Information for IT administrators ****************************************************************************************** * ****************************************************************************************** This section is intended for staff who manage IT infrastructure, user accounts, devices or the university. It summarizes the basic rules, recommended procedures and contacts for saf operation of university IT services. The content is based on university methodology, cybersecurity rules and procedures recomme central IT administration. The site serves as an indicative signpost – detailed procedures the internal documentation. ****************************************************************************************** * ****************************************************************************************** Device management • Regular updates of operating systems and applications, • mandatory security features (antivirus protection, firewall, encryption), • use of university management tools (MDM, deployment solutions, central console). Networks and infrastructure • Manage VLAN, Wi-Fi and network elements according to university standards, • rules for connecting servers and applications to the network, • monitoring of traffic and detection of security incidents. Identity and access • working with CAS, Shibboleth, LDAP and roles in university systems • policies for secure permissions settings • managing student and employee accounts IT security rules Mandatory access control according to roles. Use of two-factor authentication where available. Minimising services and ports. Regular configuration checks and audit logs. Reporting of security incidents according to university procedure. Documentation and resources IT administrators can use: • central RO CU documentation • cybersecurity methodologies • technical guides for individual systems • operational information on services (M365, servers, networks, databases, applications) When and where to contact Faculty IT colleagues – working on local projects. Central RCU administration – for approving changes, consultations, more complex solutions. CSIRT/CERT CU – in case of security incidents. Helpdesk CU – single place for reporting requests and defects. Frequently asked questions (FAQ) Is there a central methodology I have to follow? • Yes - mainly CU security rules, service operation methodologies and RO CU recommendation Where can I find technical documentation on university services? • In RO CU central documentation or in dedicated repositories for IT staff. Who approves changes to infrastructure or new services? • Mostly RO CU (OICT), consult some local changes in advance with the faculty IT. Quick summary This section is intended for IT administrators who need an overview of rules, recommended and support for the management of systems at CU. It contains everything important for safe operation of the university IT infrastructure.