you would like a network jack installed, please contact CNRG. |
+ | |||
+ | === Wireless Access Points === | ||
+ | |||
+ | In order to ensure that the building-wide wireless network runs at optimum conditions and data is transferred securely through the building, private wireless access points are not allowed. If you are having difficulty with your wireless connection, please contact CNRG. | ||
=== Web, FTP, and other Servers === | === Web, FTP, and other Servers === | ||
− | Web, FTP, and other similar type servers are permitted on the IGB network so long as they do not generate | + | Web, FTP, and other similar type servers are permitted on the IGB network so long as they do not generate a disproportionate amount of network traffic, are not involved in illegal activity, are kept secure, and do not contain content that contributes to an uncomfortable work environment. |
=== Peer to Peer Software === | === Peer to Peer Software === | ||
− | The presence of installed peer to peer server software is strictly prohibited on the IGB network due to the normal presence of illegal activity that accompanies this software, the associated security risks created by these normally insecure programs, and the network bandwith that these take from the other IGB users. Clients that are only able to | + | The presence of installed peer to peer server software is strictly prohibited on the IGB network due to the normal presence of illegal activity that accompanies this software, the associated security risks created by these normally insecure programs, and the network bandwith that these take from the other IGB users. Clients that are only able to receive software are permitted so long as illegal activity does not occur. We will be checking for common open ports used by peer to peer software on our network. |
=== Political Activity === | === Political Activity === | ||
− | It is illegal for anyone to use any services of the IGB for overt political activities | + | It is illegal for anyone to use any services of the IGB for overt political activities; however, everyday discussion is permitted. For example, e-mailing a group of people to ask them to vote for a particular candidate, concerning a particular issue, or for "get out the vote" activities from a computer on the IGB network or using IGB servers is banned. Debating issues with a friend or asking them if he/she voted will be tolerated so long as it does not cause a problem. |
Latest revision as of 12:56, 27 June 2018
Contents
IGB Network Responsibility Policy[edit]
In order for an orderly computing environment to exist, we at the IGB must come up with policies regarding its use and the responsibility of those who use it. If you have any questions about these policies, please contact us.This page changes often as new issues are brought to attention, so please check regularly for any new policies.
Operating System Updates[edit]
Here at the IGB we generally have each person responsible to keep their operating system up to date with the current security patches provided by the manufacturer as it is not feasible for us to schedule time and then go to each machine on a weekly basis to check for these updates. For extremely critical updates, we will remind the everyone@igb.illinois.edu mailing list that updates are available. Depending on the situation, failure to comply with this policy can result in your network connection being terminated at least temporarily. If you have questions about how to do this, please email help@igb.illinois.edu
Virus Scanning[edit]
We also have each contact person for a machine responsible for keeping an Anti-Virus program installed on a machine and kept up to date as it is not feasible for us to schedule time and then go to each machine on a weekly (or more frequent) basis. As viruses come out that we might think could be causing problems, we will notify the everyone@igb.illinois.edu mailing list regarding them. Depending on the situation, failure to comply with this policy can result in your network connection being terminated at least temporarily.
If Windows 7 is your operating system, you will need to download and install Microsoft Security Essentials at https://support.microsoft.com/en-us/help/14210/security-essentials-download
If you are using Windows 10, Windows Defender is part of your operating system. Search for it in the search bar and make sure that it is turned on.
Switches, Routers, Access Points, and Hubs[edit]
Generally speaking, switches, routers, access points, and/or hubs are not allowed on the IGB network without the express written permission of the CNRG office. This is due to our required compliance with CITES regulations for the campus network, the fact that these devices will slow down the network for everyone else, difficulties this creates with backup, and difficulties they create in our need to track down problem machines on the network. On a temporary basis we will allow switches to be checked out from us on the condition that there is a sincere need, and that it is understood when the switch will be returned. Failure to comply with this policy will result in us removing the device and keeping it until a discussion with the appropriate professor or theme leader occurs.
Network Cables[edit]
CNRG provides network cables in 5, 10, and 15 feet lengths. All non-CNRG provided cables are strictly prohibited over the network because this can cause problems with the network. Network cables cannot be strung through ceilings, through walls, across doorways, or through walkways as this will cause problems on the the larger network or fire hazards. Failure to comply with this policy will result in us removing the network cable.
Existing Network Jacks[edit]
To reduce vulnerability to rogue machines on the network, all unused network jacks will be deactivated in the network closet. To get these jacks activated or to deactivate them when they are no longer in use, please e-mail CNRG the jack number and the room number where the jack is located.
New Network Jacks[edit]
Network jacks can be added virtually anywhere, but need to be paid for by the user or group requesting the jacks. The normal cost for each box with lines being added is $500 for the first line and $50 for each additional line although the actual value will vary as CNRG does not do the actual installation. If you would like a network jack installed, please contact CNRG.
Wireless Access Points[edit]
In order to ensure that the building-wide wireless network runs at optimum conditions and data is transferred securely through the building, private wireless access points are not allowed. If you are having difficulty with your wireless connection, please contact CNRG.
Web, FTP, and other Servers[edit]
Web, FTP, and other similar type servers are permitted on the IGB network so long as they do not generate a disproportionate amount of network traffic, are not involved in illegal activity, are kept secure, and do not contain content that contributes to an uncomfortable work environment.
Peer to Peer Software[edit]
The presence of installed peer to peer server software is strictly prohibited on the IGB network due to the normal presence of illegal activity that accompanies this software, the associated security risks created by these normally insecure programs, and the network bandwith that these take from the other IGB users. Clients that are only able to receive software are permitted so long as illegal activity does not occur. We will be checking for common open ports used by peer to peer software on our network.
Political Activity[edit]
It is illegal for anyone to use any services of the IGB for overt political activities; however, everyday discussion is permitted. For example, e-mailing a group of people to ask them to vote for a particular candidate, concerning a particular issue, or for "get out the vote" activities from a computer on the IGB network or using IGB servers is banned. Debating issues with a friend or asking them if he/she voted will be tolerated so long as it does not cause a problem.