In the Vulnerability Management service, the LSA TS Infrastructure group scans for, identifies, reports on, and remediates any security vulnerabilities. This allows us to provide high-level of security support for the College. This includes patching operating systems and applications, scanning web sites to detect vulnerable code, and coordinating risk assessments and risk treatment plans.
The capability of devices to be mobile allows users the ability to utilize their systems in just about any computing environment available. A diverse and expansive computing landscape brings with it unique security challenges that may not always be apparent in a timely manner. The University of Michigan has in place an Intrusion Prevention System (IPS) to provide another layer of network security. This layer allows ITS to detect and prevent many types of malicious network traffic coming from outside the university before they reach our devices.
More information on the IPS is available at https://its.umich.edu/enterprise/wifi-networks/network-security/ips/faq.
The LSA TS Infrastructure team conducts monthly network based vulnerability scans with a focus on identifying system weaknesses before they can be exploited. Each subnet scan results are reviewed, edited and formatted before providing to the appropriate department for corrective action. This venture also provides departments with valuable information ranging from systems that are new to their network to systems are utilizing out of date software versions.
To ensure College's systems are as secure as possible, the LSA TS Infrastructure team manages patch management systems for Windows and Red Hat operating systems. The College Windows Server Update Services (WSUS) server can deploy approved Microsoft-published updates to all authorized users quickly and efficiently. The Red Hat Satellite server handles providing approved updates for the College's Red Hat Enterprise Linux (RHEL) systems. This service ensures that updates are installed as silently as possible, requiring limited user interaction — almost "auto-magically."
Today's academic landscape requires researchers and facility to handle vast amounts of varying data sets that have the potential of containing sensitive information. LSA TS Infrastructure strives to identity, report and offer any assistance required to redact this information to ensure total compliance with all governing regulations.