|Title||Start Date & Time||End Date & Time|
|Service Issue Updated: Apple Mail not receiving email for Office 365 Email accounts||Tuesday, August 1, 2017 - 4:21pm|
|Service Maintenance Completed: Campus Firewall||Wednesday, August 16, 2017 - 5:30am||Wednesday, August 16, 2017 - 6:30am|
|Service Maintenance Scheduled: ResNet Wireless||Thursday, August 17, 2017 - 5:00am||Thursday, August 17, 2017 - 7:00am|
|Service Maintenance Scheduled: Engineering Complex Firewall||Thursday, August 17, 2017 - 5:30am||Thursday, August 17, 2017 - 8:00am|
CU Boulder recommends that all highly confidential data servers have host-based intrusion detection software installed and used by the server administrator. To help facilitate this requirement, OIT and IT Security have developed helpful support resources for server administrators, as well recommended no-cost solutions.
Host-based intrusion detection software is encouraged on all highly confidential data servers and recommended for all Internet facing servers. OIT recommends selecting Host-based intrusion software that meets the following objectives: strong configuration management and mandatory access-control/sandboxing for systems which maintain highly confidential data or are Internet facing.
OIT recommends the following solutions and will provide the best level of support for customers who use them:
Server administrators can use an alternative solution such as Puppet, Anisble, Powershell Desired Configuration Management, or Salt.
*Note: CU Boulder has retired the Tripwire service and site license. Please use the appropriate software for your needs from the list above.
Host-based intrusion detection software (HIDS) should be installed and used by the server administrator.
Attending a no-cost training session facilitated by IT Security is encouraged to understand how to best protect your data. These trainings will give you a security refresher, general information about HIDS, and instructions for how to acquire site licenses and help. Contact the IT Security Office to sign up for IT Security training.