Georgia College & State University (GC&SU) and The Division of Technology
Solutions (DTS) recognize that some faculty and staff have a demonstrated need
to perform what would otherwise be considered administrative functions on
computer equipment assigned to them by GC&SU. It is also recognized that
additional administrative functions may pose a risk to both the individual and
the University. Risks that could face the University may be in the form of mis-configuration,
errors, omissions, lack of diligence, poor understanding, or malicious intent.
Whatever the cause of the risks, they a real and may severely impact the
University or the student body.
The following definitions are germane to the understanding of this procedure:
Local computer – As far as this procedure is concerned, a local computer refers
to the computer, laptop, or workstation that is assigned to an individual or
department.
Local Administrator – A local administrator is an individual who has been
assigned certain computer privileges that allow for the execution of special
administrative processes on a local computer.
Domain – A domain is a group of computers that receives
information from a primary computer known as a domain controller. This
information allows for the efficient and centralized management and coordination
of a large number of local computers. The primary GC&SU domain is currently
named “Labdom.gcsu.edu” and provides the basic file and network access and
privileges to every local computer in the domain. [CM1]
The University implemented an infrastructure known as an Active Directory or
Domain as a means to more effectively manage computer labs at a time when the
number of lab computers was growing rapidly. In this area, the domain known as
“labdom” continues to function well allowing a relatively small number of staff
to manage a large number of lab computers. During that period a change was made
to our mission and faculty were being hired at a rapid pace. The support staff
was unable to keep pace with the increasing demand for services and looked for
ways to work more efficiently. The domain model in the computer labs had been
very effective and was used initially as a stop gap measure to be able to manage
local computers for new faculty. Time passed and the demands increased, so a
computer management system known as Altiris was moved into production in
addition to the existing domain. Altiris allowed remote administration to any
domain affiliated computer anywhere on campus. Advances in Altiris continue to
improve efficiencies for what is now Client Support Resources and benefit the
campus as a whole.
Local administration is a responsibility to be considered seriously by both the individual and the University. Information technology and the Internet have placed each individual by way of the computers on the global forefront of communications. Though physically located in rural Georgia, in the world of technology each of us are now in Tokyo, New York, or Brussels via the Internet. Individuals must consider information security from this perspective rather than from the view of rural Georgia. The reality is that computing network power and ability expose us directly to individuals that would destroy, damage, or sell the University’s information. Any risk normally associated with being connected to the internet becomes multiplied greatly when local computer administration does not assure proper configurations. Risks directly associated with local administration include:
The following responsibilities shall lie with the individual who undertakes the role of local administrator and the unit or college administrator approving the waiver. The local administrator shall:
Local administrators must be renewed and re-registered annually with DTS by
October 1 or the next business day if October 1 falls upon a weekend or holiday.
NOTE: This procedure does not supercede other GC&SU policies or procedures.
The local administrator must agree to abide by all GC&SU policies and procedures
as well as local, state, and federal legislation.
Responsibilities Following an Information Security Incident
It is the responsibility of the local administrator to follow best practice
guidelines in securing workstations and servers and the administrator’s
supervisor to ensure that expectations in this area are clearly understood and
in writing, and that the local administrator is adequately trained and
qualified.
In the event that problems arise as a result of local administration of a
faculty member’s computing equipment, the local administrator and the
administrator’s supervisor, will work with the Division of Technology Solutions
to correct any problems that result from the event. The local administrator and
the administrator’s supervisor, in cooperation with the Division of Technology
Solutions, will review administrative practices or procedures in place that may
have contributed to the security event and take immediate corrective actions to
avoid future re-occurrences.
Application for Local Administration
To be developed…[CM9]
Name of Applicant:
Department:
School/College/Library:
Date:
Justification for Administrative Access:
I have read and understand the associated Windows Local Administration Procedure
I agree to abide by the statements within that procedure to the best of my
ability. If approved for local administration authority, I will not knowingly
violate federal, state, local, or University policies or law. I fully
understand the implications, and potential dangers of local administration and
hold harmless Georgia College & State University its agents for any damages or
loss that may occur as a direct or indirect result of local administrative
actions. I attest that I am qualified to administer the computer equipment
assigned to me by the University System of Georgia, the state of Georgia, or
Georgia College and State University, and will use due diligence in protecting
those assets or information stored on them from harm.
Applicant Signature:
Date:
Name of School/College/Library Approving Authority:
Signature of Approving Authority:
Date
CIO/CISO Signature
Date
Date Training Course Passed
Administration Authority Approved/Denied
If denied, state reasons for denial.
[CM1]Wed will be migrating to a new domain
in coming months.
[JH2]How is this different?
[JH3]This update frequency needs to conform
to the GC&SU frequency, especially for emergent threats
[JH4]Is there a web accessible form that
can be filled in at the time of the activity?
[JH5]This needs clarification
[JH6]There needs to be a procedure for
this.
[JH7]There needs to be a procedure for
this.
[JH8]There needs to be a “check list” for
this
[CM9]By me.