|Title||Start Date & Time||End Date & Time|
|Service Issue Reported: Campus Wireless||Monday, February 12, 2018 - 10:05am|
|Service Issue Updated: Student Account Access||Friday, February 9, 2018 - 12:39pm|
|Service Issue Reported: Power outage on East Campus||Tuesday, February 13, 2018 - 1:40pm|
|Service Maintenance Scheduled: Campus Solutions & Portals||Saturday, February 17, 2018 - 6:00am||Sunday, February 18, 2018 - 6:00pm|
|Service Maintenance Scheduled: Digication||Sunday, February 25, 2018 - 4:00am||Sunday, February 25, 2018 - 6:00am|
|Service Maintenance Scheduled: Campus Firewall||Wednesday, February 28, 2018 - 5:30am||Wednesday, February 28, 2018 - 6:30am|
One of the most important steps in IT management and IT security is understanding what physical and virtual IT assets an organization owns and manages. A good inventory provides information that is useful to daily system management, business office asset tracking, and security incident response. The University of Colorado has also developed a system-wide policy that requires departments to maintain IT asset inventories which can be found here:
To assist in the process of creating IT asset inventories, the IT Security Office has created the following guidance documents and templates for both departments with existing inventories and departments that are creating one for the first time.
Departments undertaking an IT asset inventory for the first time should read this document discussing the process in general, as well as the specific campus needs: Asset inventory guidance for departments without an existing inventory
Departments looking to augment an existing inventory and learn about new requirements should read this document: Asset inventory guidance for departments with existing inventories
The following two templates are referenced in the guidance documents and can be used to build an asset inventory.
To assist departments in locating files containing social security numbers or credit card numbers, OIT provides Identity Finder for Windows and Macintosh, and recommends University of Texas's SENF for Linux. You can find out more here:
highly confidential data Search Software
These quick reference guides help departments make decisions on how to handle highly confidential data they have identified within their department.