|Title||Start Date & Time||End Date & Time|
|Service Restored: Youtube Age-Restricted Content Inaccessible From CU Network||Saturday, September 15, 2018 - 2:28pm|
|Service Maintenance Completed: Wired Network in Multiple Buildings||Thursday, September 20, 2018 - 6:30am||Thursday, September 20, 2018 - 7:30am|
|Service Maintenance Completed: Wi-Fi Services Across Campus||Thursday, September 20, 2018 - 9:00am||Thursday, September 20, 2018 - 10:00am|
|Service Maintenance Scheduled: Turnitin||Saturday, September 22, 2018 - 9:00am||Saturday, September 22, 2018 - 5:30pm|
|Service Maintenance Scheduled: Campus Solutions & Portals||Sunday, September 23, 2018 - 6:00am||Sunday, September 23, 2018 - 2:00pm|
|Service Maintenance Scheduled: F5 Content Switch||Thursday, September 27, 2018 - 6:30pm||Thursday, September 27, 2018 - 7:30pm|
|Service Maintenance Scheduled: Wi-Fi in Bear Creek Apartments||Tuesday, October 2, 2018 - 6:00am||Tuesday, October 2, 2018 - 7:30am|
CU Boulder recommends that all highly confidential data servers have host-based intrusion detection software installed and used by the server administrator. To help facilitate this requirement, OIT and IT Security have developed helpful support resources for server administrators, as well recommended no-cost solutions.
Host-based intrusion detection software is encouraged on all highly confidential data servers and recommended for all Internet facing servers. OIT recommends selecting Host-based intrusion software that meets the following objectives: strong configuration management and mandatory access-control/sandboxing for systems which maintain highly confidential data or are Internet facing.
OIT recommends the following solutions and will provide the best level of support for customers who use them:
Server administrators can use an alternative solution such as Puppet, Anisble, Powershell Desired Configuration Management, or Salt.
*Note: CU Boulder has retired the Tripwire service and site license. Please use the appropriate software for your needs from the list above.
Host-based intrusion detection software (HIDS) should be installed and used by the server administrator.
Attending a no-cost training session facilitated by IT Security is encouraged to understand how to best protect your data. These trainings will give you a security refresher, general information about HIDS, and instructions for how to acquire site licenses and help. Contact the IT Security Office to sign up for IT Security training.