Information for IT administrators

This section is intended for staff who manage IT infrastructure, user accounts, devices or local systems at the university. It summarizes the basic rules, recommended procedures and contacts for safe and reliable operation of university IT services.

The content is based on university methodology, cybersecurity rules and procedures recommended by the central IT administration. The site serves as an indicative signpost – detailed procedures are provided in the internal documentation.




Device management

  • Regular updates of operating systems and applications,

  • mandatory security features (antivirus protection, firewall, encryption),

  • use of university management tools (MDM, deployment solutions, central console).

Networks and infrastructure

  • Manage VLAN, Wi-Fi and network elements according to university standards,

  • rules for connecting servers and applications to the network,

  • monitoring of traffic and detection of security incidents.

Identity and access

  • working with CAS, Shibboleth, LDAP and roles in university systems

  • policies for secure permissions settings

  • managing student and employee accounts


IT security rules

Mandatory access control according to roles.

Use of two-factor authentication where available.

Minimising services and ports.

Regular configuration checks and audit logs.

Reporting of security incidents according to university procedure.


Documentation and resources

IT administrators can use:

  • central RO CU documentation

  • cybersecurity methodologies

  • technical guides for individual systems

  • operational information on services (M365, servers, networks, databases, applications)



When and where to contact

Faculty IT colleagues – working on local projects.

Central RCU administration – for approving changes, consultations, more complex solutions.

CSIRT/CERT CU – in case of security incidents.

Helpdesk CU – single place for reporting requests and defects.



Frequently asked questions (FAQ)

Is there a central methodology I have to follow?

  • Yes - mainly CU security rules, service operation methodologies and RO CU recommendations.

Where can I find technical documentation on university services?

  • In RO CU central documentation or in dedicated repositories for IT staff.

Who approves changes to infrastructure or new services?

  • Mostly RO CU (OICT), consult some local changes in advance with the faculty IT.


Quick summary


This section is intended for IT administrators who need an overview of rules, recommended procedures and support for the management of systems at CU. It contains everything important for safe and uniform operation of the university IT infrastructure.