|Title||Start Date & Time||End Date & Time|
|Service Issue Updated: Campus Wireless||Monday, February 12, 2018 - 10:05am|
|Service Issue Updated: Northstar||Thursday, May 24, 2018 - 11:28am|
|Service Maintenance Scheduled: Campus Solutions & Portals||Sunday, June 24, 2018 - 6:00am||Sunday, June 24, 2018 - 6:00pm|
|Service Maintenance Scheduled: Network Services in Multiple Buildings||Tuesday, June 26, 2018 - 5:00am||Tuesday, June 26, 2018 - 7:30am|
|Service Maintenance Scheduled: Networks in Farrand, Cockerell, Sewall, Brackett, Aden||Monday, June 25, 2018 - 8:00am||Thursday, June 28, 2018 - 5:00pm|
Yes. The no-cost training will cover the recommend configurations for HIDS. Please visit the recommended practices portion of this website for self-help information if you have already attended the training session.
Yes. Administrators have full control over the installation and configuration of HIDS on the systems for which they have responsibility.
Because of the complexity of running the software, OIT recommends administrators attend the no-cost training.
No. You only need to attend the training once.
It is recommended that administrators include IT Security in alerts that are sent from their HIDS so that the IT Security Office (ITSO) is aware of issues and can be better prepared to help in the event of an attack or compromise. The no-cost training module will help you configure that option.
Host-based Intrusion Detection monitors the system for unauthorized changes to files and alerts the administrator of suspicious activity.
By running a host-based intrusion detection system, you satisfy the requirement and do not need to run a new HIDS. Please contact the IT Security Office (ITSO) to file an exception.
HIDS examines a computer system for anomalous behavior as a means to identify an attack or compromise of the system. Identifying the source and method of an intrusion will help us to understand what data is at risk and if other systems may be affected.
Any computer that can be accessed from outside of the campus network without using the VPN.
Verify the alert and contact the IT Security Office (ITSO). Because of the complexity of HIDS software, there is potential for false positives. The no-cost training module will cover alert management. If the alert appears to be an indication of a compromise, contact the ITSO immediately.
HIDS is required for systems hosting private data and recommended for all Internet facing servers. Protecting highly confidential data is a top priority on the CU Boulder campus and HIDS will provide administrators and the IT Security Office with immediate knowledge of a potential system compromise.
No. The IT Security Office provides no-cost training that will guide you through installation and configuration of HIDS.