This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
wiki:policies:end_user_device [2024/01/25 23:37] katcow |
wiki:policies:end_user_device [2024/08/11 18:38] (current) katcow |
||
---|---|---|---|
Line 29: | Line 29: | ||
==== Software Review ==== | ==== Software Review ==== | ||
- | Nested Knowledge reviews the applications installed on employee devices on a quarterly basis using our Mobile Device | + | Nested Knowledge reviews the applications installed on employee devices on a quarterly basis using our Mobile Device |
===== IV. Anti-Malware Policy ===== | ===== IV. Anti-Malware Policy ===== | ||
Line 47: | Line 47: | ||
- The offending applications and files will be uninstalled or removed until the report returns zero results. | - The offending applications and files will be uninstalled or removed until the report returns zero results. | ||
- The incident response team will analyze the malware attack surface and inventory the information that was available on the infected device since last scan. | - The incident response team will analyze the malware attack surface and inventory the information that was available on the infected device since last scan. | ||
- | - Based on the information available on the infected device, the appropriate Incident Response and Data Protection procedures will be enacted. Information about the threat will be escalated to clients/ | + | - Based on the information available on the infected device, the appropriate Incident Response and Data Protection procedures will be enacted. Information about the threat will be escalated to clients/ |
===== Enforcement ===== | ===== Enforcement ===== | ||
Line 56: | Line 56: | ||
^Author^Date of Revision/ | ^Author^Date of Revision/ | ||
- | |K. Cowie|01/24/2024|Updated to reflect new laptops| | + | |K. Cowie|01/25/2024|Added application review| |
|K. Holub|12/ | |K. Holub|12/ | ||
|K. Kallmes|12/ | |K. Kallmes|12/ |