Institutional Computer Security Compliance

OVERVIEW OF SERVICE

The Drexel University Information Security Requirements (ISR-2) for Institutionally-Owned Computers outlines mandatory security practices to protect university data and systems.

DESCRIPTION & FEATURES

Device Configuration
  • All institutionally-owned computers must be configured according to Drexel IT standards.
  • This includes proper installation of operating systems, security patches, and approved software.
Authentication
  • Devices must use secure authentication methods, such as Drexel credentials.
  • Passwords must meet complexity and expiration requirements.
Encryption
  • Full-disk encryption is required on laptops and mobile devices.
  • Encryption ensures data remains protected even if a device is lost or stolen.
Antivirus and Malware Protection
  • Approved antivirus software must be installed and regularly updated.
  • Devices must be scanned periodically to detect and remove threats.

Firewall and Network Security
  • Firewalls must be enabled and properly configured..
  • Devices must connect through secure networks and use VPN when accessing Drexel resources remotely.

Physical Security

  • Devices should be physically secured to prevent unauthorized access.
  • Devices must connect through secure networks and use VPN when accessing Drexel resources remotely.
Monitoring and Auditing
  • Drexel IT may monitor devices for compliance.
  • Logs and audit trails must be maintained for accountability.

Incident Response
  • Any security incidents must be reported immediately to Drexel IT.
  • Devices involved in breaches may be quarantined or removed from the network.

ADDITIONAL INFORMATION

Computers owned or managed by or on behalf of Drexel must operate with all required software and in the required manner described within ISR-2 or within the requirements of individually approved Exception Requests granted by the office of the Chief Information Security Officer.

 
Computer Security Compliance Questions Security Exemption Request - Windows 10

Related Articles (1)

Keep up to date on Drexel's end-of-support dates for major versions of Windows and macOS operating systems.

Service Offerings (2)

Security Compliance Policy Questions
Form to submit questions to the Information Security Office
Windows 10 Security Exemption
Users can use this form to request an exemption to extend the use of Windows 10 on a Drexel Owned computer