|Title||Start Date & Time||End Date & Time|
|Service Issue Updated: Campus Wireless||Monday, February 12, 2018 - 10:05am|
|Service Issue Updated: Northstar||Thursday, May 24, 2018 - 11:28am|
|Service Maintenance Scheduled: Skillsoft||Saturday, June 23, 2018 - 7:00am||Saturday, June 23, 2018 - 7:00pm|
|Service Maintenance Scheduled: Campus Solutions & Portals||Sunday, June 24, 2018 - 6:00am||Sunday, June 24, 2018 - 6:00pm|
|Service Maintenance Scheduled: Network Services in Multiple Buildings||Tuesday, June 26, 2018 - 5:00am||Tuesday, June 26, 2018 - 7:30am|
|Service Maintenance Scheduled: Networks in Farrand, Cockerell, Sewall, Brackett, Aden||Monday, June 25, 2018 - 8:00am||Thursday, June 28, 2018 - 5:00pm|
One of the most important steps in IT management and IT security is understanding what physical and virtual IT assets an organization owns and manages. A good inventory provides information that is useful to daily system management, business office asset tracking, and security incident response. The University of Colorado has also developed a system-wide policy that requires departments to maintain IT asset inventories which can be found here:
To assist in the process of creating IT asset inventories, the IT Security Office has created the following guidance documents and templates for both departments with existing inventories and departments that are creating one for the first time.
Departments undertaking an IT asset inventory for the first time should read this document discussing the process in general, as well as the specific campus needs: Asset inventory guidance for departments without an existing inventory
Departments looking to augment an existing inventory and learn about new requirements should read this document: Asset inventory guidance for departments with existing inventories
The following two templates are referenced in the guidance documents and can be used to build an asset inventory.
To assist departments in locating files containing social security numbers or credit card numbers, OIT provides Identity Finder for Windows and Macintosh, and recommends University of Texas's SENF for Linux. You can find out more here:
highly confidential data Search Software
These quick reference guides help departments make decisions on how to handle highly confidential data they have identified within their department.