...
- NetID login (IT-controlled user access management, device/account password syncing)
- Builtin VPN connection to campus network (for Windows/MacOS workstations)
- Automatic data backup (OneDrive, H drive) when using the standard user directories (Documents, Desktop)
- Software deployment, configuration, and licensing
- Security (disk encryption and key backup, automatic security updates, firewall configuration, virus and malware protection)
- Admin rights can be provided as needed with a "managed" local admin account - more information about this type of account
...
Additional information on using a Technology Services Managed Device.
...
Self-managed (off-domain) Devices:
A For Windows devices, a user may request to "self-manage" their the device, i.e. exempt meaning that the device is exempted from the standard managed device configuration policy. Support for such "off-domain" devices is provided by Tech Services on a "best-effort" basis. There is no guarantee that a all standard IT policies. In these instances, the user becomes the primary administrator of the computer. If any problems arise, Technology Services may be unable to assist you with any loss of user data or access to the system, and we provide no guarantee that the system can be restored to a user-configured state. Technology Services' responsibility will be to return the system to the "base configuration" as defined in the first bullet in the terms below.
Technology Services will ask for a written agreement to the following terms when opting to self-manage a device:
- Technology Services will install and configure the operating system with access for the primary user (one standard user account and an administrator-level account) which is defined as the "base configuration"
Technology Services will install any licensed software applications requested by the user during setup. NOTE: Some university software cannot be installed on an user-managed device, such as those that require connection to a license server (MATLAB, SPSS, Tableau)
- The user is solely responsible for the their data and non-SU application backup/retrieval on self-managed systems as well as the management of applications not licensed by the university
- The user is solely responsible for maintaining the encrpytion encryption on the local drive(s)
- Any security incidents such as malware/virus infections or other signs of compromise will result in a non-negotiable wipe and restore of the system back to the base configuration
- If on campus, the device will be registered on an internal network which can not be reached from external, non-SU networks
- You should The user must not reuse your their NetID password for a any local user on the system
- Your The primary user account should not run with full Administrator-level access on the system
- You may not access or store any "confidential" data on the system, as defined in the university's data classification.
- SU's VPN connection isn't available—connect to campus via RDS if necessary to reach other SU resources.
...