|Title||Start Date & Time||End Date & Time|
|Service Issue Reported: Campus Wireless||Monday, February 12, 2018 - 10:05am|
|Service Issue Updated: Student Account Access||Friday, February 9, 2018 - 12:39pm|
|Service Issue Reported: Power outage on East Campus||Tuesday, February 13, 2018 - 1:40pm|
|Service Restored: Voice Services: Long Distance Calls Experiencing Issues||Wednesday, February 21, 2018 - 10:20am||Wednesday, February 21, 2018 - 10:47am|
|Service Maintenance Scheduled: Emergency: VPN||Thursday, February 22, 2018 - 6:30am||Thursday, February 22, 2018 - 7:00am|
|Service Maintenance Scheduled: Digication||Sunday, February 25, 2018 - 4:00am||Sunday, February 25, 2018 - 6:00am|
|Service Maintenance Scheduled: IEC & MTRS Building Networks||Thursday, March 1, 2018 - 6:00am||Thursday, March 1, 2018 - 7:00am|
|Service Maintenance Scheduled: Campus Firewall||Tuesday, March 6, 2018 - 5:30am||Tuesday, March 6, 2018 - 6:30am|
CU Boulder recommends that all highly confidential data servers have host-based intrusion detection software installed and used by the server administrator. To help facilitate this requirement, OIT and IT Security have developed helpful support resources for server administrators, as well recommended no-cost solutions.
Host-based intrusion detection software is encouraged on all highly confidential data servers and recommended for all Internet facing servers. OIT recommends selecting Host-based intrusion software that meets the following objectives: strong configuration management and mandatory access-control/sandboxing for systems which maintain highly confidential data or are Internet facing.
OIT recommends the following solutions and will provide the best level of support for customers who use them:
Server administrators can use an alternative solution such as Puppet, Anisble, Powershell Desired Configuration Management, or Salt.
*Note: CU Boulder has retired the Tripwire service and site license. Please use the appropriate software for your needs from the list above.
Host-based intrusion detection software (HIDS) should be installed and used by the server administrator.
Attending a no-cost training session facilitated by IT Security is encouraged to understand how to best protect your data. These trainings will give you a security refresher, general information about HIDS, and instructions for how to acquire site licenses and help. Contact the IT Security Office to sign up for IT Security training.