Viewable by the world
Group Access to IT Frequently Asked Questions (FAQ)
Can VIEW the space: itfaq-editors ,  anonymous ,  itfaq-MFA-EDITORS ,  itfaq-itss ,  all-lbnl-users ,  mpsg-mpsg-helpdesk ,  mpsg-staff ,  itfaq-editors-lite ,  google-collab-documentation-management , 
Can EDIT the space: itfaq-editors-lite ,  itfaq-editors ,  mpsg-staff ,  google-collab-documentation-management ,  mpsg-mpsg-helpdesk , 
Can ADMINISTER the space:

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

TABLE OF CONTENTS

Table of Contents
maxLevel5


Tip

Ensure you are designated as the custodian of your computing devices. Property Management guidelines are described hereAs the custodian of your computer, you are required to follow all cyber security requirements and protect your computer from loss or theft. If lost or stolen follow Instructions for Reporting Lost, Damaged, Destroyed or Stolen IT Assets.

Keep Your Software Up to Date

Operating system and third party software periodically update for security and enhancement reasons. Some updates may require a reboot of the system so remember to save and close any open files to protect your data.

Tip

BigFix can help you monitor and/or patch your computers. Use this tool to not only report potential system issues, but keep your system patched. Further information can be found on our Patch Management page.

Reboot Your Computer

You should reboot your computer at least once a week. This will ensure that all software updates are downloaded and installed in a system. This is one of the single most important things you can do to keep your system healthy.

Password Best Practices

There are three main strategies that can be implemented to increase your security posture. They are:

  • Always use unique passwords. Utilizing the same password across several websites will make you vulnerable if one site is compromised all can get compromised.
  • Utilize a password manager like LastPass. Password managers ensure that your passwords are maintained in a safe, encrypted vault and makes it easier for users to protect their online identities by using hard to crack passwords.

Use Multi-Factor Authentication (MFA)

Utilizing a two factor authentication process helps protect your online accounts and access to your resources. Berkeley Lab IT recommends everyone adopt MFA. Further details can be found on the  MFA page.

Install BigFix

BigFix is a widely adopted cross-platform endpoint management system utilized by private companies, government agencies, and academia. BigFix has a Patch Management module which can identify systems with applications that are out of date and allow system managers to take action to install patches and remediate issues. Berkeley Lab IT has adopted two modes of BigFix, one active the other passive. The Active Mode is recommended for most systems at the Lab, including laptops, desktops, and shared workstations. The Passive Mode is used primarily for monitoring and reporting on system status, software licensing, and asset management. BigFix can be downloaded from the Software Store.

Lastly, BigFix can help automate and manage your asset inventory. Berkeley Lab Property Management and IT have piloted a program to certify the existence of a DOE tagged asset. Any DOE-barcoded system running BigFix and present on the LBL network can be automatically verified for inventory purposes, without the barcode being scanned, see Help IT Automate Your Asset Inventory.

Install Sophos / Anti-virus Software

LBNL Cyber Security has defined the Minimum Security Requirements and all computers connected to the Berkeley Lab network must meet these requirements. One requirement is the installation of an antivirus software with automatic updates. Berkeley Lab IT has adopted Sophos as the enterprise solution. Sophos can be downloaded from the Software Store.

Backup Data

Your data is important so don't wait for that disaster. Be proactive and obtain a backup solution that meets your needs. Berkeley Lab IT offers Druva inSync as the enterprise backup tool, which can be purchased from the Software Store.

Use the Lab's VPN

When working off-site, always utilize Berkeley Lab's VPN. A Virtual Private Network is an encrypted connection over the Internet from your device to a network. Essentially when running VPN, your computer is on Berkeley Lab's secure network and enables you access to restricted resources such as FMS. Cisco VPN software can be downloaded from the Software Store

Cleanup Files on your Machine

Low disk space can lead to poor system performance and problems with file integrity. You will want to clear browser cache/cookies and remove unnecessary data/software. Remember you have unlimited disk space on Google.

Third party software tools claim they can help with system clean up. Do not install CCleaner on Lab computers.

Google Drive / Team Drive

Storing your data on a network resource is another option to protect your data. Berkeley Lab IT has both Google Drive and Google Team Drives to store your unlimited data.