|Title||Start Date & Time||End Date & Time|
|Service Issue Updated: Student Account Access||Friday, February 9, 2018 - 12:39pm|
|Service Issue Reported: Power outage on East Campus||Tuesday, February 13, 2018 - 1:40pm|
|Service Issue Reported: Microsoft Store and Store Apps - General Access Issue Reported||Thursday, February 22, 2018 - 3:44pm|
|Service Issue Reported: Campus Wireless||Monday, February 12, 2018 - 10:05am|
|Service Maintenance Completed: Digication||Sunday, February 25, 2018 - 4:00am||Sunday, February 25, 2018 - 6:00am|
|Service Maintenance Scheduled: IEC & MTRS Building Networks||Thursday, March 1, 2018 - 6:00am||Thursday, March 1, 2018 - 7:00am|
|Service Maintenance Scheduled: Campus Firewall||Tuesday, March 6, 2018 - 5:30am||Tuesday, March 6, 2018 - 6:30am|
Yes. The no-cost training will cover the recommend configurations for HIDS. Please visit the recommended practices portion of this website for self-help information if you have already attended the training session.
Yes. Administrators have full control over the installation and configuration of HIDS on the systems for which they have responsibility.
Because of the complexity of running the software, OIT recommends administrators attend the no-cost training.
No. You only need to attend the training once.
It is recommended that administrators include IT Security in alerts that are sent from their HIDS so that the IT Security Office (ITSO) is aware of issues and can be better prepared to help in the event of an attack or compromise. The no-cost training module will help you configure that option.
Host-based Intrusion Detection monitors the system for unauthorized changes to files and alerts the administrator of suspicious activity.
By running a host-based intrusion detection system, you satisfy the requirement and do not need to run a new HIDS. Please contact the IT Security Office (ITSO) to file an exception.
HIDS examines a computer system for anomalous behavior as a means to identify an attack or compromise of the system. Identifying the source and method of an intrusion will help us to understand what data is at risk and if other systems may be affected.
Any computer that can be accessed from outside of the campus network without using the VPN.
Verify the alert and contact the IT Security Office (ITSO). Because of the complexity of HIDS software, there is potential for false positives. The no-cost training module will cover alert management. If the alert appears to be an indication of a compromise, contact the ITSO immediately.
HIDS is required for systems hosting private data and recommended for all Internet facing servers. Protecting highly confidential data is a top priority on the CU Boulder campus and HIDS will provide administrators and the IT Security Office with immediate knowledge of a potential system compromise.
No. The IT Security Office provides no-cost training that will guide you through installation and configuration of HIDS.