CSRs

This page is for specific information and tools to assist the Computer Support Representative (CSR) community. As CSRs are also staff members, information pertaining to them in that regard can be found on the Staff page.

Please click each section below for general information for CSRs when supporting technology on campus.

To request support or ask questions about what is available on campus to assist with these suggestions, please visit the Enterprise Service Desk site at https://techsupport.gatech.edu.

Tools

Common Security Related GPOs

NIST 800-171

  • There are GPOs published to assist with implementation of NIST 800-171 controls. information about them is listed on the NIST 800-171 GPOs KB.
Terms of Use Statement

For the standard Terms of Use statement, please refer to the Endpoint Security – Terms of Use Statement KB for the wording necessary to add. This wording should be shown before the user logs into a Georgia Tech system.

Information

Digital Media Protection

Please refer to the Digital Media Protection page for information concerning logical and physical methods of protecting media such as paper, portable drives, and internal system drives.

Internet Scanning

Students, faculty, and staff who need to scan the Internet for research purposes should submit a Policy Exception request to be granted an exception to the Acceptable Use policy.

More information can be found on the Internet Scanning page.

Vulnerability Management

Vulnerability Management is a security practice designed to proactively prevent the exploitation of IT vulnerabilities that exist within an organization. For more information about Georgia Tech’s approach, please visit the Vulnerability Management page.

Specific Vulnerability Management Information:
Network Best Practices

Please visit the Network Best Practices page to view information about common elements included in a departmental network. 

General Web Application Security Strategies

It is very important to protect web applications running on Georgia Tech’s network. With that in mind, the General Web Application Strategies is a resource to assist with information about how to build security into such web applications.

SSH Security Guidelines

Secure Shell is an extremely secure protocol, but it is also one of the most frequently attacked protocols we see. Because of this, we have a set of practices on the SSH Security Guidelines page we would like to see followed on systems that allow SSH either from large numbers of subnets (e.g. campus) or from outside campus.

System Management

The items below reflect not only best practices for CSRs, but are also meant to assist if staff ask questions to CSRs about these subjects.