This page is for specific information and tools to assist the Computer Support Representative (CSR) community. As CSRs are also staff members, information pertaining to them in that regard can be found on the Staff page.
Please click each section below for general information for CSRs when supporting technology on campus.
To request support or ask questions about what is available on campus to assist with these suggestions, please visit the Enterprise Service Desk site at https://techsupport.gatech.edu.
Tools
Common Security Related GPOs
NIST 800-171
- There are GPOs published to assist with implementation of NIST 800-171 controls. information about them is listed on the NIST 800-171 GPOs KB.
Terms of Use Statement
For the standard Terms of Use statement, please refer to the Endpoint Security – Terms of Use Statement KB for the wording necessary to add. This wording should be shown before the user logs into a Georgia Tech system.
Information
Digital Media Protection
Please refer to the Digital Media Protection page for information concerning logical and physical methods of protecting media such as paper, portable drives, and internal system drives.
Internet Scanning
Students, faculty, and staff who need to scan the Internet for research purposes should submit a Policy Exception request to be granted an exception to the Acceptable Use policy.
More information can be found on the Internet Scanning page.
Vulnerability Management
Vulnerability Management is a security practice designed to proactively prevent the exploitation of IT vulnerabilities that exist within an organization. For more information about Georgia Tech’s approach, please visit the Vulnerability Management page.
Specific Vulnerability Management Information:
Network Best Practices
Please visit the Network Best Practices page to view information about common elements included in a departmental network.
General Web Application Security Strategies
It is very important to protect web applications running on Georgia Tech’s network. With that in mind, the General Web Application Strategies is a resource to assist with information about how to build security into such web applications.
SSH Security Guidelines
Secure Shell is an extremely secure protocol, but it is also one of the most frequently attacked protocols we see. Because of this, we have a set of practices on the SSH Security Guidelines page we would like to see followed on systems that allow SSH either from large numbers of subnets (e.g. campus) or from outside campus.
System Management
The items below reflect not only best practices for CSRs, but are also meant to assist if staff ask questions to CSRs about these subjects.
- Patch Management:
- Please review the Patch Management guidelines page for general information.
- For best practices, please review the associated KB Article.
- Endpoint Management:
- Please review the Endpoint Management Best Practices article for general suggestions.