...
EDA User Check List (Read this page.)
EDA User Discussion Check List
- EDA is primarily intended for installation of academic applications
- IT staff will continue to provide management of the desktop computer
- EDA users should not modify managed software without consulting with IT staff
- EDA users should not modify security settings on the computer without consulting with IT staff
- Examples:
- Anti-virus
- Operating System/Application patching
- Firewall settings
- EDA users should inform IT staff when making configuration changes
- EDA users should not create local accounts or modify existing accounts
- The EDA user is responsible for licensing any applications installed with EDA
- Do not share EDA account and password with anyone
- Typical EDA user support will be done through the users account by IT staff, via UAC and the local administrator account
- IT staff will be monitoring more closely the operation of computers configured with EDA
- Process launched from EDA access
- Applications installed
- Changes to security settings/applications
- EDA users will receive information about EDA use via email
- Due to heightened security concerns, ITS mandates that IT staff review and remediate incidents that occur in violation of the agreement. Remediation may include loss of EDA privileges.
- Similar to standard desktops and laptops, EDA computers are not backed up, so any data stored locally is unprotected from loss
View file | ||||
---|---|---|---|---|
|
...