|Title||Start Date & Time||End Date & Time|
|Service Restored: Youtube Age-Restricted Content Inaccessible From CU Network||Saturday, September 15, 2018 - 2:28pm|
|Service Maintenance Scheduled: Wired Network in Multiple Buildings||Thursday, September 20, 2018 - 6:30am||Thursday, September 20, 2018 - 7:30am|
|Service Maintenance Scheduled: Wi-Fi Services Across Campus||Thursday, September 20, 2018 - 9:00am||Thursday, September 20, 2018 - 10:00am|
|Service Maintenance Scheduled: Turnitin||Saturday, September 22, 2018 - 9:00am||Saturday, September 22, 2018 - 5:30pm|
|Service Maintenance Scheduled: Campus Solutions & Portals||Sunday, September 23, 2018 - 6:00am||Sunday, September 23, 2018 - 2:00pm|
|Service Maintenance Scheduled: F5 Content Switch||Thursday, September 27, 2018 - 6:30pm||Thursday, September 27, 2018 - 7:30pm|
|Service Maintenance Scheduled: Wi-Fi in Bear Creek Apartments||Tuesday, October 2, 2018 - 6:00am||Tuesday, October 2, 2018 - 7:30am|
Yes. The no-cost training will cover the recommend configurations for HIDS. Please visit the recommended practices portion of this website for self-help information if you have already attended the training session.
Yes. Administrators have full control over the installation and configuration of HIDS on the systems for which they have responsibility.
Because of the complexity of running the software, OIT recommends administrators attend the no-cost training.
No. You only need to attend the training once.
It is recommended that administrators include IT Security in alerts that are sent from their HIDS so that the IT Security Office (ITSO) is aware of issues and can be better prepared to help in the event of an attack or compromise. The no-cost training module will help you configure that option.
Host-based Intrusion Detection monitors the system for unauthorized changes to files and alerts the administrator of suspicious activity.
By running a host-based intrusion detection system, you satisfy the requirement and do not need to run a new HIDS. Please contact the IT Security Office (ITSO) to file an exception.
HIDS examines a computer system for anomalous behavior as a means to identify an attack or compromise of the system. Identifying the source and method of an intrusion will help us to understand what data is at risk and if other systems may be affected.
Any computer that can be accessed from outside of the campus network without using the VPN.
Verify the alert and contact the IT Security Office (ITSO). Because of the complexity of HIDS software, there is potential for false positives. The no-cost training module will cover alert management. If the alert appears to be an indication of a compromise, contact the ITSO immediately.
HIDS is required for systems hosting private data and recommended for all Internet facing servers. Protecting highly confidential data is a top priority on the CU Boulder campus and HIDS will provide administrators and the IT Security Office with immediate knowledge of a potential system compromise.
No. The IT Security Office provides no-cost training that will guide you through installation and configuration of HIDS.