According to university policy, all Duke University-owned computers must be registered in an endpoint management system and in the university endpoint security system. Computers that are out of compliance with this policy may be quarantined from Duke networks. In order to comply with university policy, the following actions can be taken:
End Users
If you are the primary user of a computer that is out of compliance with the University’s endpoint management policy (or if you have questions or concerns about your computer’s compliance), the best thing you can do is contact your local IT support group. If you have no local IT support group and are solely responsible for the support of your computer, the following steps will bring your computer into compliance:
- Download and install the Duke University BigFix Agent for your operating system.
- Download and install the Duke University CrowdStrike Agent for your operating system.
In addition, it is recommended that you subscribe to the Duke Endpoints mailing list to be kept aware of issues affecting the management and security of computers at Duke.
IT Support
If you are a member of an IT Support group that is not currently using one of the endpoint management systems at Duke, please send a message to endpoints-request@duke.edu and a member of OIT Device Engineering will get in touch with you to discuss the options available.
NOTE: These policies and procedures do not apply to computers owned by and/or used within the Duke Health Enterprise. Please contact your local IT support group or the DHE Information Security Office with any questions or concerns regarding endpoint management requirements within the Duke Health Enterprise.